name |
ST33G1M2A and ST33G1M2M (D02) (ANSSI-CC-2020/79-R01) |
ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)(ANSSI-CC-2020/24-R01) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
27.02.2029 |
27.02.2029 |
not_valid_before |
27.02.2024 |
27.02.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_79-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_24-R01fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_79-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_24-R01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_79-R01.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_24-R01en.pdf |
manufacturer |
STMicroelectronics |
STMicroelectronics |
manufacturer_web |
https://www.st.com/ |
https://www.st.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
014d062e509fab86 |
1d67bb03765a278a |
heuristics/cert_id |
ANSSI-CC-2020/79-R01 |
ANSSI-CC-2020/24-R01 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 |
heuristics/extracted_versions |
79, 2020 |
24, 2020 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/79-R01
- description: Le produit évalué est « ST33G1M2A and ST33G1M2M, D02 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications ban
- developer: STMICROELECTRONICS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Micro-circuits
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2020/79-R01
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_79-R01fr.pdf
- certification_date: 2024-02-27
- developer: STMICROELECTRONICS
- evaluation_facility: THALES / CNES
- expiration_date: 2029-02-27
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Loader dedicated for usage in Secured Environment only”
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_79-R01fr.pdf
- sponsor: STMICROELECTRONICS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_79-R01.pdf
- expiration_date: 2029-02-27
- level: EAL5+
- product: ST33G1M2A and ST33G1M2M (D02)
- sponsor: STMICROELECTRONICS
- url: https://cyber.gouv.fr/produits-certifies/st33g1m2a-and-st33g1m2m-d02
|
- cert_id: ANSSI-CC-2020/24-R01
- description: Le produit évalué est « ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM, C04 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont
- developer: STMICROELECTRONICS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Micro-circuits
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2020/24-R01
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_24-R01fr.pdf
- certification_date: 2024-02-27
- developer: STMICROELECTRONICS
- evaluation_facility: THALES / CNES
- expiration_date: 2029-02-27
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Security IC Platform Protection Profile, version 1.0 certifié BSI-CC-PP-0035-2007 le 23 août 2007
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_24-R01fr.pdf
- sponsor: STMICROELECTRONICS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_24-R01en.pdf
- expiration_date: 2029-02-27
- level: EAL5+
- product: ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)
- sponsor: STMICROELECTRONICS
- url: https://cyber.gouv.fr/produits-certifies/st33g1m2a1-including-optional-cryptographic-library-neslib-and-optional-library
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2020_79-R01fr.pdf |
Certificat-CC-2020_24-R01fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: DUCLOS Charlene
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20240229103345+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20240229103346+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20240229093321
- /Title: ANSSI-CC-2020/79-R01
- pdf_file_size_bytes: 145061
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: DUCLOS Charlene
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20240229102447+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20240229102448+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20240229092422
- /Title: ANSSI-CC-2020/24-R01
- pdf_file_size_bytes: 144907
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2020_79-R01fr.pdf |
ANSSI-CC-2020_24-R01fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0035-2007: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-CC-2020_79-R01.pdf |
ANSSI-cible-CC-2020_24-R01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014: 8
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 53
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL5: 17
- EAL5 augmented: 2
- EAL5+: 1
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 3
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 8
- ASE_OBJ.2: 1
- ASE_REQ: 23
- ASE_REQ.2: 1
- ASE_SPD: 5
- ASE_SPD.1: 1
- ASE_TSS: 4
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 4
- FCS_COP.1: 17
- FCS_RNG: 2
- FCS_RNG.1: 6
- FDP:
- FDP_ACC.1: 25
- FDP_ACC.2: 12
- FDP_ACF.1: 35
- FDP_IFC.1: 16
- FDP_ITC.1: 13
- FDP_ITC.2: 2
- FDP_ITT.1: 10
- FDP_SDC: 2
- FDP_SDC.1: 8
- FDP_SDI.2: 8
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FIA:
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 2
- FMT_LIM.1: 17
- FMT_LIM.2: 18
- FMT_MSA.1: 24
- FMT_MSA.3: 33
- FMT_SMF.1: 16
- FMT_SMR.1: 16
- FPT:
- FPT_FLS.1: 11
- FPT_ITT.1: 9
- FPT_PHP.3: 11
- FRU:
|
- FAU:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.4: 4
- FCS_COP.1: 37
- FCS_RNG: 1
- FCS_RNG.1: 7
- FDP:
- FDP_ACC.1: 27
- FDP_ACC.2: 13
- FDP_ACF.1: 38
- FDP_CKM.2: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 14
- FDP_ITC.2: 2
- FDP_ITT.1: 11
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 1
- FMT_LIM.1: 20
- FMT_LIM.2: 19
- FMT_MSA.1: 28
- FMT_MSA.2: 1
- FMT_MSA.3: 38
- FMT_SMF.1: 18
- FMT_SMR.1: 10
- FPT:
- FPT_FLS.1: 12
- FPT_ITT.1: 10
- FPT_PHP.3: 12
- FRU:
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Philips:
- STMicroelectronics:
|
- Infineon:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 14
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
|
- AES_competition:
- AES:
- AES: 17
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 4
- HMAC: 4
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- Keccak:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-224: 5
- SHA-256: 8
- SHA-384: 7
- SHA-512: 5
- SHA3:
- SHA-3: 6
- SHA3-224: 4
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
- SHAKE:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NesLib : 9
- NesLib 281: 1
- NesLib 282: 1
- NesLib 285: 1
- NesLib 289: 1
- NesLib 293: 1
- NesLib 295: 1
- NesLib 296: 1
- NesLib 298: 1
- NesLib 299: 1
- NesLib 6.3: 2
- NesLib 6.3.4: 3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 12
- Physical Probing: 4
- physical probing: 3
- side channel: 1
|
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 12
- Physical Probing: 4
- Side channel: 1
- physical probing: 3
- side channel: 9
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 23
- CCMB-2017-04-003: 2
- FIPS:
- ISO:
- ISO/IEC 13239: 2
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-67: 3
- SP 800-38A: 2
- SP 800-67: 1
- PKCS:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 19
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 186-4: 4
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 5
- FIPS PUB 197: 4
- FIPS PUB 198-1: 2
- FIPS PUB 202: 6
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 3
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 3
- NIST SP 800-67: 3
- NIST SP 800-90: 4
- SP 800-38A: 2
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-67: 1
- SP 800-90A: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 39 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation. 40 The user guidance documentation, part of the TOE, consists of: • the product: 1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation: 1
- out of scope: 1
|
- OutOfScope:
- 35 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded. 36 The user guidance documentation: 1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Christiane DROULERS
- /CreationDate: D:20231010165505Z
- /Creator: FrameMaker 11.0.2
- /ModDate: D:20231010165718+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title: SMD_ST33G1M2AM_VD02_1P.book
- pdf_file_size_bytes: 540528
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 65
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |