Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Valari Web Application Firewall v10.3.11
ISCB-3-RPT-C083-CR-v1
Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
OCSI/CERT/ATS/10/2020/RC
name Valari Web Application Firewall v10.3.11 Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
category Boundary Protection Devices and Systems Mobility
scheme MY IT
status archived active
not_valid_after 24.11.2022 20.01.2027
not_valid_before 24.11.2017 20.01.2022
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C083-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_huawei_m40_emui11_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Valari_Security_Target_0.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_huawei_m40_emui11_v1.0.pdf
manufacturer Kaapagam Technologies Sdn. Bhd. Huawei Device Co., Ltd.
manufacturer_web https://www.kaapagamtech.com/ https://www.huawei.com/
security_level EAL2 {}
dgst 572478fcd6b79542 4646e2bd9bf0b59d
heuristics/cert_id ISCB-3-RPT-C083-CR-v1 OCSI/CERT/ATS/10/2020/RC
heuristics/cpe_matches {} cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*, cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-37029, CVE-2023-52098, CVE-2021-40051, CVE-2022-41581, CVE-2021-37041, CVE-2023-39387, CVE-2023-41296, CVE-2021-37021, CVE-2021-22351, CVE-2021-37103, CVE-2022-38979, CVE-2022-41591, CVE-2021-40034, CVE-2022-41588, CVE-2021-22415, CVE-2022-22256, CVE-2021-40030, CVE-2021-22347, CVE-2020-9149, CVE-2021-39993, CVE-2021-22443, CVE-2022-48513, CVE-2022-41578, CVE-2022-31755, CVE-2021-37074, CVE-2022-34738, CVE-2022-31762, CVE-2022-48291, CVE-2021-37111, CVE-2021-22426, CVE-2020-9140, CVE-2023-39405, CVE-2022-48480, CVE-2021-36990, CVE-2021-22447, CVE-2022-48293, CVE-2022-48302, CVE-2022-31751, CVE-2021-22348, CVE-2023-52113, CVE-2021-37001, CVE-2023-39382, CVE-2021-22371, CVE-2022-39000, CVE-2021-40045, CVE-2021-22333, CVE-2023-39381, CVE-2022-39003, CVE-2023-46764, CVE-2021-46882, CVE-2021-37034, CVE-2021-22334, CVE-2021-22316, CVE-2021-36985, CVE-2021-22367, CVE-2021-36997, CVE-2022-37003, CVE-2023-34163, CVE-2022-44559, CVE-2023-44119, CVE-2021-40039, CVE-2021-22429, CVE-2023-49243, CVE-2023-39408, CVE-2021-22391, CVE-2021-22430, CVE-2021-39973, CVE-2022-34740, CVE-2021-22349, CVE-2022-39004, CVE-2022-44560, CVE-2023-26549, CVE-2021-22335, CVE-2021-22374, CVE-2021-22444, CVE-2021-46786, CVE-2022-41599, CVE-2022-34739, CVE-2021-37119, CVE-2022-48517, CVE-2023-52108, CVE-2022-48491, CVE-2023-49246, CVE-2022-44550, CVE-2021-22448, CVE-2023-49242, CVE-2021-40064, CVE-2022-31757, CVE-2020-9139, CVE-2021-22481, CVE-2022-41594, CVE-2021-46886, CVE-2021-39998, CVE-2022-31753, CVE-2021-36995, CVE-2022-48357, CVE-2021-22387, CVE-2021-22485, CVE-2022-48359, CVE-2022-44552, CVE-2021-37027, CVE-2021-22369, CVE-2022-22252, CVE-2022-48292, CVE-2021-36993, CVE-2021-22486, CVE-2021-40049, CVE-2021-37049, CVE-2022-44563, CVE-2021-22402, CVE-2023-52114, CVE-2021-46839, CVE-2021-40009, CVE-2022-48349, CVE-2021-46887, CVE-2023-39398, CVE-2022-41586, CVE-2021-22375, CVE-2023-31225, CVE-2023-26547, CVE-2021-22343, CVE-2022-41600, CVE-2022-48300, CVE-2021-36987, CVE-2022-46319, CVE-2023-44105, CVE-2021-37046, CVE-2023-46774, CVE-2021-22317, CVE-2021-40013, CVE-2021-22482, CVE-2021-37032, CVE-2021-22388, CVE-2021-22434, CVE-2021-40048, CVE-2021-36991, CVE-2021-22406, CVE-2021-37044, CVE-2021-37042, CVE-2021-22389, CVE-2022-37002, CVE-2021-22344, CVE-2021-40012, CVE-2021-22322, CVE-2023-1691, CVE-2022-48295, CVE-2021-22308, CVE-2022-22254, CVE-2021-37093, CVE-2022-48488, CVE-2021-22404, CVE-2022-48346, CVE-2022-31759, CVE-2023-46758, CVE-2021-22445, CVE-2021-22390, CVE-2021-40029, CVE-2021-22350, CVE-2021-37069, CVE-2021-37035, CVE-2022-48287, CVE-2022-44555, CVE-2023-44098, CVE-2021-46742, CVE-2023-44103, CVE-2023-52102, CVE-2023-39399, CVE-2021-40063, CVE-2023-44106, CVE-2022-44557, CVE-2023-34156, CVE-2022-48294, CVE-2021-22337, CVE-2021-36998, CVE-2021-22323, CVE-2020-9146, CVE-2020-9144, CVE-2023-34167, CVE-2023-44116, CVE-2021-37039, CVE-2023-41305, CVE-2021-22435, CVE-2022-38983, CVE-2023-1695, CVE-2023-46765, CVE-2021-22431