Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Trusted Computing",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2017_73-S01.pdf",
"dgst": "759407f9d41632b4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2017/73",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0.7",
"6.0.3",
"1.3.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1111-2019",
"BSI-DSZ-CC-1070-2018"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/02"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1131-2020",
"BSI-DSZ-CC-1111-2019",
"BSI-DSZ-CC-1131-V2-2023",
"BSI-DSZ-CC-1070-2018"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/33",
"ANSSI-CC-2017/02",
"ANSSI-CC-2015/80",
"ANSSI-CC-2015/36",
"ANSSI-CC-2014/46"
]
}
},
"scheme_data": {
"cert_id": "2017/73",
"description": "Le produit certifi\u00e9 est le \u00ab Microcontr\u00f4leur s\u00e9curis\u00e9 ST33G1M2A1 r\u00e9vision H, Firmware r\u00e9vision 1.3.2, incluant optionnellement la biblioth\u00e8que cryptographique Neslib 6.0.3 et la biblioth\u00e8que SFM 1.0.7 \u00bb d\u00e9velopp\u00e9 par ST MICROELECTRONICS.\n\nLes produits d\u00e9riv\u00e9s du ST33G1M2A1 sont d\u00e9finis par une s\u00e9rie d\u2019options mat\u00e9rielles ou logicielles configurables par le client final. Ces options concernent la",
"developer": "ST Microelectronics",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "2017/73",
"cert_link": "https://cyber.gouv.fr/sites/default/files/2017/12/certificat-anssi-cc-2017_73-s01.pdf",
"certification_date": "18/12/2017",
"developer": "ST Microelectronics",
"evaluation_facility": "THALES (TCS \u2013 CNES)",
"expiration_date": "18/10/2024",
"level": "EAL5+",
"mutual_recognition": "SOG-IS\n CCRA",
"protection_profile": "BSI-CC-PP-0035-2007",
"report_link": "https://cyber.gouv.fr/sites/default/files/2017/12/anssi-cc-2017_73fr.pdf",
"sponsor": "ST Microelectronics",
"target_link": "https://cyber.gouv.fr/sites/default/files/2017/12/anssi-cible-cc-2017_73en.pdf"
},
"expiration_date": "18 Octobre 2024",
"level": "EAL5+",
"product": "Microcontr\u00f4leur s\u00e9curis\u00e9 ST33G1M2A1 r\u00e9vision H, Firmware r\u00e9vision 1.3.2, incluant optionnellement la biblioth\u00e8que cryptographique Neslib 6.0.3 et la biblioth\u00e8que SFM 1.0.7",
"sponsor": "ST Microelectronics",
"url": "https://cyber.gouv.fr/produits-certifies/microcontroleur-securise-st33g1m2a1-revision-h-firmware-revision-132-incluant"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-0176780-CR"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-0176780-CR"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2020-10-08",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_73-m01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2017/73-M01"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2019-10-18",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_73-S01fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "Reassessment report: ANSSI-CC-2017/73-S01"
}
]
},
"manufacturer": "STMicroelectronics",
"manufacturer_web": "https://www.st.com/",
"name": "Microcontr\u00f4leur s\u00e9curis\u00e9 ST33G1M2A1 r\u00e9vision H, Firmware r\u00e9vision 1.3.2, incluant optionnellement la biblioth\u00e8quecryptographique Neslib 6.0.3 et la biblioth\u00e8que SFM 1.0.7",
"not_valid_after": "2024-10-18",
"not_valid_before": "2017-12-18",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat ANSSI-CC-2017_73-S01.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2017/73-S01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STMicroelectronics": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "jchuzel",
"/CreationDate": "D:20210318180335+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20210318180335+01\u002700\u0027",
"/Producer": "GPL Ghostscript 9.50",
"/Title": "Microsoft Word - certificat ANSSI-CC-2017_73-S01.docx",
"pdf_file_size_bytes": 1913719,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "anssi-cc-2017_73fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2017/73",
"cert_item": "Microcontr\u00f4leur s\u00e9curis\u00e9 ST33G1M2A1 r\u00e9vision H, Firmware r\u00e9vision 1.3.2, incluant optionnellement la biblioth\u00e8que cryptographique Neslib 6.0.3 et la biblioth\u00e8que SFM 1.0.7",
"cert_item_version": "R\u00e9f\u00e9rence maskset K8H0A, r\u00e9vision interne H, firmware r\u00e9vision 1.3.2",
"cert_lab": "THALES (TCS \u2013 CNES) 290 all\u00e9e du Lac, 31670 Lab\u00e8ge, France",
"developer": "ST Microelectronics 190, avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire ST Microelectronics 190, avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur (.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Security IC Platform Protection Profile version v1.0 certifi\u00e9 BSI-CC-PP-0035-2007 le 23 ao\u00fbt 2007"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2017/02": 1,
"ANSSI-CC-2017/73": 19
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1,
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 5+": 1,
"EAL 7": 1,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib 6": 1,
"NesLib 6.0": 3,
"NesLib 6.0.3": 3
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 2,
"AIS31": 1
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Category": "R\u00e9f\u00e9rence maskset K8H0A, r\u00e9vision interne H, firmware r\u00e9vision 1.3.2",
"/Comments": "",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20171221145539+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/Keywords": "ANSSI-CC-CER-F-07.025",
"/ModDate": "D:20171221165040+01\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20171221135535",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 386660,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:certification@ssi.gouv.fr",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "anssi-cible-cc-2017_73en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"Diffie-Hellman": 9
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 4
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 62
}
},
"cc_sar": {
"ADO": {
"ADO_DEL": 1
},
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.5": 3,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 4,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 3,
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 2,
"EAL 5 augmented": 2,
"EAL4": 1,
"EAL5": 17
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 1,
"FAU_SAS.1": 7
},
"FCS": {
"FCS_CKM.1": 21,
"FCS_CKM.4": 4,
"FCS_COP.1": 36,
"FCS_RNG": 1,
"FCS_RNG.1": 7
},
"FDP": {
"FDP_ACC.1": 27,
"FDP_ACC.2": 13,
"FDP_ACF.1": 38,
"FDP_CKM.2": 1,
"FDP_IFC.1": 16,
"FDP_ITC.1": 14,
"FDP_ITC.2": 2,
"FDP_ITT.1": 11,
"FDP_SMF.1": 2,
"FDP_SMR.1": 1
},
"FMT": {
"FMT_ITC.1": 1,
"FMT_LIM": 1,
"FMT_LIM.1": 20,
"FMT_LIM.2": 19,
"FMT_MSA.1": 28,
"FMT_MSA.2": 1,
"FMT_MSA.3": 38,
"FMT_SMF.1": 18,
"FMT_SMR.1": 10
},
"FPT": {
"FPT_FLS.1": 12,
"FPT_ITT.1": 10,
"FPT_PHP.3": 12
},
"FRU": {
"FRU_FLT.2": 12
}
},
"certification_process": {
"OutOfScope": {
"33 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded. 34 The user guidance documentation": 1,
"ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NESLIB 6.0.3": 1,
"NesLib 6.0": 2,
"NesLib 6.0.3": 7
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"Keccak": {
"Keccak": 12
},
"SHA": {
"SHA1": {
"SHA-1": 15
},
"SHA2": {
"SHA-2": 4,
"SHA-224": 5,
"SHA-256": 8,
"SHA-384": 5,
"SHA-512": 3
},
"SHA3": {
"SHA-3": 5,
"SHA3-224": 4,
"SHA3-256": 4,
"SHA3-384": 4,
"SHA3-512": 4
}
},
"SHAKE": {
"SHAKE128": 4,
"SHAKE256": 4
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 8
},
"RNG": {
"RND": 7,
"RNG": 6
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 13,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"Leak-Inherent": 12,
"Physical Probing": 4,
"Side channel": 1,
"physical probing": 3,
"side channel": 9
}
},
"standard_id": {
"BSI": {
"AIS31": 3
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 19,
"CCMB-2012-09-003": 2
},
"FIPS": {
"FIPS 186-4": 4,
"FIPS PUB 140-2": 5,
"FIPS PUB 180-2": 5,
"FIPS PUB 197": 4,
"FIPS PUB 198-1": 2,
"FIPS PUB 202": 6
},
"ISO": {
"ISO/IEC 14888": 2,
"ISO/IEC 7816-3": 1,
"ISO/IEC 9796": 1,
"ISO/IEC 9796-2": 3
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-38B": 1,
"NIST SP 800-56A": 3,
"NIST SP 800-67": 4,
"NIST SP 800-90": 4,
"SP 800-38A": 2,
"SP 800-67": 1,
"SP 800-90A": 1
},
"PKCS": {
"PKCS #1": 8,
"PKCS1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16,
"AES-": 1,
"AES-128": 1,
"AES-192": 1
}
},
"DES": {
"3DES": {
"3DES": 5,
"TDEA": 1,
"TDES": 1
},
"DES": {
"DES": 27
}
},
"constructions": {
"MAC": {
"CMAC": 4,
"HMAC": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
},
"STMicroelectronics": {
"STMicroelectronics": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20171027105542Z",
"/Creator": "FrameMaker 11.0",
"/ModDate": "D:20171221165051+01\u002700\u0027",
"/Producer": "Acrobat Elements 10.0.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 1340706,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.st.com"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 72
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf",
"pp_name": "Security IC Platform Protection Profile, Version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2017_73fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ALC_DVS.2",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2017_73en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a9aafbfa1315221e10c3143ca4febd52a4950bbfe86196139d3e90473e826e5f",
"txt_hash": "0a76a1aa5ea071f5ad4ce8144c9fe2ad129a9c0464b14409593ea5afc9deaf66"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b125c39dcdcfc73a34bbfdd3a1dbc7c1d84aebeb4ad71cf930bc317565acae38",
"txt_hash": "0957a17d7ab341f7346277eb6797ad006ba2cd91497e9fa1b655dd231c25040e"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8458a7c0b1d72b0cf58edc8f1c8bd5deedb5ec7d0fee2b9753c561fefc1526e6",
"txt_hash": "0ffc7bf5859d9765f55a664f47f20336bb635c252c350fef09c9b30e303e5c7e"
}
},
"status": "active"
}