name |
OPPO Find X5 Pro, including ColorOS 12.1, and Qualcomm Snapdragon® 8 Gen 1 Mobile Platform |
Renesas HD65256D1 Version 02 |
category |
Mobility |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
DE |
status |
active |
archived |
not_valid_after |
31.03.2027 |
01.09.2019 |
not_valid_before |
31.03.2022 |
24.03.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed-CCRA-Certificate%20OPPO%20Find%20X5%20Pro.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20OPPO%20Find%20X5%20Pro.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OPPO%20Find%20X5%20Pro%20on%20ColorOS%2012.1%20Security%20Target.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529b_pdf.pdf |
manufacturer |
Guangdong OPPO Mobile Telecommunications Corp., Ltd |
Renesas Technology Corporation |
manufacturer_web |
https://www.oppo.com/en/ |
https://am.renesas.com/ |
security_level |
{} |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
95ee9573a6851af4 |
ac37e8c6afcb4efc |
heuristics/cert_id |
CSEC2021007 |
BSI-DSZ-CC-0529-2010 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ALC_TAT.1, AVA_VLA.4, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
12.1 |
02 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0489-2008 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0350-2007, BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0329-2006, BSI-DSZ-CC-0489-2008 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c40ae795865a0dba, 731bdcc989507942, 83014eb399a802f3, c88af12926be2779 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf |
{} |
pdf_data/cert_filename |
Signed-CCRA-Certificate OPPO Find X5 Pro.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_TSU_EXT.1: 1
- ASE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20220404080932+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20220404083958+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 1623099
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Certification Report - OPPO Find X5 Pro.pdf |
0529a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0529-2010
- cert_item: Renesas HD65256D1 Version 02
- cert_lab: BSI
- developer: Renesas Technology Corp. sponsored by Renesas Technology Europe Ltd
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0434-2007: 4
- BSI-DSZ-CC-0489-2008: 1
- BSI-DSZ-CC-0529: 2
- BSI-DSZ-CC-0529-2010: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 3
- EAL 1 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 4
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.MALICIOUS_APP: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT_PRESENCE: 1
- T.PHYSICAL_ACCESS: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED_ACTIONS: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- X509:
|
- BSI:
- AIS 25: 3
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 38: 1
- AIS31: 1
- AIS37: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP) Applications loaded onto the Mobile Device may: 1
- out of scope: 1
|
- ConfidentialDocument:
- 02 (HD65256D1), Brightsight (confidential document) [8] Configuration list for the TOE, Version 0.6.6, 22 July 2009, Document Version for the Common: 1
- 5.0, 14 July 2009, HD65256D1 Version 02 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Evaluation Technical Report, Version 3.0, 8 February 2010, Evaluation Technical Report AE56D1: 1
- confidential document) [9] Security Target BSI-DSZ-CC-0529, Version 2.0, 14 July 2009, HD65256D1 Version 02 Smartcard: 1
|
pdf_data/report_metadata |
- /Author: Jerry Johansson
- /CreationDate: D:20220329111443+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220331141336+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 21FMV6272-30:1
- /Title: Certification Report - OPPO Find X5 Pro
- pdf_file_size_bytes: 504386
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100413092737+02'00'
- /Creator: Writer
- /Keywords: "Certification, Common Criteria, Renesas HD65256D1 Version 02, Renesas Technology Europe Ltd, Renesas Technology Corp."