, CVE-2021-40020, CVE-2023-34166, CVE-2021-46741, CVE-2021-22313, CVE-2021-22433, CVE-2022-44558, CVE-2021-40011, CVE-2021-37052, CVE-2022-34735, CVE-2021-36986, CVE-2021-22354, CVE-2023-46772, CVE-2022-34736, CVE-2021-40015, CVE-2021-36994, CVE-2023-41300, CVE-2021-36989, CVE-2021-22373, CVE-2023-44112, CVE-2021-40053, CVE-2021-22475, CVE-2021-37020, CVE-2023-39395, CVE-2023-39383, CVE-2021-46840, CVE-2021-37114, CVE-2022-48507, CVE-2022-22253, CVE-2023-41310, CVE-2021-46884, CVE-2022-48494, CVE-2021-37037, CVE-2022-22257, CVE-2021-22370, CVE-2022-37008, CVE-2021-22474, CVE-2021-40017, CVE-2021-40031, CVE-2023-52099, CVE-2023-34161, CVE-2022-41582, CVE-2023-46759, CVE-2021-40059, CVE-2021-22352, CVE-2021-22394, CVE-2022-48508, CVE-2023-1696, CVE-2023-39400, CVE-2022-38997, CVE-2020-9147, CVE-2022-39002, CVE-2023-1694, CVE-2022-41595, CVE-2022-44548, CVE-2022-41601, CVE-2021-40026, CVE-2021-22488, CVE-2021-40016, CVE-2023-6273, CVE-2021-22401, CVE-2021-22353, CVE-2022-46318, CVE-2021-40040, CVE-2022-41602, CVE-2023-44100, CVE-2022-41584, CVE-2023-49240, CVE-2020-36600, CVE-2021-40054, CVE-2021-22432, CVE-2021-22395, CVE-2023-49241, CVE-2022-31761, CVE-2022-41576, CVE-2022-37004, CVE-2022-39006, CVE-2021-22385, CVE-2021-22436, CVE-2023-4565, CVE-2021-22473, CVE-2021-40038, CVE-2021-40037, CVE-2021-22491, CVE-2023-39389, CVE-2022-37007, CVE-2021-37050, CVE-2021-37043, CVE-2023-49248, CVE-2021-40035, CVE-2022-34743, CVE-2021-37031, CVE-2023-39391, CVE-2022-44549, CVE-2023-46756, CVE-2021-37051, CVE-2022-31758, CVE-2021-22336, CVE-2021-37040, CVE-2021-46788, CVE-2023-39401, CVE-2022-34741, CVE-2022-41580, CVE-2023-44118, CVE-2021-22405, CVE-2023-46763, CVE-2021-22438, CVE-2022-41598, CVE-2023-52116, CVE-2021-22384, CVE-2022-38978, CVE-2022-46317, CVE-2021-46883, CVE-2023-39388, CVE-2021-37053, CVE-2021-22319, CVE-2021-22487, CVE-2021-22483, CVE-2022-41587, CVE-2023-49239, CVE-2021-22472, CVE-2021-39996, CVE-2022-41593, CVE-2020-9148, CVE-2022-41596, CVE-2021-40010, CVE-2021-22392, CVE-2022-48496, CVE-2021-36992, CVE-2021-40044, CVE-2021-36999, CVE-2023-1693, CVE-2022-34737, CVE-2022-44551, CVE-2021-40052, CVE-2022-41603, CVE-2022-41592, CVE-2021-37097, CVE-2023-52112, CVE-2023-44104, CVE-2021-22372, CVE-2022-46320, CVE-2021-22428, CVE-2022-44553, CVE-2022-46312, CVE-2022-48286, CVE-2021-46811, CVE-2021-22407, CVE-2023-52107, CVE-2022-46761, CVE-2021-46881, CVE-2021-22446, CVE-2021-22386, CVE-2022-48314, CVE-2021-37002, CVE-2021-40050, CVE-2021-37033, CVE-2023-52101, CVE-2021-40065, CVE-2021-22412, CVE-2023-39403, CVE-2021-22325, CVE-2023-39402, CVE-2021-22442, CVE-2021-46814, CVE-2021-22403, CVE-2021-37055, CVE-2022-34742, CVE-2022-47974, CVE-2021-37117, CVE-2022-44561, CVE-2020-9158, CVE-2021-36988, CVE-2022-46321, CVE-2021-39969, CVE-2021-36996, CVE-2022-31752, CVE-2022-22258, CVE-2022-44562, CVE-2021-37047, CVE-2022-48301, CVE-2021-22346, CVE-2021-39966, CVE-2021-22324, CVE-2021-37110, CVE-2022-37005, CVE-2021-40047, CVE-2021-46885, CVE-2021-22427, CVE-2023-39409, CVE-2021-46789, CVE-2021-37030, CVE-2022-48296, CVE-2022-31760, CVE-2022-48606, CVE-2022-31756, CVE-2023-1692, CVE-2022-41585, CVE-2022-39001, CVE-2023-49245, CVE-2023-44093, CVE-2022-41597, CVE-2023-26548, CVE-2021-22490, CVE-2021-40061, CVE-2021-46813, CVE-2021-22345, CVE-2021-40055, CVE-2021-22381, CVE-2021-22379, CVE-2021-46787, CVE-2022-48516, CVE-2020-9142, CVE-2022-39005, CVE-2022-48515
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, ALC_TSU_EXT.1, ADV_FSP.1
heuristics/extracted_versions 10.3.11 11.0
heuristics/scheme_data
  • cert_no: 2017-009-C083
  • certification_date: 24.11.2017
  • developer: Kaapagam Technologies Sdn Bhd.
  • enhanced:
    • assurance_level: EAL2
    • category: Boundary Protection Devices and Systems
    • cert_id: C083
    • certification_date: 24.11.2017
    • developer: B15-15, I-SOVO@I-City No. 6, Persiaran Multimedia, Section 7 40000 Shah Alam, Selangor Darul Ehsan URL: Valari Web Application Firewall Email: [email protected] Phone: +603 8992 3172
    • expiration_date: 24.11.2022
    • mutual_recognition: CCRA
    • product: Valari Web Application Firewall v10.3.11
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/ISCB-5-RPT-C083-CR-v1.pdf
    • scope: The TOE is designed to secure web applications from the attacks and provide a security layer by proxy-ing all HTTP(S) traffic and shield web servers and databases from direct access of the attackers irrespective of the underlying application vulnerabilities. The TOE primary features include: Identification and Authentication: The TOE enables audit functionality to tracks all activities within the TOE boundary network inclusive of its own operations as TOE Application Server. User Data Protection: The TOE protects the web application from external network intrusions by using information flow control between internal and external network. The TOE will log all HTTP requests and responses before allowing or rejecting the HTTP requests. Security Management: TOE functions can be managed through command-line interface. The TOE only allows limited user access to run a limited set of commands. These do not affect the running mode of the TOE. Security Audit: The TOE will generate audit records for HTTP Request and responses. Each audited events will be recorded along with date and time of event, source IP, account user who performed the event, event name, system filename related to event and other event details.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/Valari_Security_Target_0.5.pdf
    • type: Boundary Protection Devices and Systems
  • expiration_date: 24.11.2022
  • level: EAL2
  • product: Valari Web Application Firewall v10.3.11
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/58
heuristics/protection_profiles {} c88af12926be2779, df09b703c88c665a
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf
pdf_data/report_filename ISCB-5-RPT-C083-CR-v1.pdf cr_huawei_m40_emui11_v1.0_en.pdf
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C083-CR-v1: 33
  • IT:
    • OCSI/CERT/ATS/10/2020/RC: 25
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 7
  • EAL:
    • EAL1: 1
    • EAL2: 1
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 3
    • ASE_REQ.1: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 3
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 17
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 10
  • TLS:
    • SSL:
      • SSL: 1
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 6
pdf_data/report_metadata
  • /Author: ISCB Department
  • /CreationDate: D:20171204082900+00'00'
  • /Creator: Microsoft Word
  • /Keywords: MyCB_TMP_002
  • /ModDate: D:20171204082900+00'00'
  • /Subject: Valari Web Application Firewall v10.3.11
  • /Title: C083 Certification Report
  • pdf_file_size_bytes: 983010
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author: OCSI
  • /CreationDate: D:20220120071420+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20220120071420+00'00'
  • /Title: Certification Report "Huawei Mate 40 Pro (M40 pro) with EMUI 11.0"
  • pdf_file_size_bytes: 469187
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename Valari_Security_Target_0.5.pdf st_huawei_m40_emui11_v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.3: 15
    • FAU_GEN.3.1: 2
    • FAU_GEN.3.2: 2
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 2
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 3
    • FMT_MSA.5: 12
    • FMT_MSA.5.1: 2
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
    • FPT_STM.2: 1
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 2
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 2
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 3
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 2
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 2
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 6
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 12
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV_EXT: 3
    • FCS_SRV_EXT.1: 2
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 3
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 3
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 15
    • FCS_TLSC_EXT.1: 9
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACF_EXT: 3
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 2
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 3
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 2
    • FDP_PBA_EXT.1: 2
    • FDP_PBA_EXT.1.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 12
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 5
    • FIA_BMG_EXT.1.1: 5
    • FIA_BMG_EXT.1.2: 2
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 2
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 2
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 2
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 6
    • FIA_UAU_EXT.1: 2
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 2
    • FMT_SMF_EXT.2.1: 2
  • FPT:
    • FPT_AEX_EXT: 12
    • FPT_AEX_EXT.1: 2
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 2
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 2
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_JTA_EXT: 2
    • FPT_JTA_EXT.1: 2
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 2
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 2
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 2
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 2
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 9
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 9
    • FPT_TST_EXT.2.1: 2
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC_EXT: 9
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.CONFIGRULE: 2
    • A.CONN: 2
    • A.FLOW: 2
    • A.KEY: 2
    • A.PHY: 2
    • A.TIME: 1
    • A.TIMEBACK: 1
  • O:
    • O.ACCESSLOG: 3
    • O.AUDIT: 3
    • O.CONFIG: 4
    • O.EXPLOIT: 3
    • O.NOAUTH: 3
  • OE:
    • OE.ADMIN: 2
    • OE.CONFIGRULE: 2
    • OE.CONN: 3
    • OE.FLOW: 2
    • OE.KEY: 3
    • OE.PHY: 2
    • OE.TIMEBACK: 2
  • T:
    • T.ACCESSLOG: 2
    • T.AUDIT: 2
    • T.CONFIG: 2
    • T.EXPLOIT: 2
    • T.NOAUTH: 2
    • T.REMOTE: 2
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.COMMS: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.STORAGE: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 3
    • T.NETWORK: 1
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED: 1
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 120
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 22
      • AES-: 2
      • AES-128: 1
      • AES-256: 7
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 6
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 7
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 6
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 15
  • TLS:
    • SSL:
      • SSL: 1
  • IPsec:
    • IPsec: 2
  • TLS:
    • TLS:
      • TLS: 45
      • TLS 1.2: 2
  • VPN:
    • VPN: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 9
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 10
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 25
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 7
  • other:
    • TEE: 13
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
  • ISO:
    • ISO/IEC 29147:2018: 1
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-38A: 3
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 186-4: 1
    • SP 800-108: 2
    • SP 800-132: 2
    • SP 800-38F: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 5216: 1
    • RFC 5246: 2
    • RFC 5280: 5
    • RFC 5289: 12
    • RFC 5759: 2
    • RFC 6125: 1
    • RFC5246: 2
  • X509:
    • X.509: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: AD
  • /CreationDate: D:20171102074055Z00'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171102074055Z00'00'
  • /Producer: Mac OS X 10.11.4 Quartz PDFContext
  • /Subject: Valari Security Target
  • pdf_file_size_bytes: 525664
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /CreationDate: D:20220118130640Z00'00'
  • /Creator: Word
  • /ModDate: D:20220118130640Z00'00'
  • /Producer: macOS Version 11.6.1 (Build 20G224) Quartz PDFContext
  • /Title: Microsoft Word - Huawei EMUI 11.0 M40 Pro_MDFPP31_ST v1.0.docx
  • pdf_file_size_bytes: 1739846
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different