This page was not yet optimized for use on mobile devices.
Extended Package for Wireless Local Area Network (WLAN) Clients
Web information ?
Status: archivedCertification date: 2016-02-08
Archived date: 2022-09-30
Scheme: 🇺🇸
Category: Other Devices and Systems
Security level: EAL1
Certification report ?
Extracted keywords
Protocols
TLSClaims
O.AUTH_COMM, O.CRYPTOGRAPHIC_FUNCTIONS, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.TSF_SELF_TEST, O.WIRELESS_ACCESS_POINT_CONNECTION, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNDETECTED_ACTIONS, A.NO_TOE_BYPASS, A.TRUSTED_ADMIN, OE.NO_TOE_BYPASS, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM, FCS_TLSC_EXT, FCS_CKM_EXT.3, FIA_PAE_EXT.1, FMT_SMF_EXT, FPT_TST_EXT, FTP_ITC_EXTEvaluation facilities
atsecStandards
X.509File metadata
Author | McGeady, Megan [USA] |
---|---|
Creation date | D:20170822135301-04'00' |
Modification date | D:20170822135303-04'00' |
Pages | 10 |
Creator | Acrobat PDFMaker 11 for Word |
Producer | Adobe PDF Library 11.0 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256Asymmetric Algorithms
ECDHE, ECDSA, Diffie-Hellman, DHEHash functions
SHA-1, SHA256Schemes
MAC, Key ExchangeProtocols
TLS, TLS 1.0, TLS 1.1, TLS 1.2Randomness
DRBG, RBGElliptic Curves
secp256r1, secp384r1, secp521r1Block cipher modes
CBC, CCMTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_NULL_WITH_NULL_NULLClaims
O.AUTH_COMM, O.CRYPTOGRAPHIC_FUNCTIONS, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.TSF_SELF_TEST, O.WIRELESS_ACCESS_POINT_CONNECTION, O.WIRELESS_ACCESS_POINT_, T.TSF_FAILURE, T.UNAUTHORIZED, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, A.NO_TOE_BYPASS, A.TRUSTED_ADMIN, OE.NO_TOE_BYPASS, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
AGD_OPE, AGD_OPE.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN, FAU_GEN.1.2, FCS_TLSC_EXT, FCS_CKM.1, FCS_CKM.2, FCS_CKM, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_TLSC_EXT.1, FCS_CKM_EXT.3, FCS_COP.1, FCS_TLSC_EXT.2, FIA_PAE_EXT.1, FIA_PAE_EXT, FIA_PAE_EXT.1.1, FMT_SMF_EXT.1, FMT_SMF_EXT, FPT_TST_EXT.1, FPT_TST_EXT, FTA_WSE_EXT.1, FTA_WSE_EXT, FTA_WSE_EXT.1.1, FTP_ITC_EXT.1, FTP_ITC_EXTStandards
RFC 3394, RFC 4346, RFC 5246, RFC 5216, RFC 5289, RFC 5430, RFC 4492, RFC 5280, RFC 2865, RFC 2868, RFC 3575, RFC 3579, RFC 3580, X.509File metadata
Creation date | D:20160211085501-05'00' |
---|---|
Modification date | D:20160211085501-05'00' |
Pages | 39 |
References ?
- Apple iOS 10.2 on iPhone & iPad Devices archived
- Apple iOS 11 archived
- Apple iOS 12 archived
- Apple iOS 13 on iPhone and Apple iPadOS 13 on iPad Mobile Devices archived
- Apple iOS 15 archived
- Apple iPadOS 15 archived
- Google Pixel Phones on Android 10 archived
- Google Pixel Phones on Android 11.0 archived
- Google Pixel Phones on Android 12.0 archived
- Honeywell Mobility Edge Mobile Computer on Android 9 archived
- Huawei Mate 40 Pro (M40 pro) with EMUI 11.0 active
- Huawei Mobile Devices (P40 series) with EMUI 11.0 active
- LG Electronics Inc. V30 Smartphone archived
- LG Electronics, Inc. G6 Smartphone archived
- Microsoft Corporation Surface Duo 2 on Android 11 archived
- Microsoft Windows 10 and Server version 1903 (May 2019 Update) archived
- Microsoft Windows 10 version 1909 and Microsoft Windows Server version 1909 active
- Microsoft Windows 10 version 2004 (May 2020 Update), Microsoft Windows Server version 2004 (May 2020 Update) and others active
- Microsoft Windows 11, Windows Server 2022, and other Windows OSes active
- Motorola Lex L11 archived
- Motorola Lex L11 on Android 11 archived
- Motorola Mobility LLC Mobile Devices on Android 12 active
- OPPO Find X5 Pro, including ColorOS 12.1, and Qualcomm Snapdragon® 8 Gen 1 Mobile Platform active
- Panasonic Connect TOUGHBOOK Devices on Android 11 archived
- Pixel 3/3XL archived
- Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 – Fall archived
- Samsung Galaxy Devices on Android 10 - Fall archived
- Samsung Galaxy Devices on Android 10 - Spring archived
- Samsung Galaxy Devices on Android 11 - Fall archived
- Samsung Galaxy Devices on Android 11 - Spring archived
- Samsung Galaxy Devices on Android 12 - Spring archived
- Samsung Galaxy Devices on Android 7.1 archived
- Samsung Galaxy Devices on Android 9 archived
- Samsung Galaxy Devices with Android 7 archived
- Samsung Galaxy Devices with Android 8 & 8.1 archived
- Samsung Galaxy Devices with Android 9 - Fall archived
- Samsung Galaxy Tab Active2 on Android 8.1 archived
- TOUGHBOOK N1 on Android 9 archived
- Windows 10 and Windows Server (April 2018 Update) archived
- Windows 10 and Windows Server 2019 version 1809 archived
- Zebra Devices on Android 10 archived
- Zebra Devices on Android 11 archived
- Zebra SM6375 Devices on Android 11 active
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Extended Package for Wireless Local Area Network (WLAN) Clients was processed.
