| name |
OPPO Find X3 Pro on ColorOS 11.2 |
System Software for e-STUDIO352/452 V1.0 |
| category |
Mobility |
Multi-Function Devices |
| scheme |
SE |
JP |
| status |
active |
archived |
| not_valid_after |
05.10.2026 |
10.12.2010 |
| not_valid_before |
05.10.2021 |
29.03.2006 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20-%20OPPO.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20OPPO%20Find%20X3%20Pro.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0045_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20-%20Find%20X3%20Pro%20on%20ColorOS%2011.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0045_est.pdf |
| manufacturer |
Guangdong OPPO Mobile Telecommunications Corp., Ltd |
Toshiba TEC Corporation |
| manufacturer_web |
https://www.oppo.com/en/ |
https://www.toshibatec.co.jp/en/ |
| security_level |
{} |
EAL3 |
| dgst |
2ea6ef5e92858f68 |
186d22188dc0dc2f |
| heuristics/cert_id |
CSEC2021001 |
JISEC-CC-CRP-C0045 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, ALC_TSU_EXT.1, ADV_FSP.1 |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
11.2 |
1.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0045
- certification_date: 01.03.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0045_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO352/452 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO352/452 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
- product: System Software for e-STUDIO352/452
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0045_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0045_est.pdf
- toe_version: V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.01.2011
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: System Software for e-STUDIO352/452 V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0045_it5059.html
- toe_overseas_name: System Software for e-STUDIO352/452 V1.0
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
df09b703c88c665a |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf |
{} |
| pdf_data/cert_filename |
CCRA - OPPO.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_TSU_EXT.1: 1
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20211022200630+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20211022200630+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 928990
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
Certification Report - OPPO Find X3 Pro.pdf |
c0045_erpt.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0045-01: 1
- Certification No. C0045: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL1: 2
- EAL1 augmented: 1
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.PRECAUTION: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 1
- T.NETWORK: 1
- T.PERSISTENT: 1
- T.PHYSICAL: 1
|
- T:
- T.STOREDATA_ACCESS: 1
- T.TEMPDATA_ACCESS: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- X509:
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
- out of scope: 1
|
|
| pdf_data/report_metadata |
- /Author: Mats Engquist
- /CreationDate: D:20211005181925+02'00'
- /Creator: Microsoft Word
- /ModDate: D:20211005181925+02'00'
- /Subject: 21FMV2586-24:1
- /Title: Certification Report - OPPO Find X3 Pro on ColorOS 11.2
- pdf_file_size_bytes: 320450
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author:
- /CreationDate: D:20060515142209+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060515142338+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 563062
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
| pdf_data/st_filename |
ST - Find X3 Pro on ColorOS 11.2.pdf |
c0045_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 2
- EAL 1 augmented: 1
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- AVA:
|
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG: 4
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 2
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 2
- FCS_CKM_EXT: 18
- FCS_CKM_EXT.1: 3
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 2
- FCS_CKM_EXT.2.1: 2
- FCS_CKM_EXT.3: 3
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 2
- FCS_CKM_EXT.4: 4
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 3
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 2
- FCS_CKM_EXT.6.1: 1
- FCS_COP: 1
- FCS_COP.1: 36
- FCS_COP.1.1: 6
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 9
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SRV_EXT: 3
- FCS_SRV_EXT.1: 2
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT: 9
- FCS_STG_EXT.1: 3
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 4
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 3
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 7
- FCS_TLSC_EXT.1: 2
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 2
- FCS_TLSC_EXT.2.1: 1
- FDP:
- FDP_ACF_EXT: 6
- FDP_ACF_EXT.1: 1
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_ACF_EXT.2: 1
- FDP_ACF_EXT.2.1: 1
- FDP_DAR_EXT: 6
- FDP_DAR_EXT.1: 3
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 3
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 3
- FDP_IFC_EXT.1: 2
- FDP_IFC_EXT.1.1: 1
- FDP_PBA_EXT: 3
- FDP_PBA_EXT.1: 1
- FDP_PBA_EXT.1.1: 1
- FDP_STG_EXT: 3
- FDP_STG_EXT.1: 3
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 3
- FDP_UPC_EXT.1: 1
- FDP_UPC_EXT.1.1: 1
- FDP_UPC_EXT.1.2: 1
- FIA:
- FIA_AFL_EXT: 3
- FIA_AFL_EXT.1: 2
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 12
- FIA_BLT_EXT.1: 1
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 1
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 1
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 1
- FIA_BLT_EXT.4.1: 1
- FIA_BMG_EXT: 4
- FIA_BMG_EXT.1: 1
- FIA_BMG_EXT.1.1: 3
- FIA_BMG_EXT.1.2: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT: 3
- FIA_TRT_EXT.1: 2
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 4
- FIA_UAU.5: 2
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 2
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 6
- FIA_UAU_EXT.1: 2
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UAU_EXT.2.1: 4
- FIA_UAU_EXT.2.2: 1
- FMT:
- FMT_MOF_EXT: 3
- FMT_MOF_EXT.1: 3
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF_EXT: 6
- FMT_SMF_EXT.1: 3
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 2
- FMT_SMF_EXT.2.1: 2
- FPT:
- FPT_AEX_EXT: 12
- FPT_AEX_EXT.1: 2
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 2
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 2
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 1
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_JTA_EXT: 3
- FPT_JTA_EXT.1: 2
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 9
- FPT_KST_EXT.1: 2
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 2
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 2
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 3
- FPT_NOT_EXT.1: 3
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 6
- FPT_TST_EXT.2.1: 1
- FPT_TUD_EXT: 6
- FPT_TUD_EXT.1: 3
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 1
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FTA:
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTP:
- FTP_ITC_EXT: 3
- FTP_ITC_EXT.1: 1
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
- FDP:
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_RIP.2: 8
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.PRECAUTION: 1
- O:
- O.AUTH: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.INTEGRITY: 1
- O.PRIVACY: 1
- O.STORAGE: 1
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.PRECAUTION: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 3
- T.NETWORK: 1
- T.PERSISTENT: 3
- T.PHYSICAL: 3
|
- O:
- O.STOREDATA_OVERWRITE: 4
- O.TEMPDATA_OVERWRITE: 6
- OE:
- OE.HDD_ERASE: 3
- OE.OVERWRITE_COMPLETE: 3
- T:
- T.STOREDATA_ACCESS: 3
- T.TEMPDATA_ACCESS: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 6
- HMAC-SHA-384: 1
- HMAC-SHA-512: 4
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 9
- SHA-384: 4
- SHA-512: 2
- SHA384: 1
- SHA512: 2
- scrypt:
|
|
| pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 1
- Key exchange: 3
- MAC:
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 8
- secp256r1: 2
- secp384r1: 2
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 3
- FIPS 186-4: 4
- FIPS 197: 4
- FIPS 198-1: 3
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- FIPS186-4: 1
- FIPS198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 186-4: 1
- SP 800-108: 3
- SP 800-90A: 2
- RFC:
- RFC 2560: 1
- RFC 2818: 2
- RFC 5246: 1
- RFC 5280: 2
- RFC 5288: 1
- RFC 5289: 4
- RFC 6125: 1
- RFC5246: 2
- X509:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
- com:
- com.coloros.ocs.opencapabilityservice: 1
- java:
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope of this ST. T.FLAWAPP Malicious or Flawed Application (PP_MD_V3.1) Applications loaded onto the: 1
- out of scope: 1
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20210927161603Z
- /Creator: Word
- /ModDate: D:20211005182215+02'00'
- /Producer: macOS Version 10.15.7 (Build 19H1030) Quartz PDFContext
- /Title: Microsoft Word - Find X3 Pro on ColorOS 11.2 MDFPP3.1 ST 20210927.docx
- pdf_file_size_bytes: 899034
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
- /CreationDate: D:20060512043942Z
- /ModDate: D:20060731115329+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: 2006/7/31 update
- pdf_file_size_bytes: 686579
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |