Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei Mobile Devices (P40 series) with EMUI 11.0
OCSI/CERT/ATS/06/2020/RC
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Library including specific IC Dedicated Software
ANSSI-CC-2020/12
name Huawei Mobile Devices (P40 series) with EMUI 11.0 S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Library including specific IC Dedicated Software
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme IT FR
status active archived
not_valid_after 27.10.2026 03.03.2025
not_valid_before 27.10.2021 03.03.2020
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_huawei_p40_emui11_v1.0_en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_12.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_huawei_p40_emui11_v1.11.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_12en.pdf
manufacturer Huawei Device Co., Ltd. Samsung
manufacturer_web https://www.huawei.com/ https://www.samsung.com/
security_level {} EAL6+, ASE_TSS.2
dgst ba3faf4e8ec21084 69a3e097d69e074d
heuristics/cert_id OCSI/CERT/ATS/06/2020/RC ANSSI-CC-2020/12
heuristics/cert_lab [] CEA
heuristics/cpe_matches cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*, cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2021-37029, CVE-2023-52098, CVE-2021-40051, CVE-2022-41581, CVE-2021-37041, CVE-2023-39387, CVE-2023-41296, CVE-2021-37021, CVE-2021-22351, CVE-2021-37103, CVE-2022-38979, CVE-2022-41591, CVE-2021-40034, CVE-2022-41588, CVE-2021-22415, CVE-2022-22256, CVE-2021-40030, CVE-2021-22347, CVE-2020-9149, CVE-2021-39993, CVE-2021-22443, CVE-2022-48513, CVE-2022-41578, CVE-2022-31755, CVE-2021-37074, CVE-2022-34738, CVE-2022-31762, CVE-2022-48291, CVE-2021-37111, CVE-2021-22426, CVE-2020-9140, CVE-2023-39405, CVE-2022-48480, CVE-2021-36990, CVE-2021-22447, CVE-2022-48293, CVE-2022-48302, CVE-2022-31751, CVE-2021-22348, CVE-2023-52113, CVE-2021-37001, CVE-2023-39382, CVE-2021-22371, CVE-2022-39000, CVE-2021-40045, CVE-2021-22333, CVE-2023-39381, CVE-2022-39003, CVE-2023-46764, CVE-2021-46882, CVE-2021-37034, CVE-2021-22334, CVE-2021-22316, CVE-2021-36985, CVE-2021-22367, CVE-2021-36997, CVE-2022-37003, CVE-2023-34163, CVE-2022-44559, CVE-2023-44119, CVE-2021-40039, CVE-2021-22429, CVE-2023-49243, CVE-2023-39408, CVE-2021-22391, CVE-2021-22430, CVE-2021-39973, CVE-2022-34740, CVE-2021-22349, CVE-2022-39004, CVE-2022-44560, CVE-2023-26549, CVE-2021-22335, CVE-2021-22374, CVE-2021-22444, CVE-2021-46786, CVE-2022-41599, CVE-2022-34739, CVE-2021-37119, CVE-2022-48517, CVE-2023-52108, CVE-2022-48491, CVE-2023-49246, CVE-2022-44550, CVE-2021-22448, CVE-2023-49242, CVE-2021-40064, CVE-2022-31757, CVE-2020-9139, CVE-2021-22481, CVE-2022-41594, CVE-2021-46886, CVE-2021-39998, CVE-2022-31753, CVE-2021-36995, CVE-2022-48357, CVE-2021-22387, CVE-2021-22485, CVE-2022-48359, CVE-2022-44552, CVE-2021-37027, CVE-2021-22369, CVE-2022-22252, CVE-2022-48292, CVE-2021-36993, CVE-2021-22486, CVE-2021-40049, CVE-2021-37049, CVE-2022-44563, CVE-2021-22402, CVE-2023-52114, CVE-2021-46839, CVE-2021-40009, CVE-2022-48349, CVE-2021-46887, CVE-2023-39398, CVE-2022-41586, CVE-2021-22375, CVE-2023-31225, CVE-2023-26547, CVE-2021-22343, CVE-2022-41600, CVE-2022-48300, CVE-2021-36987, CVE-2022-46319, CVE-2023-44105, CVE-2021-37046, CVE-2023-46774, CVE-2021-22317, CVE-2021-40013, CVE-2021-22482, CVE-2021-37032, CVE-2021-22388, CVE-2021-22434, CVE-2021-40048, CVE-2021-36991, CVE-2021-22406, CVE-2021-37044, CVE-2021-37042, CVE-2021-22389, CVE-2022-37002, CVE-2021-22344, CVE-2021-40012, CVE-2021-22322, CVE-2023-1691, CVE-2022-48295, CVE-2021-22308, CVE-2022-22254, CVE-2021-37093, CVE-2022-48488, CVE-2021-22404, CVE-2022-48346, CVE-2022-31759, CVE-2023-46758, CVE-2021-22445, CVE-2021-22390, CVE-2021-40029, CVE-2021-22350, CVE-2021-37069, CVE-2021-37035, CVE-2022-48287, CVE-2022-44555, CVE-2023-44098, CVE-2021-46742, CVE-2023-44103, CVE-2023-52102, CVE-2023-39399, CVE-2021-40063, CVE-2023-44106, CVE-2022-44557, CVE-2023-34156, CVE-2022-48294, CVE-2021-22337, CVE-2021-36998, CVE-2021-22323, CVE-2020-9146, CVE-2020-9144, CVE-2023-34167, CVE-2023-44116, CVE-2021-37039, CVE-2023-41305, CVE-2021-22435, CVE-2022-38983, CVE-2023-1695, CVE-2023-46765, CVE-2021-22431, CVE-2021-40020, CVE-2023-34166, CVE-2021-46741, CVE-2021-22313, CVE-2021-22433, CVE-2022-44558, CVE-2021-40011, CVE-2021-37052, CVE-2022-34735, CVE-2021-36986, CVE-2021-22354, CVE-2023-46772, CVE-2022-34736, CVE-2021-40015, CVE-2021-36994, CVE-2023-41300, CVE-2021-36989, CVE-2021-22373, CVE-2023-44112, CVE-2021-40053, CVE-2021-22475, CVE-2021-37020, CVE-2023-39395, CVE-2023-39383, CVE-2021-46840, CVE-2021-37114, CVE-2022-48507, CVE-2022-22253, CVE-2023-41310, CVE-2021-46884, CVE-2022-48494, CVE-2021-37037, CVE-2022-22257, CVE-2021-22370, CVE-2022-37008, CVE-2021-22474, CVE-2021-40017, CVE-2021-40031, CVE-2023-52099, CVE-2023-34161, CVE-2022-41582, CVE-2023-46759, CVE-2021-40059, CVE-2021-22352, CVE-2021-22394, CVE-2022-48508, CVE-2023-1696, CVE-2023-39400, CVE-2022-38997, CVE-2020-9147, CVE-2022-39002, CVE-2023-1694, CVE-2022-41595, CVE-2022-44548, CVE-2022-41601, CVE-2021-40026, CVE-2021-22488, CVE-2021-40016, CVE-2023-6273, CVE-2021-22401, CVE-2021-22353, CVE-2022-46318, CVE-2021-40040, CVE-2022-41602, CVE-2023-44100, CVE-2022-41584, CVE-2023-49240, CVE-2020-36600, CVE-2021-40054, CVE-2021-22432, CVE-2021-22395, CVE-2023-49241, CVE-2022-31761, CVE-2022-41576, CVE-2022-37004, CVE-2022-39006, CVE-2021-22385, CVE-2021-22436, CVE-2023-4565, CVE-2021-22473, CVE-2021-40038, CVE-2021-40037, CVE-2021-22491, CVE-2023-39389, CVE-2022-37007, CVE-2021-37050, CVE-2021-37043, CVE-2023-49248, CVE-2021-40035, CVE-2022-34743, CVE-2021-37031, CVE-2023-39391, CVE-2022-44549, CVE-2023-46756, CVE-2021-37051, CVE-2022-31758, CVE-2021-22336, CVE-2021-37040, CVE-2021-46788, CVE-2023-39401, CVE-2022-34741, CVE-2022-41580, CVE-2023-44118, CVE-2021-22405, CVE-2023-46763, CVE-2021-22438, CVE-2022-41598, CVE-2023-52116, CVE-2021-22384, CVE-2022-38978, CVE-2022-46317, CVE-2021-46883, CVE-2023-39388, CVE-2021-37053, CVE-2021-22319, CVE-2021-22487, CVE-2021-22483, CVE-2022-41587, CVE-2023-49239, CVE-2021-22472, CVE-2021-39996, CVE-2022-41593, CVE-2020-9148, CVE-2022-41596, CVE-2021-40010, CVE-2021-22392, CVE-2022-48496, CVE-2021-36992, CVE-2021-40044, CVE-2021-36999, CVE-2023-1693, CVE-2022-34737, CVE-2022-44551, CVE-2021-40052, CVE-2022-41603, CVE-2022-41592, CVE-2021-37097, CVE-2023-52112, CVE-2023-44104, CVE-2021-22372, CVE-2022-46320, CVE-2021-22428, CVE-2022-44553, CVE-2022-46312, CVE-2022-48286, CVE-2021-46811, CVE-2021-22407, CVE-2023-52107, CVE-2022-46761, CVE-2021-46881, CVE-2021-22446, CVE-2021-22386, CVE-2022-48314, CVE-2021-37002, CVE-2021-40050, CVE-2021-37033, CVE-2023-52101, CVE-2021-40065, CVE-2021-22412, CVE-2023-39403, CVE-2021-22325, CVE-2023-39402, CVE-2021-22442, CVE-2021-46814, CVE-2021-22403, CVE-2021-37055, CVE-2022-34742, CVE-2022-47974, CVE-2021-37117, CVE-2022-44561, CVE-2020-9158, CVE-2021-36988, CVE-2022-46321, CVE-2021-39969, CVE-2021-36996, CVE-2022-31752, CVE-2022-22258, CVE-2022-44562, CVE-2021-37047, CVE-2022-48301, CVE-2021-22346, CVE-2021-39966, CVE-2021-22324, CVE-2021-37110, CVE-2022-37005, CVE-2021-40047, CVE-2021-46885, CVE-2021-22427, CVE-2023-39409, CVE-2021-46789, CVE-2021-37030, CVE-2022-48296, CVE-2022-31760, CVE-2022-48606, CVE-2022-31756, CVE-2023-1692, CVE-2022-41585, CVE-2022-39001, CVE-2023-49245, CVE-2023-44093, CVE-2022-41597, CVE-2023-26548, CVE-2021-22490, CVE-2021-40061, CVE-2021-46813, CVE-2021-22345, CVE-2021-40055, CVE-2021-22381, CVE-2021-22379, CVE-2021-46787, CVE-2022-48516, CVE-2020-9142, CVE-2022-39005, CVE-2022-48515 {}
heuristics/extracted_sars ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, ALC_TSU_EXT.1, ADV_FSP.1 ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_SPM.1, ADV_ARC.1
heuristics/extracted_versions 11.0 16
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2020/93
heuristics/report_references/directly_referencing {} ANSSI-CC-2018/33
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2020/93
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2015/66, ANSSI-CC-2018/33, ANSSI-CC-2016/59, ANSSI-CC-2017/24
heuristics/protection_profiles c88af12926be2779, df09b703c88c665a cf0f01bcd7be3e9c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/report_filename cr_huawei_p40_emui11_v1.0_en.pdf anssi-cc-2020_12.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 6 augmenté ASE_TSS.2
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2020/12
    • cert_item: S3FTIMH/S3FTIMV/S3FTIMG Référence/version du produit S3FTIMH_ 20190702
    • cert_item_version:
    • cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud
    • match_rules: ["Référence du rapport de certification(.+)Nom du produit(.+)()Conformité à un profil de protection(.+)Critères d'évaluation et version(.+)Niveau d'évaluation(.+)Développeur (.+)Centre d'évaluation(.+)Accords de reconnaissance applicables"]
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/ATS/06/2020/RC: 25
  • FR:
    • ANSSI-CC-2018/33: 4
    • ANSSI-CC-2020/12: 16
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL2: 1
    • EAL4: 1
  • EAL:
    • EAL 6: 2
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 3
    • ASE_REQ.1: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 2
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 21
  • Samsung:
    • Samsung: 4
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 3
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/randomness
  • TRNG:
    • DTRNG: 20
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 1
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 6
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20211026152051+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20211026152051+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title: Certification Report "Huawei Mobile Devices (P40 series) with EMUI 11.0"
  • pdf_file_size_bytes: 792444
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /CreationDate: D:20200309161803+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200309161958+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 308176
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename st_huawei_p40_emui11_v1.11.pdf anssi-cible-cc-2020_12en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084: 2
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 1
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL6: 5
    • EAL6 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 5
    • ADV_FSP: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 2
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 2
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 11
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 2
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 2
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 3
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 2
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 2
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 35
    • FCS_COP.1.1: 6
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 13
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV_EXT: 3
    • FCS_SRV_EXT.1: 2
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 3
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 3
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 16
    • FCS_TLSC_EXT.1: 9
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACF_EXT: 3
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 3
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 3
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 2
    • FDP_PBA_EXT.1: 2
    • FDP_PBA_EXT.1.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 12
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 5
    • FIA_BMG_EXT.1.1: 5
    • FIA_BMG_EXT.1.2: 2
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 2
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 2
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 2
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 6
    • FIA_UAU_EXT.1: 2
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 2
    • FMT_SMF_EXT.2.1: 2
  • FPT:
    • FPT_AEX_EXT: 12
    • FPT_AEX_EXT.1: 2
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 2
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 2
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_JTA_EXT: 2
    • FPT_JTA_EXT.1: 2
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 2
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 2
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 2
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 2
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 9
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 9
    • FPT_TST_EXT.2.1: 2
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC_EXT: 9
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 16
    • FCS_CKM.1: 25
    • FCS_CKM.2: 4
    • FCS_CKM.4: 12
    • FCS_COP: 49
    • FCS_COP.1: 21
    • FCS_RNG: 24
    • FCS_RNG.1: 16
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF: 13
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_ITT: 1
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 14
    • FDP_SDC.1.1: 2
    • FDP_SDI: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 12
    • FIA_API.1.1: 2
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 22
    • FMT_LIM.1: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 32
    • FMT_LIM.2.1: 2
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.3: 21
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 17
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.COMMS: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.STORAGE: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 3
    • T.NETWORK: 1
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED: 1
  • O:
    • O.AES: 5
    • O.ECC: 7
    • O.MEM_ACCESS: 1
    • O.RND: 6
    • O.RSA: 7
    • O.SHA: 7
    • O.TDES: 6
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 112
  • Samsung:
    • Samsung: 17
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
      • AES-: 3
      • AES-128: 1
      • AES-256: 8
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
  • AES_competition:
    • AES:
      • AES: 32
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 18
      • Triple-DES: 6
    • DES:
      • DES: 10
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 7
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 7
  • ECC:
    • ECC:
      • ECC: 31
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 4
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 5
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA224: 6
      • SHA256: 6
      • SHA384: 6
      • SHA512: 5
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 3
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • TLS:
    • TLS:
      • TLS: 45
      • TLS 1.2: 2
  • VPN:
    • VPN: 8
  • PGP:
    • PGP: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 9
  • RNG:
    • RND: 11
    • RNG: 17
  • TRNG:
    • DTRNG: 52
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 6
  • XTS:
    • XTS: 3
  • ECB:
    • ECB: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 2
    • P-256: 10
    • P-384: 10
    • secp256r1: 2
    • secp384r1: 2
  • Brainpool:
    • brainpoolP192r1: 4
    • brainpoolP192t1: 4
    • brainpoolP224r1: 4
    • brainpoolP224t1: 4
    • brainpoolP256r1: 4
    • brainpoolP256t1: 4
    • brainpoolP320r1: 4
    • brainpoolP320t1: 4
    • brainpoolP384r1: 4
    • brainpoolP384t1: 4
    • brainpoolP512r1: 4
    • brainpoolP512t1: 4
  • NIST:
    • P-192: 8
    • P-224: 8
    • P-256: 8
    • P-384: 8
    • secp192k1: 4
    • secp192r1: 4
    • secp224k1: 4
    • secp224r1: 4
    • secp256k1: 4
    • secp256r1: 4
    • secp384r1: 4
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 27
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 4
    • Malfunction: 26
    • malfunction: 13
    • physical tampering: 3
  • SCA:
    • DPA: 8
    • Leak-Inherent: 23
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 7
    • physical probing: 9
    • side channel: 2
    • side-channel: 3
    • timing attack: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 5
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 7
  • other:
    • TEE: 10
pdf_data/st_keywords/cplc_data
  • ICVersion:
    • IC Version: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 29147:2018: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 180-4: 2
    • SP 186-4: 4
    • SP 198-1: 1
    • SP 800-108: 2
    • SP 800-132: 2
    • SP 800-38A: 2
    • SP 800-38D: 1
    • SP 800-38E: 1
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 2
  • RFC:
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 5
    • RFC 5289: 12
    • RFC 5759: 2
    • RFC 6125: 1
    • RFC5246: 2
  • X509:
    • X.509: 7
  • BSI:
    • AIS31: 11
    • BSI-AIS31: 3
  • CC:
    • CCMB-2017-04-001: 3
    • CCMB-2017-04-002: 3
    • CCMB-2017-04-003: 3
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 180-3: 6
    • FIPS197: 1
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Rasma
  • /CreationDate: D:20210913121013Z00'00'
  • /Creator: Word
  • /ModDate: D:20210913121013Z00'00'
  • /Producer: macOS Version 11.1 (Build 20C69) Quartz PDFContext
  • /Title: Huawei P40 series EMUI 11.0_MDFPP31_ST v1.11
  • pdf_file_size_bytes: 1655965
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different