Raw data
{
"_id": "c88af12926be2779",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "c88af12926be2779",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_wlan_cli_ep_v1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDHE": 4
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DHE": 1,
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_TOE_BYPASS": 2,
"A.TRUSTED_ADMIN": 2
},
"O": {
"O.AUTH_COMM": 3,
"O.CRYPTOGRAPHIC_FUNCTIONS": 3,
"O.SYSTEM_MONITORING": 3,
"O.TOE_ADMINISTRATION": 3,
"O.TSF_SELF_TEST": 3,
"O.WIRELESS_ACCESS_POINT_": 1,
"O.WIRELESS_ACCESS_POINT_CONNECTION": 2
},
"OE": {
"OE.NO_TOE_BYPASS": 2,
"OE.TRUSTED_ADMIN": 2
},
"T": {
"T.TSF_FAILURE": 3,
"T.UNAUTHORIZED": 1,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNDETECTED_ACTIONS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 2,
"FAU_GEN.1.2": 1
},
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 3,
"FCS_CKM.2": 2,
"FCS_CKM_EXT.3": 1,
"FCS_CKM_EXT.4": 2,
"FCS_COP.1": 3,
"FCS_RBG_EXT.1": 4,
"FCS_TLSC_EXT": 9,
"FCS_TLSC_EXT.1": 7,
"FCS_TLSC_EXT.2": 1
},
"FIA": {
"FIA_PAE_EXT": 1,
"FIA_PAE_EXT.1": 4,
"FIA_PAE_EXT.1.1": 1
},
"FMT": {
"FMT_SMF_EXT": 4,
"FMT_SMF_EXT.1": 3
},
"FPT": {
"FPT_TST_EXT": 4,
"FPT_TST_EXT.1": 3
},
"FTA": {
"FTA_WSE_EXT": 2,
"FTA_WSE_EXT.1": 3,
"FTA_WSE_EXT.1.1": 1
},
"FTP": {
"FTP_ITC_EXT": 4,
"FTP_ITC_EXT.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CCM": {
"CCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 12,
"TLS 1.0": 3,
"TLS 1.1": 3,
"TLS 1.2": 3
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 4
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"secp256r1": 1,
"secp384r1": 1,
"secp521r1": 1
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RBG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 2865": 1,
"RFC 2868": 1,
"RFC 3394": 2,
"RFC 3575": 1,
"RFC 3579": 1,
"RFC 3580": 1,
"RFC 4346": 1,
"RFC 4492": 2,
"RFC 5216": 3,
"RFC 5246": 9,
"RFC 5280": 2,
"RFC 5289": 4,
"RFC 5430": 2
},
"X509": {
"X.509": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
},
"constructions": {
"MAC": {
"HMAC": 1,
"HMAC-SHA-256": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_NULL_WITH_NULL_NULL": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1
}
},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20160211085501-05\u002700\u0027",
"/ModDate": "D:20160211085501-05\u002700\u0027",
"pdf_file_size_bytes": 1069418,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 39
},
"report_filename": "pp_wlan_cli_ep_v1.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_TOE_BYPASS": 1,
"A.TRUSTED_ADMIN": 1
},
"O": {
"O.AUTH_COMM": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 1,
"O.SYSTEM_MONITORING": 1,
"O.TOE_ADMINISTRATION": 1,
"O.TSF_SELF_TEST": 1,
"O.WIRELESS_ACCESS_POINT_CONNECTION": 1
},
"OE": {
"OE.NO_TOE_BYPASS": 1,
"OE.TRUSTED_ADMIN": 1
},
"T": {
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNDETECTED_ACTIONS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM_EXT.3": 1,
"FCS_TLSC_EXT": 2
},
"FIA": {
"FIA_PAE_EXT.1": 1
},
"FMT": {
"FMT_SMF_EXT": 1
},
"FPT": {
"FPT_TST_EXT": 1
},
"FTP": {
"FTP_ITC_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "McGeady, Megan [USA]",
"/Comments": "",
"/Company": "",
"/CreationDate": "D:20170822135301-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/Keywords": "",
"/ModDate": "D:20170822135303-04\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20170822172945",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 139410,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 10
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d11a69c55d7bce6bf963e9cf01ba07d8eafde2423976e9f8a02c75aa105bf4f0",
"txt_hash": "968a5631b3492ac8567b930dff475191f57415943c10958047d8aac8f48ed3ce"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2a5a94cf932874f4b016dc8a7c1b516b01be2abc62fb60833c550127851cc171",
"txt_hash": "8d859c593e29162bc36b4999f4190afd682856e7bafbe47009a76239dfbd7898"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Extended Package for Wireless Local Area Network (WLAN) Clients",
"not_valid_after": "2022-09-30",
"not_valid_before": "2016-02-08",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "1.0"
}
}