Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
OCSI/CERT/ATS/10/2020/RC
ST54J A01
ANSSI-CC-2019/20
name Huawei Mate 40 Pro (M40 pro) with EMUI 11.0 ST54J A01
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme IT FR
status active archived
not_valid_after 20.01.2027 18.04.2024
not_valid_before 20.01.2022 18.04.2019
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_huawei_m40_emui11_v1.0_en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_20.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_huawei_m40_emui11_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_20en.pdf.pdf
manufacturer Huawei Device Co., Ltd. STMicroelectronics
manufacturer_web https://www.huawei.com/ https://www.st.com/
security_level {} EAL5+, AVA_VAN.5, ALC_DVS.2
dgst 4646e2bd9bf0b59d 7864dffb718a5592
heuristics/cert_id OCSI/CERT/ATS/10/2020/RC ANSSI-CC-2019/20
heuristics/cert_lab [] SERMA
heuristics/cpe_matches cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*, cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2021-37029, CVE-2023-52098, CVE-2021-40051, CVE-2022-41581, CVE-2021-37041, CVE-2023-39387, CVE-2023-41296, CVE-2021-37021, CVE-2021-22351, CVE-2021-37103, CVE-2022-38979, CVE-2022-41591, CVE-2021-40034, CVE-2022-41588, CVE-2021-22415, CVE-2022-22256, CVE-2021-40030, CVE-2021-22347, CVE-2020-9149, CVE-2021-39993, CVE-2021-22443, CVE-2022-48513, CVE-2022-41578, CVE-2022-31755, CVE-2021-37074, CVE-2022-34738, CVE-2022-31762, CVE-2022-48291, CVE-2021-37111, CVE-2021-22426, CVE-2020-9140, CVE-2023-39405, CVE-2022-48480, CVE-2021-36990, CVE-2021-22447, CVE-2022-48293, CVE-2022-48302, CVE-2022-31751, CVE-2021-22348, CVE-2023-52113, CVE-2021-37001, CVE-2023-39382, CVE-2021-22371, CVE-2022-39000, CVE-2021-40045, CVE-2021-22333, CVE-2023-39381, CVE-2022-39003, CVE-2023-46764, CVE-2021-46882, CVE-2021-37034, CVE-2021-22334, CVE-2021-22316, CVE-2021-36985, CVE-2021-22367, CVE-2021-36997, CVE-2022-37003, CVE-2023-34163, CVE-2022-44559, CVE-2023-44119, CVE-2021-40039, CVE-2021-22429, CVE-2023-49243, CVE-2023-39408, CVE-2021-22391, CVE-2021-22430, CVE-2021-39973, CVE-2022-34740, CVE-2021-22349, CVE-2022-39004, CVE-2022-44560, CVE-2023-26549, CVE-2021-22335, CVE-2021-22374, CVE-2021-22444, CVE-2021-46786, CVE-2022-41599, CVE-2022-34739, CVE-2021-37119, CVE-2022-48517, CVE-2023-52108, CVE-2022-48491, CVE-2023-49246, CVE-2022-44550, CVE-2021-22448, CVE-2023-49242, CVE-2021-40064, CVE-2022-31757, CVE-2020-9139, CVE-2021-22481, CVE-2022-41594, CVE-2021-46886, CVE-2021-39998, CVE-2022-31753, CVE-2021-36995, CVE-2022-48357, CVE-2021-22387, CVE-2021-22485, CVE-2022-48359, CVE-2022-44552, CVE-2021-37027, CVE-2021-22369, CVE-2022-22252, CVE-2022-48292, CVE-2021-36993, CVE-2021-22486, CVE-2021-40049, CVE-2021-37049, CVE-2022-44563, CVE-2021-22402, CVE-2023-52114, CVE-2021-46839, CVE-2021-40009, CVE-2022-48349, CVE-2021-46887, CVE-2023-39398, CVE-2022-41586, CVE-2021-22375, CVE-2023-31225, CVE-2023-26547, CVE-2021-22343, CVE-2022-41600, CVE-2022-48300, CVE-2021-36987, CVE-2022-46319, CVE-2023-44105, CVE-2021-37046, CVE-2023-46774, CVE-2021-22317, CVE-2021-40013, CVE-2021-22482, CVE-2021-37032, CVE-2021-22388, CVE-2021-22434, CVE-2021-40048, CVE-2021-36991, CVE-2021-22406, CVE-2021-37044, CVE-2021-37042, CVE-2021-22389, CVE-2022-37002, CVE-2021-22344, CVE-2021-40012, CVE-2021-22322, CVE-2023-1691, CVE-2022-48295, CVE-2021-22308, CVE-2022-22254, CVE-2021-37093, CVE-2022-48488, CVE-2021-22404, CVE-2022-48346, CVE-2022-31759, CVE-2023-46758, CVE-2021-22445, CVE-2021-22390, CVE-2021-40029, CVE-2021-22350, CVE-2021-37069, CVE-2021-37035, CVE-2022-48287, CVE-2022-44555, CVE-2023-44098, CVE-2021-46742, CVE-2023-44103, CVE-2023-52102, CVE-2023-39399, CVE-2021-40063, CVE-2023-44106, CVE-2022-44557, CVE-2023-34156, CVE-2022-48294, CVE-2021-22337, CVE-2021-36998, CVE-2021-22323, CVE-2020-9146, CVE-2020-9144, CVE-2023-34167, CVE-2023-44116, CVE-2021-37039, CVE-2023-41305, CVE-2021-22435, CVE-2022-38983, CVE-2023-1695, CVE-2023-46765, CVE-2021-22431, CVE-2021-40020, CVE-2023-34166, CVE-2021-46741, CVE-2021-22313, CVE-2021-22433, CVE-2022-44558, CVE-2021-40011, CVE-2021-37052, CVE-2022-34735, CVE-2021-36986, CVE-2021-22354, CVE-2023-46772, CVE-2022-34736, CVE-2021-40015, CVE-2021-36994, CVE-2023-41300, CVE-2021-36989, CVE-2021-22373, CVE-2023-44112, CVE-2021-40053, CVE-2021-22475, CVE-2021-37020, CVE-2023-39395, CVE-2023-39383, CVE-2021-46840, CVE-2021-37114, CVE-2022-48507, CVE-2022-22253, CVE-2023-41310, CVE-2021-46884, CVE-2022-48494, CVE-2021-37037, CVE-2022-22257, CVE-2021-22370, CVE-2022-37008, CVE-2021-22474, CVE-2021-40017, CVE-2021-40031, CVE-2023-52099, CVE-2023-34161, CVE-2022-41582, CVE-2023-46759, CVE-2021-40059, CVE-2021-22352, CVE-2021-22394, CVE-2022-48508, CVE-2023-1696, CVE-2023-39400, CVE-2022-38997, CVE-2020-9147, CVE-2022-39002, CVE-2023-1694, CVE-2022-41595, CVE-2022-44548, CVE-2022-41601, CVE-2021-40026, CVE-2021-22488, CVE-2021-40016, CVE-2023-6273, CVE-2021-22401, CVE-2021-22353, CVE-2022-46318, CVE-2021-40040, CVE-2022-41602, CVE-2023-44100, CVE-2022-41584, CVE-2023-49240, CVE-2020-36600, CVE-2021-40054, CVE-2021-22432, CVE-2021-22395, CVE-2023-49241, CVE-2022-31761, CVE-2022-41576, CVE-2022-37004, CVE-2022-39006, CVE-2021-22385, CVE-2021-22436, CVE-2023-4565, CVE-2021-22473, CVE-2021-40038, CVE-2021-40037, CVE-2021-22491, CVE-2023-39389, CVE-2022-37007, CVE-2021-37050, CVE-2021-37043, CVE-2023-49248, CVE-2021-40035, CVE-2022-34743, CVE-2021-37031, CVE-2023-39391, CVE-2022-44549, CVE-2023-46756, CVE-2021-37051, CVE-2022-31758, CVE-2021-22336, CVE-2021-37040, CVE-2021-46788, CVE-2023-39401, CVE-2022-34741, CVE-2022-41580, CVE-2023-44118, CVE-2021-22405, CVE-2023-46763, CVE-2021-22438, CVE-2022-41598, CVE-2023-52116, CVE-2021-22384, CVE-2022-38978, CVE-2022-46317, CVE-2021-46883, CVE-2023-39388, CVE-2021-37053, CVE-2021-22319, CVE-2021-22487, CVE-2021-22483, CVE-2022-41587, CVE-2023-49239, CVE-2021-22472, CVE-2021-39996, CVE-2022-41593, CVE-2020-9148, CVE-2022-41596, CVE-2021-40010, CVE-2021-22392, CVE-2022-48496, CVE-2021-36992, CVE-2021-40044, CVE-2021-36999, CVE-2023-1693, CVE-2022-34737, CVE-2022-44551, CVE-2021-40052, CVE-2022-41603, CVE-2022-41592, CVE-2021-37097, CVE-2023-52112, CVE-2023-44104, CVE-2021-22372, CVE-2022-46320, CVE-2021-22428, CVE-2022-44553, CVE-2022-46312, CVE-2022-48286, CVE-2021-46811, CVE-2021-22407, CVE-2023-52107, CVE-2022-46761, CVE-2021-46881, CVE-2021-22446, CVE-2021-22386, CVE-2022-48314, CVE-2021-37002, CVE-2021-40050, CVE-2021-37033, CVE-2023-52101, CVE-2021-40065, CVE-2021-22412, CVE-2023-39403, CVE-2021-22325, CVE-2023-39402, CVE-2021-22442, CVE-2021-46814, CVE-2021-22403, CVE-2021-37055, CVE-2022-34742, CVE-2022-47974, CVE-2021-37117, CVE-2022-44561, CVE-2020-9158, CVE-2021-36988, CVE-2022-46321, CVE-2021-39969, CVE-2021-36996, CVE-2022-31752, CVE-2022-22258, CVE-2022-44562, CVE-2021-37047, CVE-2022-48301, CVE-2021-22346, CVE-2021-39966, CVE-2021-22324, CVE-2021-37110, CVE-2022-37005, CVE-2021-40047, CVE-2021-46885, CVE-2021-22427, CVE-2023-39409, CVE-2021-46789, CVE-2021-37030, CVE-2022-48296, CVE-2022-31760, CVE-2022-48606, CVE-2022-31756, CVE-2023-1692, CVE-2022-41585, CVE-2022-39001, CVE-2023-49245, CVE-2023-44093, CVE-2022-41597, CVE-2023-26548, CVE-2021-22490, CVE-2021-40061, CVE-2021-46813, CVE-2021-22345, CVE-2021-40055, CVE-2021-22381, CVE-2021-22379, CVE-2021-46787, CVE-2022-48516, CVE-2020-9142, CVE-2022-39005, CVE-2022-48515 {}
heuristics/extracted_sars ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, ALC_TSU_EXT.1, ADV_FSP.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2
heuristics/extracted_versions 11.0 -
heuristics/protection_profiles c88af12926be2779, df09b703c88c665a cf0f01bcd7be3e9c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/report_filename cr_huawei_m40_emui11_v1.0_en.pdf anssi-cc-2019_20.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2019/20
    • cert_item: ST54J A01
    • cert_item_version: A01
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
    • developer: STMicroelectronics 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France Commanditaire STMicroelectronics 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/ATS/10/2020/RC: 25
  • FR:
    • ANSSI-CC-2019/20: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL2: 1
    • EAL4: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 2
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 3
    • ASE_REQ.1: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 17
  • STMicroelectronics:
    • STM: 10
    • STMicroelectronics: 2
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
  • Serma:
    • Serma Safety & Security: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 1
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
  • IBM:
    • SE: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 6
  • BSI:
    • AIS 31: 1
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20220120071420+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20220120071420+00'00'
  • /Title: Certification Report "Huawei Mate 40 Pro (M40 pro) with EMUI 11.0"
  • pdf_file_size_bytes: 469187
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /Author: RENNER Soline
  • /CreationDate: D:20190418171553+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.29
  • /ModDate: D:20190418171553+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: ST54J A01
  • /Title: ANSSI-CC-2019/20
  • pdf_file_size_bytes: 892903
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename st_huawei_m40_emui11_v1.0.pdf anssi-cible-cc-2019_20en.pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 10
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 65
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 1
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL5: 16
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 2
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 11
    • ASE_OBJ.2: 1
    • ASE_REQ: 30
    • ASE_REQ.2: 1
    • ASE_SPD: 8
    • ASE_SPD.1: 1
    • ASE_TSS: 7
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 2
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 2
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 3
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 2
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 2
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 6
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 12
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV_EXT: 3
    • FCS_SRV_EXT.1: 2
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 3
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 3
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 15
    • FCS_TLSC_EXT.1: 9
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACF_EXT: 3
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 2
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 3
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 2
    • FDP_PBA_EXT.1: 2
    • FDP_PBA_EXT.1.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 12
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 5
    • FIA_BMG_EXT.1.1: 5
    • FIA_BMG_EXT.1.2: 2
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 2
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 2
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 2
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 6
    • FIA_UAU_EXT.1: 2
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 2
    • FMT_SMF_EXT.2.1: 2
  • FPT:
    • FPT_AEX_EXT: 12
    • FPT_AEX_EXT.1: 2
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 2
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 2
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_JTA_EXT: 2
    • FPT_JTA_EXT.1: 2
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 2
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 2
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 2
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 2
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 9
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 9
    • FPT_TST_EXT.2.1: 2
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC_EXT: 9
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN.1: 8
    • FAU_SAR.1: 25
    • FAU_SAS: 2
    • FAU_SAS.1: 28
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 4
    • FCS_COP.1: 17
    • FCS_RNG: 2
    • FCS_RNG.1: 6
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.2: 12
    • FDP_ACF: 1
    • FDP_ACF.1: 28
    • FDP_IFC.1: 17
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ITT.1: 10
    • FDP_SDC: 2
    • FDP_SDC.1: 8
    • FDP_SDI.2: 14
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
    • FDP_UCT.1: 16
    • FDP_UIT.1: 16
  • FIA:
    • FIA_API: 2
    • FIA_API.1: 6
    • FIA_UAU.1: 14
    • FIA_UID.1: 16
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 29
    • FMT_LIM.2: 30
    • FMT_MSA.1: 26
    • FMT_MSA.3: 26
    • FMT_SMF.1: 21
    • FMT_SMR.1: 17
  • FPT:
    • FPT_FLS.1: 22
    • FPT_ITT.1: 9
    • FPT_PHP.3: 11
  • FRU:
    • FRU_FLT.2: 11
  • FTP:
    • FTP_ITC.1: 27
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.COMMS: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.STORAGE: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 3
    • T.NETWORK: 1
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED: 1
  • O:
    • O.C: 2
    • O.RND: 4
    • O.TOE-: 1
  • R:
    • R.O: 2
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 120
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 23
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 22
      • AES-: 2
      • AES-128: 1
      • AES-256: 7
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
  • AES_competition:
    • AES:
      • AES: 17
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 7
    • DES:
      • DES: 15
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 6
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 7
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 6
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • TLS:
    • TLS:
      • TLS: 45
      • TLS 1.2: 2
  • VPN:
    • VPN: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 9
  • RNG:
    • RND: 7
    • RNG: 6
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 2
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 10
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 1
    • Nescrypt: 7
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 25
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 13
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 14
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 2
  • other:
    • JIL: 53
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 7
  • other:
    • TEE: 13
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
  • ISO:
    • ISO/IEC 29147:2018: 1
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-38A: 3
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 186-4: 1
    • SP 800-108: 2
    • SP 800-132: 2
    • SP 800-38F: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 5216: 1
    • RFC 5246: 2
    • RFC 5280: 5
    • RFC 5289: 12
    • RFC 5759: 2
    • RFC 6125: 1
    • RFC5246: 2
  • X509:
    • X.509: 7
  • BSI:
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 23
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS PUB 197: 3
  • ISO:
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-67: 3
    • SP 800-38A: 2
    • SP 800-67: 1
  • PKCS:
    • PKCS #1: 2
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
    • out of scope: 1
  • OutOfScope:
    • The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation: 1
    • The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1: 1
    • ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation: 1
    • Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE: 1
    • out of scope: 2
pdf_data/st_metadata
  • /CreationDate: D:20220118130640Z00'00'
  • /Creator: Word
  • /ModDate: D:20220118130640Z00'00'
  • /Producer: macOS Version 11.6.1 (Build 20G224) Quartz PDFContext
  • /Title: Microsoft Word - Huawei EMUI 11.0 M40 Pro_MDFPP31_ST v1.0.docx
  • pdf_file_size_bytes: 1739846
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
  • /Author: Christiane DROULERS
  • /CreationDate: D:20190325175557Z
  • /Creator: FrameMaker 11.0
  • /ModDate: D:20190325180544+01'00'
  • /Producer: Acrobat Elements 10.0.0 (Windows)
  • /Title: SMD_ST54J_VA01_3P.book
  • pdf_file_size_bytes: 768214
  • pdf_hyperlinks: http://www.st.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 80
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different