Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MX-FR15 Version C.10
JISEC-CC-CRP-C0255
Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
OCSI/CERT/ATS/10/2020/RC
name MX-FR15 Version C.10 Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
category Other Devices and Systems Mobility
scheme JP IT
status archived active
not_valid_after 02.06.2015 20.01.2027
not_valid_before 26.05.2010 20.01.2022
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_huawei_m40_emui11_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_huawei_m40_emui11_v1.0.pdf
manufacturer Sharp Corporation Huawei Device Co., Ltd.
manufacturer_web https://sharp-world.com/ https://www.huawei.com/
security_level EAL3 {}
dgst 630ebe8ce3aab74e 4646e2bd9bf0b59d
heuristics/cert_id JISEC-CC-CRP-C0255 OCSI/CERT/ATS/10/2020/RC
heuristics/cpe_matches {} cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*, cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-40012, CVE-2021-37069, CVE-2022-41597, CVE-2022-34742, CVE-2022-44559, CVE-2023-6273, CVE-2021-37033, CVE-2021-22322, CVE-2021-22373, CVE-2021-46789, CVE-2021-40039, CVE-2021-22308, CVE-2021-37020, CVE-2022-31758, CVE-2021-22475, CVE-2022-48300, CVE-2021-40026, CVE-2021-22438, CVE-2021-40029, CVE-2022-37007, CVE-2021-40053, CVE-2021-40050, CVE-2022-41593, CVE-2022-38978, CVE-2023-41310, CVE-2021-22374, CVE-2021-46885, CVE-2021-22337, CVE-2020-9146, CVE-2021-22394, CVE-2021-37032, CVE-2023-46772, CVE-2021-22474, CVE-2020-9144, CVE-2023-39388, CVE-2022-41582, CVE-2021-22487, CVE-2023-39403, CVE-2021-22448, CVE-2021-22345, CVE-2022-44549, CVE-2022-31751, CVE-2023-44112, CVE-2022-48292, CVE-2022-38983, CVE-2021-22323, CVE-2021-22490, CVE-2023-46765, CVE-2023-1691, CVE-2021-22392, CVE-2021-22430, CVE-2021-36991, CVE-2023-52107, CVE-2023-34156, CVE-2021-40059, CVE-2021-22386, CVE-2021-46884, CVE-2021-36988, CVE-2021-22427, CVE-2022-44548, CVE-2022-48507, CVE-2021-37035, CVE-2022-41578, CVE-2022-31760, CVE-2023-26549, CVE-2021-37093, CVE-2021-46814, CVE-2021-40045, CVE-2021-22407, CVE-2022-48606, CVE-2023-52114, CVE-2021-22352, CVE-2021-22385, CVE-2021-37041, CVE-2021-46787, CVE-2022-48291, CVE-2023-39383, CVE-2020-9140, CVE-2021-37040, CVE-2021-40038, CVE-2022-37004, CVE-2023-44104, CVE-2022-41596, CVE-2023-31225, CVE-2022-39003, CVE-2021-22388, CVE-2021-22343, CVE-2021-22384, CVE-2022-34736, CVE-2021-37052, CVE-2021-40020, CVE-2021-22351, CVE-2023-39382, CVE-2021-22334, CVE-2021-22445, CVE-2021-40015, CVE-2021-40040, CVE-2022-22257, CVE-2021-37049, CVE-2022-41592, CVE-2022-44557, CVE-2021-22333, CVE-2021-40049, CVE-2023-52113, CVE-2022-44561, CVE-2021-37043, CVE-2021-39993, CVE-2021-40052, CVE-2021-37074, CVE-2021-36992, CVE-2021-40044, CVE-2022-48314, CVE-2021-37042, CVE-2021-46886, CVE-2021-22369, CVE-2022-34741, CVE-2021-22485, CVE-2021-39966, CVE-2021-40061, CVE-2022-37002, CVE-2021-46882, CVE-2022-41585, CVE-2022-22254, CVE-2021-22404, CVE-2021-39969, CVE-2021-22350, CVE-2023-1693, CVE-2022-38997, CVE-2022-48293, CVE-2022-48287, CVE-2021-22473, CVE-2022-31759, CVE-2021-36999, CVE-2023-39405, CVE-2021-37034, CVE-2021-40047, CVE-2021-22434, CVE-2021-22347, CVE-2022-22256, CVE-2021-46742, CVE-2023-49248, CVE-2021-40063, CVE-2023-44119, CVE-2021-40016, CVE-2021-22401, CVE-2023-49239, CVE-2021-37053, CVE-2021-37046, CVE-2021-22344, CVE-2021-40065, CVE-2022-34743, CVE-2022-41576, CVE-2022-37003, CVE-2022-41594, CVE-2022-37008, CVE-2023-39408, CVE-2022-41599, CVE-2023-39409, CVE-2021-36987, CVE-2021-22375, CVE-2022-48295, CVE-2022-48513, CVE-2021-40055, CVE-2021-22444, CVE-2020-9139, CVE-2023-46764, CVE-2021-22402, CVE-2021-22491, CVE-2023-34167, CVE-2022-41603, CVE-2021-22370, CVE-2020-9147, CVE-2020-9148, CVE-2022-22252, CVE-2022-47974, CVE-2023-46774, CVE-2023-52116, CVE-2023-52098, CVE-2023-52101, CVE-2022-46317, CVE-2023-39389, CVE-2021-40013, CVE-2021-37027, CVE-2022-41598, CVE-2022-41581, CVE-2022-48517, CVE-2022-41595, CVE-2023-34163, CVE-2022-38979, CVE-2023-46756, CVE-2021-46883, CVE-2022-41584, CVE-2023-39401, CVE-2021-36990, CVE-2023-26548, CVE-2022-31762, CVE-2022-48488, CVE-2021-39973, CVE-2022-31755, CVE-2022-44563, CVE-2021-22406, CVE-2023-52102, CVE-2023-39391, CVE-2021-40010, CVE-2023-39395, CVE-2023-41305, CVE-2021-22371, CVE-2021-22367, CVE-2021-37111, CVE-2021-40034, CVE-2022-41580, CVE-2023-49246, CVE-2023-44100, CVE-2021-36998, CVE-2021-22415, CVE-2021-37097, CVE-2021-22446, CVE-2021-37047, CVE-2021-37050, CVE-2021-37055, CVE-2022-48515, CVE-2022-37005, CVE-2021-36985, CVE-2022-44555, CVE-2023-46763, CVE-2022-46318, CVE-2021-22354, CVE-2021-37030, CVE-2021-46839, CVE-2021-37039, CVE-2021-22319, CVE-2021-22353, CVE-2022-48491, CVE-2022-48516, CVE-2021-40030, CVE-2022-39005, CVE-2021-40011, CVE-2022-48346, CVE-2022-46761, CVE-2022-46312, CVE-2022-41600, CVE-2021-39998, CVE-2022-44562, CVE-2022-48494, CVE-2023-44106, CVE-2021-36995, CVE-2023-39381, CVE-2021-22390, CVE-2021-22379, CVE-2021-37110, CVE-2021-37037, CVE-2021-46786, CVE-2022-48496, CVE-2023-52108, CVE-2022-34735, CVE-2022-48302, CVE-2022-31752, CVE-2021-22482, CVE-2023-49241, CVE-2023-49243, CVE-2021-40037, CVE-2021-22442, CVE-2023-34161, CVE-2022-31757, CVE-2023-1694, CVE-2021-37002, CVE-2022-41591, CVE-2023-44118, CVE-2021-36989, CVE-2022-39001, CVE-2021-36996, CVE-2022-41587, CVE-2022-22258, CVE-2022-41586, CVE-2022-48296, CVE-2022-39000, CVE-2022-39006, CVE-2021-40054, CVE-2021-22313, CVE-2021-46887, CVE-2021-22481, CVE-2021-37117, CVE-2021-22317, CVE-2021-37029, CVE-2022-39002, CVE-2021-22389, CVE-2023-41296, CVE-2022-48349, CVE-2021-46788, CVE-2021-22433, CVE-2021-22488, CVE-2023-44116, CVE-2023-39387, CVE-2022-31756, CVE-2021-22447, CVE-2023-39398, CVE-2022-44550, CVE-2023-52099, CVE-2020-9142, CVE-2021-46811, CVE-2023-1695, CVE-2021-37021, CVE-2022-31753, CVE-2021-37119, CVE-2022-31761, CVE-2023-39400, CVE-2023-39399, CVE-2021-40031, CVE-2021-22372, CVE-2021-22405, CVE-2021-22316, CVE-2021-22381, CVE-2023-44093, CVE-2020-36600, CVE-2021-36994, CVE-2021-22349, CVE-2021-22335, CVE-2023-46759, CVE-2022-48508, CVE-2021-22324, CVE-2022-44553, CVE-2023-4565, CVE-2021-22472, CVE-2023-44098, CVE-2021-22443, CVE-2021-22412, CVE-2022-39004, CVE-2022-48294, CVE-2021-40051, CVE-2023-26547, CVE-2022-44552, CVE-2021-40048, CVE-2021-22486, CVE-2023-44105, CVE-2022-34740, CVE-2022-48357, CVE-2023-34166, CVE-2022-34739, CVE-2020-9158, CVE-2021-22431, CVE-2023-49242, CVE-2021-46881, CVE-2021-22325, CVE-2022-46319, CVE-2023-52112, CVE-2021-22403, CVE-2023-44103, CVE-2021-22483, CVE-2021-22426, CVE-2022-41588, CVE-2021-46813, CVE-2021-37114, CVE-2022-48286, CVE-2022-34737, CVE-2021-22387, CVE-2021-22391, CVE-2021-37044, CVE-2021-40017, CVE-2021-40009, CVE-2023-41300, CVE-2022-46321, CVE-2023-49240, CVE-2022-48480, CVE-2021-46840, CVE-2021-46741, CVE-2021-22395, CVE-2022-48359, CVE-2023-46758, CVE-2022-48301, CVE-2023-1696, CVE-2023-49245, CVE-2021-36986, CVE-2021-22336, CVE-2022-34738, CVE-2021-22435, CVE-2022-41601, CVE-2021-37001, CVE-2021-37051, CVE-2022-44551, CVE-2022-44558, CVE-2023-1692, CVE-2021-22428, CVE-2021-37103, CVE-2021-36997, CVE-2022-41602, CVE-2021-37031, CVE-2021-22348, CVE-2021-40064, CVE-2022-46320, CVE-2021-40035, CVE-2021-22346, CVE-2020-9149, CVE-2022-44560, CVE-2022-22253, CVE-2021-22429, CVE-2021-36993, CVE-2023-39402, CVE-2021-22436, CVE-2021-39996, CVE-2021-22432
heuristics/extracted_sars ADV_ARC.1, ALC_DVS.1, ASE_OBJ.2, ALC_CMS.3, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ALC_DEL.1, ATE_FUN.1, ALC_CMC.3, ATE_DPT.1, AVA_VAN.2, ADV_FSP.3, ADV_TDS.2, ATE_COV.2, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, ASE_CCL.1, AGD_OPE.1 ASE_SPD.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, ASE_OBJ.1, ALC_TSU_EXT.1, ATE_IND.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, ASE_INT.1, ALC_CMC.1
heuristics/extracted_versions 10 11.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0255
  • certification_date: 01.05.2010
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0255_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as "MFD"). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. TOE security functionality To counter attempts to steal image data in an MFD, the TOE provides such security functions as: - The cryptographic operation function: Encrypts the image data that the MFD manages before storing to the Flash memory in the MFD, - The data clear function: Overwrites random or fixed values over the storage area that the spooled image data occupy in the volatile memory and Flash memory in the MFD.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: MX-FR15
    • product_type: Data protection function in Multi Function Device
    • report_link: https://www.ipa.go.jp/en/security/c0255_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0255_est.pdf
    • toe_version: C.10
    • vendor: Sharp Corporation
  • expiration_date: 01.06.2015
  • supplier: Sharp Corporation
  • toe_japan_name: MX-FR15 C.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0255_it9273.html
  • toe_overseas_name: MX-FR15 C.10
  • certification_date: 20.01.2022
  • level: conforme a PP_MD_V3.1
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/huawei/cr_huawei_m40_emui11_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/huawei/rc_huawei_m40_emui11_v1.0_it.pdf
  • supplier: Huawei Device Co., Ltd.
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/huawei/st_huawei_m40_emui11_v1.0.pdf
  • title: Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
heuristics/protection_profiles {} c88af12926be2779, df09b703c88c665a
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf
pdf_data/report_filename c0255_erpt.pdf cr_huawei_m40_emui11_v1.0_en.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0255-01: 1
    • Certification No. C0255: 1
  • IT:
    • OCSI/CERT/ATS/10/2020/RC: 25
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL1: 1
    • EAL2: 1
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 3
    • ASE_REQ.1: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.OPERATOR: 1
  • T:
    • T.RECOVER: 4
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 17
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • atsec:
    • atsec: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
    • Rijndael:
      • Rijndael: 1
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 6
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110530111145+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110530111242+09'00'
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 441982
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 21
  • /Author: OCSI
  • /CreationDate: D:20220120071420+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20220120071420+00'00'
  • /Title: Certification Report "Huawei Mate 40 Pro (M40 pro) with EMUI 11.0"
  • pdf_file_size_bytes: 469187
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename c0255_est.pdf st_huawei_m40_emui11_v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 2
    • FDP_ITC.2: 1
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 11
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 2
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 2
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 3
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 2
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 2
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 6
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 12
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV_EXT: 3
    • FCS_SRV_EXT.1: 2
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 3
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 3
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 15
    • FCS_TLSC_EXT.1: 9
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACF_EXT: 3
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 2
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 3
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 2
    • FDP_PBA_EXT.1: 2
    • FDP_PBA_EXT.1.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 12
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 5
    • FIA_BMG_EXT.1.1: 5
    • FIA_BMG_EXT.1.2: 2
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 2
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 2
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 2
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 6
    • FIA_UAU_EXT.1: 2
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 2
    • FMT_SMF_EXT.2.1: 2
  • FPT:
    • FPT_AEX_EXT: 12
    • FPT_AEX_EXT.1: 2
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 2
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 2
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_JTA_EXT: 2
    • FPT_JTA_EXT.1: 2
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 2
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 2
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 2
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 2
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 9
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 9
    • FPT_TST_EXT.2.1: 2
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC_EXT: 9
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.OPERATOR: 6
  • O:
    • O.MANAGE: 7
    • O.REMOVE: 7
    • O.RESIDUAL: 8
  • OE:
    • OE.ERASEALL: 3
    • OE.OPERATE: 3
  • T:
    • T.RECOVER: 6
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.COMMS: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.STORAGE: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 3
    • T.NETWORK: 1
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Huawei:
    • Huawei: 120
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
    • Rijndael:
      • Rijndael: 3
  • AES_competition:
    • AES:
      • AES: 22
      • AES-: 2
      • AES-128: 1
      • AES-256: 7
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 6
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 7
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 6
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • TLS:
    • TLS:
      • TLS: 45
      • TLS 1.2: 2
  • VPN:
    • VPN: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 9
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 10
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 25
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 7
  • other:
    • TEE: 13
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 646: 4
  • FIPS:
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
  • ISO:
    • ISO/IEC 29147:2018: 1
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-38A: 3
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 186-4: 1
    • SP 800-108: 2
    • SP 800-132: 2
    • SP 800-38F: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 5216: 1
    • RFC 5246: 2
    • RFC 5280: 5
    • RFC 5289: 12
    • RFC 5759: 2
    • RFC 6125: 1
    • RFC5246: 2
  • X509:
    • X.509: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: K.Nakagawa
  • /Company: Sharp Corporation
  • /CreationDate: D:20110525112546+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /GTS_PDFXConformance: PDF/X-1a:2001
  • /GTS_PDFXVersion: PDF/X-1:2001
  • /ModDate: D:20110526173154+09'00'
  • /Producer: Acrobat Distiller 8.2.6 (Windows)
  • /Subject: MX-FR15
  • /Title: Security Target
  • /Trapped: /False
  • pdf_file_size_bytes: 797003
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 24
  • /CreationDate: D:20220118130640Z00'00'
  • /Creator: Word
  • /ModDate: D:20220118130640Z00'00'
  • /Producer: macOS Version 11.6.1 (Build 20G224) Quartz PDFContext
  • /Title: Microsoft Word - Huawei EMUI 11.0 M40 Pro_MDFPP31_ST v1.0.docx
  • pdf_file_size_bytes: 1739846
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different