- /ModDate: D:20100422145117+02'00'
- /Producer: OpenOffice.org 3.1
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0529-2010
- pdf_file_size_bytes: 370401
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
OPPO Find X5 Pro on ColorOS 12.1 Security Target.pdf |
0529b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002: 4
- BSI-PP-0002: 82
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 2
- EAL 1 augmented: 1
|
- EAL:
- EAL4: 6
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD: 1
- ALC_TAT: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 6
- AVA_VLA: 1
- AVA_VLA.4: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 7
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM_EXT: 7
- FCS_CKM_EXT.1: 5
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 5
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 6
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 5
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 5
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.8: 7
- FCS_CKM_EXT.8.1: 1
- FCS_COP: 41
- FCS_COP.1: 7
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SMF_EXT.1: 1
- FCS_SRV_EXT: 1
- FCS_SRV_EXT.1: 5
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT: 3
- FCS_STG_EXT.1: 5
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 7
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 5
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 12
- FCS_TLSC_EXT.1: 11
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.2: 4
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 3
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 3
- FCS_TLSC_EXT.5.1: 1
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 3
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT: 2
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_ACF_EXT.2: 3
- FDP_ACF_EXT.2.1: 1
- FDP_DAR_EXT: 2
- FDP_DAR_EXT.1: 5
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 5
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 1
- FDP_IFC_EXT.1: 6
- FDP_IFC_EXT.1.1: 1
- FDP_PBA_EXT: 3
- FDP_PBA_EXT.1: 1
- FDP_PBA_EXT.1.1: 1
- FDP_STG_EXT: 1
- FDP_STG_EXT.1: 5
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 4
- FDP_UPC_EXT.1: 2
- FIA:
- FIA_AFL_EXT: 1
- FIA_AFL_EXT.1: 4
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 6
- FIA_BLT_EXT.1: 5
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 5
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 3
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 5
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.4.2: 1
- FIA_BLT_EXT.6: 5
- FIA_BLT_EXT.6.1: 1
- FIA_BLT_EXT.7: 5
- FIA_BLT_EXT.7.1: 1
- FIA_BMG_EXT: 8
- FIA_BMG_EXT.1: 5
- FIA_PAE_EXT: 1
- FIA_PAE_EXT.1: 5
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 8
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT: 1
- FIA_TRT_EXT.1: 5
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 3
- FIA_UAU.5: 4
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UAU.6.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.1: 5
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 4
- FIA_UAU_EXT.2.2: 1
- FMT:
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 6
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF_EXT: 10
- FMT_SMF_EXT.1: 8
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 3
- FMT_SMF_EXT.2.1: 1
- FPT:
- FPT_AEX_EXT: 4
- FPT_AEX_EXT.1: 5
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 5
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 5
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 3
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_JTA_EXT: 1
- FPT_JTA_EXT.1: 5
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 3
- FPT_KST_EXT.1: 5
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 5
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 5
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 1
- FPT_NOT_EXT.1: 5
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 13
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 1
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.3: 3
- FPT_TUD_EXT.3.1: 1
- FTA:
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_WSE_EXT: 1
- FTA_WSE_EXT.1: 4
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_BLT_EXT: 12
- FTP_BLT_EXT.1: 5
- FTP_BLT_EXT.1.1: 1
- FTP_BLT_EXT.1.2: 1
- FTP_BLT_EXT.2: 5
- FTP_BLT_EXT.2.1: 1
- FTP_BLT_EXT.3: 3
- FTP_ITC_EXT: 7
- FTP_ITC_EXT.1: 5
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FCS_RND: 1
- FCS_RND.1: 9
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 2
- FDP_ACF.1: 16
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_SMR.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 30
- FPT_FLS.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 15
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.AUTH: 1
- O.AUTH_COMM: 1
- O.CONFIG: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.INTEGRITY: 1
- O.PRIVACY: 1
- O.PROTECTED_COMMS: 1
- O.STORAGE: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.WIRELESS_ACCESS_POINT_CONNECTION: 1
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_USER: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 2
- T.MALICIOUS_APP: 1
- T.NETWORK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT: 2
- T.PERSISTENT_PRESENCE: 1
- T.PHYSICAL: 2
- T.PHYSICAL_ACCESS: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED_ACTIONS: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 28
- AES-: 1
- AES-128: 1
- AES-256: 16
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 6
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 5
- SHA-512: 2
- SHA384: 1
- SHA512: 2
- scrypt:
|
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 1
- Key exchange: 3
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 63
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 8
- secp256r1: 4
- secp384r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 15
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 16
- Physical Probing: 2
- Physical probing: 1
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 4
- FIPS 186-4: 3
- FIPS 197: 4
- FIPS 198-1: 3
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- FIPS186-4: 1
- FIPS198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 186-4: 1
- SP 800-108: 2
- SP 800-38E: 1
- SP 800-90A: 1
- RFC:
- RFC 2246: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 4346: 2
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 3
- RFC 5288: 5
- RFC 5289: 12
- RFC 5746: 2
- RFC 6125: 1
- RFC 6960: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.coloros.ocs.opencapabilityservice: 1
- java:
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP32) Applications loaded onto the Mobile Device: 1
- out of scope: 1
|
- OutOfScope:
- is also a part of TOE. But in the case of the package includes another chip, another chip is out of scope of the TOE. The package type is listed in section 2.1.1. 1.3 ST Overview This document is the ST: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /Author: Renesas Electronics Corporation
- /CreationDate: D:20090714085001+09'00'
- /Creator: クセロPDF v1.14 Rev0495
- /Keywords: HD65256D1, Common Criteria Certification, Security Controller, Security Target, EAL4+
- /ModDate: D:20100422104451+01'00'
- /Producer: Xelo PDF Library
- /Subject: Common Criteria Certification BSI-DSZ-CC-0529-2010
- /Title: HD65256D1 Version 02 Smartcard Security Target -Public Version-
- pdf_file_size_bytes: 953247
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |