Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ST3 Ace (ST3 Ace Token Manager v1.0.13.927, ST3 Ace Middleware v1.0.13.910, and SecureCOS Firmware v5.2)
ISCB-5-RPT-C051-CR-v1a
Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
OCSI/CERT/ATS/10/2020/RC
name ST3 Ace (ST3 Ace Token Manager v1.0.13.927, ST3 Ace Middleware v1.0.13.910, and SecureCOS Firmware v5.2) Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
category Products for Digital Signatures Mobility
scheme MY IT
status archived active
not_valid_after 20.12.2018 20.01.2027
not_valid_before 20.12.2013 20.01.2022
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C051-CR-v1a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_huawei_m40_emui11_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecureMetric%20ST3%20Ace%20Security%20Target%20v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_huawei_m40_emui11_v1.0.pdf
manufacturer SecureMetric Technology Sdn Bhd Huawei Device Co., Ltd.
manufacturer_web https://www.securemetric.com/ https://www.huawei.com/
security_level EAL2 {}
dgst e8f4eb037a6f1f14 4646e2bd9bf0b59d
heuristics/cert_id ISCB-5-RPT-C051-CR-v1a OCSI/CERT/ATS/10/2020/RC
heuristics/cpe_matches {} cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*, cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-22445, CVE-2021-22404, CVE-2021-40044, CVE-2021-40039, CVE-2023-52107, CVE-2020-9146, CVE-2021-39973, CVE-2021-40016, CVE-2021-22323, CVE-2021-22433, CVE-2022-38978, CVE-2023-52116, CVE-2021-46789, CVE-2021-36996, CVE-2021-22325, CVE-2023-39400, CVE-2023-46758, CVE-2021-22352, CVE-2022-48302, CVE-2023-39395, CVE-2023-26548, CVE-2023-41310, CVE-2021-22319, CVE-2021-22347, CVE-2022-39003, CVE-2023-44104, CVE-2021-37119, CVE-2021-22473, CVE-2021-39993, CVE-2021-37020, CVE-2023-39399, CVE-2021-22386, CVE-2021-22381, CVE-2021-39998, CVE-2021-22346, CVE-2021-37069, CVE-2022-31760, CVE-2022-48494, CVE-2023-31225, CVE-2021-40053, CVE-2023-52112, CVE-2021-37044, CVE-2021-22350, CVE-2022-37004, CVE-2023-44105, CVE-2021-22407, CVE-2021-37030, CVE-2021-22428, CVE-2023-44093, CVE-2021-37110, CVE-2021-37040, CVE-2021-40037, CVE-2021-40009, CVE-2023-52113, CVE-2022-37002, CVE-2021-46884, CVE-2020-9158, CVE-2022-38979, CVE-2023-39409, CVE-2023-1692, CVE-2021-46741, CVE-2022-48287, CVE-2023-46759, CVE-2022-31762, CVE-2021-22436, CVE-2022-44563, CVE-2022-46312, CVE-2023-46763, CVE-2021-22431, CVE-2021-22447, CVE-2022-41597, CVE-2023-34156, CVE-2023-39402, CVE-2021-22434, CVE-2021-36998, CVE-2021-37050, CVE-2022-48346, CVE-2022-39004, CVE-2021-22324, CVE-2021-40050, CVE-2021-46742, CVE-2022-46321, CVE-2022-41581, CVE-2023-52102, CVE-2021-22412, CVE-2021-40061, CVE-2021-36993, CVE-2021-37074, CVE-2021-22333, CVE-2023-49246, CVE-2022-44553, CVE-2020-9147, CVE-2023-4565, CVE-2022-39006, CVE-2021-46839, CVE-2022-31757, CVE-2021-22403, CVE-2023-34167, CVE-2022-41592, CVE-2021-46885, CVE-2021-46883, CVE-2021-37046, CVE-2020-9139, CVE-2023-1691, CVE-2023-44112, CVE-2022-48517, CVE-2022-48507, CVE-2022-44549, CVE-2021-40026, CVE-2022-31753, CVE-2022-46761, CVE-2023-34163, CVE-2021-22429, CVE-2021-40048, CVE-2023-44103, CVE-2022-31761, CVE-2022-41588, CVE-2021-22351, CVE-2023-46772, CVE-2021-46840, CVE-2021-40030, CVE-2021-22317, CVE-2022-31759, CVE-2021-36997, CVE-2021-22345, CVE-2021-22444, CVE-2021-22485, CVE-2022-48491, CVE-2021-22373, CVE-2021-37117, CVE-2022-41603, CVE-2021-22387, CVE-2021-22316, CVE-2022-41598, CVE-2021-22375, CVE-2021-37037, CVE-2021-46886, CVE-2021-22406, CVE-2022-34740, CVE-2023-41300, CVE-2021-22491, CVE-2021-37093, CVE-2021-22405, CVE-2022-39000, CVE-2023-44100, CVE-2022-46320, CVE-2021-22474, CVE-2021-40055, CVE-2022-46318, CVE-2023-1694, CVE-2021-37002, CVE-2022-48349, CVE-2021-37031, CVE-2020-9149, CVE-2022-41576, CVE-2021-22426, CVE-2021-40045, CVE-2023-49245, CVE-2021-40063, CVE-2022-41593, CVE-2022-22257, CVE-2021-22374, CVE-2021-22370, CVE-2022-41587, CVE-2023-1696, CVE-2022-44550, CVE-2023-49242, CVE-2021-22353, CVE-2022-48513, CVE-2021-22475, CVE-2023-49248, CVE-2021-36991, CVE-2021-22379, CVE-2021-39969, CVE-2021-22481, CVE-2021-46811, CVE-2022-46317, CVE-2021-40034, CVE-2022-47974, CVE-2021-22487, CVE-2022-39005, CVE-2022-41594, CVE-2021-22389, CVE-2022-39002, CVE-2022-44557, CVE-2021-37039, CVE-2021-37033, CVE-2022-37005, CVE-2023-46765, CVE-2023-44098, CVE-2021-37049, CVE-2021-37052, CVE-2023-44118, CVE-2021-37043, CVE-2021-22337, CVE-2021-36985, CVE-2021-22394, CVE-2021-37021, CVE-2021-40031, CVE-2021-40017, CVE-2021-46786, CVE-2023-44119, CVE-2022-41599, CVE-2021-37034, CVE-2023-52114, CVE-2023-46774, CVE-2023-49241, CVE-2021-46881, CVE-2022-46319, CVE-2021-37051, CVE-2022-44552, CVE-2021-37114, CVE-2023-39391, CVE-2021-22401, CVE-2021-46787, CVE-2021-36986, CVE-2021-40051, CVE-2020-9142, CVE-2022-48508, CVE-2021-40013, CVE-2021-40049, CVE-2021-37032, CVE-2022-37007, CVE-2021-36992, CVE-2021-37047, CVE-2022-31756, CVE-2021-22472, CVE-2021-22390, CVE-2021-22385, CVE-2021-40010, CVE-2023-52101, CVE-2021-22344, CVE-2021-22427, CVE-2021-22490, CVE-2022-41596, CVE-2022-44559, CVE-2023-39408, CVE-2023-39387, CVE-2021-22392, CVE-2022-22252, CVE-2023-34166, CVE-2022-48300, CVE-2023-26547, CVE-2021-37042, CVE-2021-36989, CVE-2020-9148, CVE-2021-40040, CVE-2023-52098, CVE-2022-48606, CVE-2022-41586, CVE-2022-41578, CVE-2021-22388, CVE-2022-41585, CVE-2021-22372, CVE-2021-40035, CVE-2023-34161, CVE-2022-44560, CVE-2021-40064, CVE-2021-36994, CVE-2022-34743, CVE-2022-41601, CVE-2022-41602, CVE-2021-46813, CVE-2021-37055, CVE-2023-49240, CVE-2023-6273, CVE-2022-41595, CVE-2021-22482, CVE-2021-22335, CVE-2023-44106, CVE-2021-22448, CVE-2022-38997, CVE-2021-22349, CVE-2021-46887, CVE-2022-34742, CVE-2023-49239, CVE-2021-22443, CVE-2021-22435, CVE-2023-49243, CVE-2021-22391, CVE-2023-52099, CVE-2021-40029, CVE-2021-22402, CVE-2021-22371, CVE-2021-36987, CVE-2021-37029, CVE-2021-22486, CVE-2021-22384, CVE-2022-48359, CVE-2021-22446, CVE-2021-40054, CVE-2023-39381, CVE-2023-39389, CVE-2021-39966, CVE-2022-34737, CVE-2022-34738, CVE-2021-37097, CVE-2023-44116, CVE-2022-48291, CVE-2021-22308, CVE-2021-36999, CVE-2021-37053, CVE-2022-41600, CVE-2022-48357, CVE-2022-48314, CVE-2020-36600, CVE-2021-37001, CVE-2023-52108, CVE-2020-9144, CVE-2021-46814, CVE-2022-34735, CVE-2021-22348, CVE-2022-34741, CVE-2021-22432, CVE-2022-41584, CVE-2022-31752, CVE-2021-22334, CVE-2022-37008, CVE-2023-39382, CVE-2022-44561, CVE-2022-37003, CVE-2023-39383, CVE-2023-26549, CVE-2022-48294, CVE-2023-39401, CVE-2021-22442, CVE-2023-41305, CVE-2022-31758, CVE-2022-48515, CVE-2021-40047, CVE-2022-48292, CVE-2021-39996, CVE-2021-37027, CVE-2022-48516, CVE-2022-44558, CVE-2023-39388, CVE-2021-40038, CVE-2023-39398, CVE-2022-38983, CVE-2021-22438, CVE-2023-39403, CVE-2020-9140, CVE-2021-22354, CVE-2022-41582, CVE-2022-22258, CVE-2022-39001, CVE-2021-22488, CVE-2021-22415, CVE-2022-48480, CVE-2022-48301, CVE-2022-48496, CVE-2022-48296, CVE-2021-37111, CVE-2021-46882, CVE-2021-22369, CVE-2021-40020, CVE-2021-46788, CVE-2023-46764, CVE-2021-40059, CVE-2023-1693, CVE-2021-40012, CVE-2022-48293, CVE-2021-36990, CVE-2021-37041, CVE-2021-40065, CVE-2022-48286, CVE-2021-37035, CVE-2022-31755, CVE-2021-36988, CVE-2021-40015, CVE-2023-41296, CVE-2021-22430, CVE-2022-22256, CVE-2021-22395, CVE-2022-34736, CVE-2021-22367, CVE-2022-44562, CVE-2022-48295, CVE-2022-22254, CVE-2021-22343, CVE-2021-22313, CVE-2022-22253, CVE-2023-39405, CVE-2021-40052, CVE-2022-44551, CVE-2022-41580, CVE-2022-44555, CVE-2022-48488, CVE-2021-36995, CVE-2022-31751, CVE-2022-44548, CVE-2021-22336, CVE-2023-46756, CVE-2021-22322, CVE-2022-34739, CVE-2022-41591, CVE-2021-22483, CVE-2021-37103, CVE-2023-1695, CVE-2021-40011
heuristics/extracted_sars AGD_OPE.1, ASE_ECD.1, ADV_FSP.2, ALC_DEL.1, ALC_CMS.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_IND.2, ADV_TDS.1, ASE_TSS.1, ATE_FUN.1, AGD_PRE.1, ALC_CMC.2 ALC_TSU_EXT.1, AGD_OPE.1, AGD_PRE.1, ASE_OBJ.1, ATE_IND.1, ASE_ECD.1, AVA_VAN.1, ASE_CCL.1, ALC_CMC.1, ADV_FSP.1, ALC_CMS.1, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ASE_REQ.1
heuristics/extracted_versions 1.0.13.910, 5.2, 1.0.13.927 11.0
