PacketLight PL2000 Series with Firmware v1.3.12c

CSV information ?

Status active
Valid from 25.09.2020
Valid until 26.09.2025
Scheme 🇦🇺 AU
Manufacturer PacketLight Network Ltd
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.1, EAL2+

Heuristics summary ?

Certificate ID: Certificate Number: 2020/130

Certificate ?

Extracted keywords

Security level
EAL 2, EAL 2 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1

File metadata

Title SACA75945.d20100615480
Creation date D:20201006154807+10'00'
Modification date D:20201006154807+10'00'
Pages 1
Creator ACA75945.dpe.protected.mil.au
Producer KONICA MINOLTA bizhub C308

Certification report ?

Extracted keywords

Hash functions
SHA-256
Protocols
SSH, TLS, TLS v1.2, TLS 1.2

Security level
EAL2, EAL 2, EAL1, EAL2 augmented, EAL 2 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1
Evaluation facilities
Teron Labs

File metadata

Creation date D:20200921171013+10'00'
Modification date D:20200921171026+10'00'
Pages 15
Creator Acrobat PDFMaker 17 for Word
Producer Adobe PDF Library 15.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HMAC, HMAC-SHA-384, HMAC-SHA-256, HMAC-SHA-512
Asymmetric Algorithms
RSA 2048, ECDH, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-384, SHA-512, SHA-256
Schemes
Key agreement
Protocols
SSH, TLS, TLS v1.2, TLS 1.2
Randomness
TRNG, DRBG, RNG
Elliptic Curves
P-256, P-521, P-384
Block cipher modes
ECB, CBC, CTR, CFB, GCM

Vendor
STM

Security level
EAL2, EAL2 augmented
Claims
O.AUDIT, O.COMMUNICATION, O.ACCESS, O.MANAGEMENT, O.TAMPERING, T.AUDIT, T.COMMUNICATION, T.ACCESS, T.MANAGEMENT, T.TAMPERING, OE.ADMIN, OE.PHYSICAL, OSP.ADMIN, OSP.PHYSICAL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_COP, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_ACF.2, FIA_ATD.1, FIA_UAU.1, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FIA_SOS.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.1.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_PHP.1, FPT_STM.1, FPT_TEE.1, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_STM.1.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ACC.1, FPT_ACF.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.3.1, FTA_SSL.4.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Side-channel analysis
physical tampering

Standards
FIPS 140-2, FIPS140-2, FIPS PUB 197, FIPS 197, FIPS PUB 198, FIPS PUB 180-4, FIPS PUB 186-4, NIST SP 800-90A, SP 800-56A, SP 800-38A, SP 800-38D, SP 800-133, SP 800-90A, SP 800-135, SP 800-52, NIST SP 800-135, PKCS1, RFC 5288, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3
Author jussipekka leiwo
Creation date D:20200831042311Z00'00'
Modification date D:20200831042311Z00'00'
Pages 43
Creator Word
Producer macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext

Heuristics ?

Certificate ID: Certificate Number: 2020/130

Extracted SARs

ADV_FSP.2, ALC_CMC.2, ALC_FLR.1, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0992a5e37d152833ea4a5588d1055f8d5866b030018edb499f918c3da56c9026', 'txt_hash': '645bd8ce86692c5053c6ed11cafc5682459b49de6f710992db6621703876f929'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '95f3c4e9df0df19edefa0efd30d3640c3aa047c49c31efe361e84a81b08e5312', 'txt_hash': '165975d9415b506bc96f9f2d66b6079165f0071c7bfb907db6accab6be4d9ffb'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3044422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 43, '/Title': 'Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3', '/Author': 'jussipekka leiwo', '/Subject': '', '/Producer': 'macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20200831042311Z00'00'", '/ModDate': "D:20200831042311Z00'00'", '/Keywords': '', '/AAPL:Keywords': '[]', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 844980, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'SACA75945.d20100615480', '/Creator': 'ACA75945.dpe.protected.mil.au', '/Producer': 'KONICA MINOLTA bizhub C308', '/CreationDate': "D:20201006154807+10'00'", '/ModDate': "D:20201006154807+10'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_SAR.1': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FCS': {'FCS_CKM.1': 11, 'FCS_CKM.2': 6, 'FCS_CKM.4': 13, 'FCS_COP.1': 5, 'FCS_COP': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 8, 'FDP_IFC.2': 6, 'FDP_IFF.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.2.1': 1, 'FDP_IFC.2.2': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_IFC.1': 6, 'FDP_ACF.2': 1}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.1': 6, 'FIA_UAU.6': 6, 'FIA_UAU.7': 6, 'FIA_UID.1': 10, 'FIA_SOS.1': 6, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 11, 'FMT_MSA.3': 13, 'FMT_SMF.1': 7, 'FMT_SMR.1': 12, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_PHP.1': 6, 'FPT_STM.1': 7, 'FPT_TEE.1': 6, 'FPT_TST.1': 5, 'FPT_FLS.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ACC.1': 1, 'FPT_ACF.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.4': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_TRP.1': 7, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 8, 'O.COMMUNICATION': 7, 'O.ACCESS': 8, 'O.MANAGEMENT': 8, 'O.TAMPERING': 8}, 'T': {'T.AUDIT': 4, 'T.COMMUNICATION': 5, 'T.ACCESS': 5, 'T.MANAGEMENT': 6, 'T.TAMPERING': 5}, 'OE': {'OE.ADMIN': 4, 'OE.PHYSICAL': 3}, 'OSP': {'OSP.ADMIN': 4, 'OSP.PHYSICAL': 4}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17}}, 'constructions': {'MAC': {'HMAC': 4, 'HMAC-SHA-384': 4, 'HMAC-SHA-256': 2, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'DH': 9, 'Diffie-Hellman': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-384': 9, 'SHA-512': 8, 'SHA-256': 3}}}, 'crypto_scheme': {'KA': {'Key agreement': 5}}, 'crypto_protocol': {'SSH': {'SSH': 20}, 'TLS': {'TLS': {'TLS': 16, 'TLS v1.2': 1, 'TLS 1.2': 1}}}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 10}, 'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}, 'CTR': {'CTR': 5}, 'CFB': {'CFB': 1}, 'GCM': {'GCM': 12}}, 'ecc_curve': {'NIST': {'P-256': 8, 'P-521': 4, 'P-384': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 9}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 20, 'FIPS140-2': 6, 'FIPS PUB 197': 1, 'FIPS 197': 2, 'FIPS PUB 198': 2, 'FIPS PUB 180-4': 3, 'FIPS PUB 186-4': 1}, 'NIST': {'NIST SP 800-90A': 2, 'SP 800-56A': 5, 'SP 800-38A': 3, 'SP 800-38D': 3, 'SP 800-133': 1, 'SP 800-90A': 9, 'SP 800-135': 1, 'SP 800-52': 1, 'NIST SP 800-135': 1}, 'PKCS': {'PKCS1': 2}, 'RFC': {'RFC 5288': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to Packetlight PL2000 Series EAL2_ALC_FLR_1 Security Targetv1_3.pdf.
    • The cert_filename property was set to EFT-T010 2020_130 PacketLight Cert - OS_colour_ver.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to Certificate Number: 2020/130.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '040f1500909fd6a73da6eb32c9a3e435a6a8222ebb6f2148f414b7667975b512', 'txt_hash': 'cec50d0632b01f9044a75428b1210f349d9eecc7e2a10d41243e31307e43bc93'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 541271, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Author': '', '/Checked by': '32123', '/Comments': '', '/Company': '', '/CreationDate': "D:20200921171013+10'00'", '/Creator': 'Acrobat PDFMaker 17 for Word', '/Keywords': '', '/ModDate': "D:20200921171026+10'00'", '/Objective-Caveats': '', '/Objective-Classification': '[Inherited - Unclassified]', '/Objective-Comment': '', '/Objective-CreationStamp': 'D:20200821', '/Objective-DatePublished': '', '/Objective-Document Type [system]': '', '/Objective-FileNumber': '', '/Objective-Id': 'BN20396975', '/Objective-IsApproved': '0', '/Objective-IsPublished': '0', '/Objective-ModificationStamp': 'D:20200921', '/Objective-Owner': 'Clacher, Chris MR', '/Objective-Parent': 'CR', '/Objective-Path': 'Objective Global Folder - PROD:Defence Business Units:Australian Signals Directorate:ASD : Australian Signals Directorate:ACSC GROUP:CSS - CYBER SECURITY SERVICES DIVISION:Technical Uplift Branch - TU:Standards & Guidelines:4. Australasian Certification A', '/Objective-State': 'Being Edited', '/Objective-Title': 'ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c EAL2+', '/Objective-Version': '0.13', '/Objective-VersionComment': '', '/Objective-VersionNumber': '13', '/Producer': 'Adobe PDF Library 15.0', '/SourceModified': 'D:20200921070954', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.commoncriteriaportal.org/', 'https://www.cyber.gov.au/ism', 'https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf', 'https://www.nzism.gcsb.govt.nz/ism-document/', 'https://www.gcsb.govt.nz/']}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL 2': 1, 'EAL1': 1, 'EAL2 augmented': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Teron': {'Teron Labs': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'TLS': {'TLS': 1, 'TLS v1.2': 1, 'TLS 1.2': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c v1.0.pdf.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ACSC%20Certification%20Report%20EFT-T010%20PacketLight%20PL-2000%201.3.12c%20v1.0.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Packetlight%20PL2000%20Series%20EAL2_ALC_FLR_1%20Security%20Targetv1_3.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name PacketLight PL2000 Series with Firmware v1.3.12c was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T010%202020_130%20PacketLight%20Cert%20-%20OS_colour_ver.pdf",
  "dgst": "e1b196cd909833bb",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "Certificate Number: 2020/130",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.3.12"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "PacketLight Network Ltd",
  "manufacturer_web": "https://www.packetlight.com/",
  "name": "PacketLight PL2000 Series with Firmware v1.3.12c",
  "not_valid_after": "2025-09-26",
  "not_valid_before": "2020-09-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "EFT-T010 2020_130 PacketLight Cert - OS_colour_ver.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20201006154807+10\u002700\u0027",
      "/Creator": "ACA75945.dpe.protected.mil.au",
      "/ModDate": "D:20201006154807+10\u002700\u0027",
      "/Producer": "KONICA MINOLTA bizhub C308",
      "/Title": "SACA75945.d20100615480",
      "pdf_file_size_bytes": 844980,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c v1.0.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL1": 1,
          "EAL2": 3,
          "EAL2 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 1,
            "TLS 1.2": 1,
            "TLS v1.2": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Teron": {
          "Teron Labs": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/Checked by": "32123",
      "/Comments": "",
      "/Company": "",
      "/CreationDate": "D:20200921171013+10\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/Keywords": "",
      "/ModDate": "D:20200921171026+10\u002700\u0027",
      "/Objective-Caveats": "",
      "/Objective-Classification": "[Inherited - Unclassified]",
      "/Objective-Comment": "",
      "/Objective-CreationStamp": "D:20200821",
      "/Objective-DatePublished": "",
      "/Objective-Document Type [system]": "",
      "/Objective-FileNumber": "",
      "/Objective-Id": "BN20396975",
      "/Objective-IsApproved": "0",
      "/Objective-IsPublished": "0",
      "/Objective-ModificationStamp": "D:20200921",
      "/Objective-Owner": "Clacher, Chris MR",
      "/Objective-Parent": "CR",
      "/Objective-Path": "Objective Global Folder - PROD:Defence Business Units:Australian Signals Directorate:ASD : Australian Signals Directorate:ACSC GROUP:CSS - CYBER SECURITY SERVICES DIVISION:Technical Uplift Branch - TU:Standards \u0026 Guidelines:4. Australasian Certification A",
      "/Objective-State": "Being Edited",
      "/Objective-Title": "ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c EAL2+",
      "/Objective-Version": "0.13",
      "/Objective-VersionComment": "",
      "/Objective-VersionNumber": "13",
      "/Producer": "Adobe PDF Library 15.0",
      "/SourceModified": "D:20200921070954",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 541271,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.cyber.gov.au/ism",
          "https://www.gcsb.govt.nz/",
          "https://www.commoncriteriaportal.org/",
          "https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf",
          "https://www.nzism.gcsb.govt.nz/ism-document/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "Packetlight PL2000 Series EAL2_ALC_FLR_1 Security Targetv1_3.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 5
          },
          "ECDH": {
            "ECDH": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 9,
            "Diffie-Hellman": 6
          }
        },
        "RSA": {
          "RSA 2048": 2
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.ACCESS": 8,
          "O.AUDIT": 8,
          "O.COMMUNICATION": 7,
          "O.MANAGEMENT": 8,
          "O.TAMPERING": 8
        },
        "OE": {
          "OE.ADMIN": 4,
          "OE.PHYSICAL": 3
        },
        "OSP": {
          "OSP.ADMIN": 4,
          "OSP.PHYSICAL": 4
        },
        "T": {
          "T.ACCESS": 5,
          "T.AUDIT": 4,
          "T.COMMUNICATION": 5,
          "T.MANAGEMENT": 6,
          "T.TAMPERING": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.1": 7
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 4,
          "EAL2 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 11,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 6,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 13,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 9,
          "FCS_COP.1": 5
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ACF.2": 1,
          "FDP_IFC.1": 6,
          "FDP_IFC.2": 6,
          "FDP_IFC.2.1": 1,
          "FDP_IFC.2.2": 1,
          "FDP_IFF.1": 7,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4
        },
        "FIA": {
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 6,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.6": 6,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 6,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 10,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MSA.1": 11,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 13,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ACC.1": 1,
          "FPT_ACF.1": 1,
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1,
          "FPT_TEE.1": 6,
          "FPT_TEE.1.1": 1,
          "FPT_TEE.1.2": 1,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 5,
          "FTA_SSL.4.1": 1
        },
        "FTP": {
          "FTP_TRP.1": 7,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 5
        },
        "GCM": {
          "GCM": 12
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 20
        },
        "TLS": {
          "TLS": {
            "TLS": 16,
            "TLS 1.2": 1,
            "TLS v1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 5
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 8,
          "P-384": 4,
          "P-521": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-256": 3,
            "SHA-384": 9,
            "SHA-512": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 10
        },
        "RNG": {
          "RNG": 2
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 9
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 20,
          "FIPS 197": 2,
          "FIPS PUB 180-4": 3,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 198": 2,
          "FIPS140-2": 6
        },
        "NIST": {
          "NIST SP 800-135": 1,
          "NIST SP 800-90A": 2,
          "SP 800-133": 1,
          "SP 800-135": 1,
          "SP 800-38A": 3,
          "SP 800-38D": 3,
          "SP 800-52": 1,
          "SP 800-56A": 5,
          "SP 800-90A": 9
        },
        "PKCS": {
          "PKCS1": 2
        },
        "RFC": {
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 4,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 4,
            "HMAC-SHA-512": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STM": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/AAPL:Keywords": "[]",
      "/Author": "jussipekka leiwo",
      "/CreationDate": "D:20200831042311Z00\u002700\u0027",
      "/Creator": "Word",
      "/Keywords": "",
      "/ModDate": "D:20200831042311Z00\u002700\u0027",
      "/Producer": "macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext",
      "/Subject": "",
      "/Title": "Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3",
      "pdf_file_size_bytes": 3044422,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 43
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ACSC%20Certification%20Report%20EFT-T010%20PacketLight%20PL-2000%201.3.12c%20v1.0.pdf",
  "scheme": "AU",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Packetlight%20PL2000%20Series%20EAL2_ALC_FLR_1%20Security%20Targetv1_3.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "95f3c4e9df0df19edefa0efd30d3640c3aa047c49c31efe361e84a81b08e5312",
      "txt_hash": "165975d9415b506bc96f9f2d66b6079165f0071c7bfb907db6accab6be4d9ffb"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "040f1500909fd6a73da6eb32c9a3e435a6a8222ebb6f2148f414b7667975b512",
      "txt_hash": "cec50d0632b01f9044a75428b1210f349d9eecc7e2a10d41243e31307e43bc93"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0992a5e37d152833ea4a5588d1055f8d5866b030018edb499f918c3da56c9026",
      "txt_hash": "645bd8ce86692c5053c6ed11cafc5682459b49de6f710992db6621703876f929"
    }
  },
  "status": "active"
}