heuristics/scheme_data
  • certification_date: 20.01.2022
  • level: conforme a PP_MD_V3.1
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/huawei/cr_huawei_m40_emui11_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/huawei/rc_huawei_m40_emui11_v1.0_it.pdf
  • supplier: Huawei Device Co., Ltd.
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/huawei/st_huawei_m40_emui11_v1.0.pdf
  • title: Huawei Mate 40 Pro (M40 pro) with EMUI 11.0
heuristics/protection_profiles {} c88af12926be2779, df09b703c88c665a
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf
pdf_data/report_filename ISCB-5-RPT-C051-CR-v1a.pdf cr_huawei_m40_emui11_v1.0_en.pdf
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C051-CR-v1a: 29
  • IT:
    • OCSI/CERT/ATS/10/2020/RC: 25
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL2: 7
  • EAL:
    • EAL1: 1
    • EAL2: 1
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 3
    • ASE_REQ.1: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 3
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.4.1: 1
    • FCS_COP: 4
  • FIA:
    • FIA_AFL.1.1: 1
    • FIA_ATD.1.1: 1
    • FIA_UAU.2.1: 1
  • FMT:
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 17
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 4
      • TDES: 6
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
  • SHA:
    • SHA1:
      • SHA-1: 5
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 1
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 46-3: 2
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • PKCS:
    • PKCS#11: 14
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 6
pdf_data/report_metadata
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20131220170040+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: SecureMetric Technology Sdn Bhd
  • /Document Type: CR
  • /Identifier: ISCB-5-RPT-C051-CR-v1a
  • /Index: MyCB_TMP_002
  • /Keywords: ST3 Ace
  • /ModDate: D:20131220170049+08'00'
  • /Phase: Release
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C051
  • /Released: 20 December 2013
  • /ST Date: 21 November 2013
  • /ST Title: ST3 Ace Security Target
  • /ST Version: 1.1
  • /SourceModified: D:20131220090019
  • /Sponsor: SecureMetric Technology Sdn Bhd
  • /Subject: ST3 Ace (ST3 Ace Token Manager v1.0.13.927, ST3 Ace Middleware v1.0.13.910, and SecureCOS Firmware v5.2)
  • /TOE Name: ST3 Ace
  • /TOE Version: ST3 Ace Token Manager (v1.0.13.927), ST3 Ace Middleware (v1.0.13.910), SecureCOS Firmware (v5.2)
  • /Title: C051 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 421845
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /Author: OCSI
  • /CreationDate: D:20220120071420+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20220120071420+00'00'
  • /Title: Certification Report "Huawei Mate 40 Pro (M40 pro) with EMUI 11.0"
  • pdf_file_size_bytes: 469187
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename SecureMetric ST3 Ace Security Target v1.1.pdf st_huawei_m40_emui11_v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 9
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 1
    • ASE_INT.1: 4
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 4
    • ASE_SPD.1: 4
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 15
    • FCS_CKM.1: 11
    • FCS_CKM.2: 4
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 1
    • FCS_COP: 25
    • FCS_COP.1: 5
  • FDP:
    • FDP_IFF: 2
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
  • FMT:
    • FMT_MTD: 18
    • FMT_MTD.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 2
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 2
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 3
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 2
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 2
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 6
    • FCS_RBG_EXT: 3
    • FCS_RBG_EXT.1: 12
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV_EXT: 3
    • FCS_SRV_EXT.1: 2
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 3
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 3
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 15
    • FCS_TLSC_EXT.1: 9
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACF_EXT: 3
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 2
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 3
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 2
    • FDP_PBA_EXT.1: 2
    • FDP_PBA_EXT.1.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 3
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 12
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 5
    • FIA_BMG_EXT.1.1: 5
    • FIA_BMG_EXT.1.2: 2
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 2
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 2
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 2
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 6
    • FIA_UAU_EXT.1: 2
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 2
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 2
    • FMT_SMF_EXT.2.1: 2
  • FPT:
    • FPT_AEX_EXT: 12
    • FPT_AEX_EXT.1: 2
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 2
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 2
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_JTA_EXT: 2
    • FPT_JTA_EXT.1: 2
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 2
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 2
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 2
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 2
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 9
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 9
    • FPT_TST_EXT.2.1: 2
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC_EXT: 9
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.HOST: 2
    • A.USER: 3
  • O:
    • O.AUTHENTICATE: 5
    • O.CRYPT: 4
    • O.DISCLOSURE: 1
    • O.KEYPROTECT: 3
    • O.MODIFY: 4
  • OE:
    • OE.AUTHDATA: 3
    • OE.INSTALL: 3
  • T:
    • T.COMINT: 3
    • T.DISCLOSURE: 2
    • T.IMPERSON: 3
    • T.MODIFY: 2
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.COMMS: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.STORAGE: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 3
    • T.NETWORK: 1
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Huawei:
    • Huawei: 120
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3-DES: 1
      • TDES: 12
    • DES:
      • DES: 3
  • AES_competition:
    • AES:
      • AES: 22
      • AES-: 2
      • AES-128: 1
      • AES-256: 7
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 6
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 7
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 8
  • SHA:
    • SHA1:
      • SHA-1: 5
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 6
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • TLS:
    • TLS:
      • TLS: 45
      • TLS 1.2: 2
  • VPN:
    • VPN: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 9
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 10
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 25
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 7
  • other:
    • TEE: 13
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 46-3: 2
  • PKCS:
    • PKCS#11: 7
  • FIPS:
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
  • ISO:
    • ISO/IEC 29147:2018: 1
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-38A: 3
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 186-4: 1
    • SP 800-108: 2
    • SP 800-132: 2
    • SP 800-38F: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 5216: 1
    • RFC 5246: 2
    • RFC 5280: 5
    • RFC 5289: 12
    • RFC 5759: 2
    • RFC 6125: 1
    • RFC5246: 2
  • X509:
    • X.509: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20220118130640Z00'00'
  • /Creator: Word
  • /ModDate: D:20220118130640Z00'00'
  • /Producer: macOS Version 11.6.1 (Build 20G224) Quartz PDFContext
  • /Title: Microsoft Word - Huawei EMUI 11.0 M40 Pro_MDFPP31_ST v1.0.docx
  • pdf_file_size_bytes: 1739846
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different