name |
Secure Microcontroller ATMEL AT90SC9604RU rev. E |
Argus Command Center Web Portal Stable Version 2.1 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
FR |
MY |
status |
archived |
active |
not_valid_after |
01.09.2019 |
23.06.2026 |
not_valid_before |
14.03.2008 |
23.06.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_08en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_08en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20–%20Argus%20CC%20EAL2%20–%20Security%20Target%20[ASE]-v1.14%202.pdf |
manufacturer |
ATMEL Secure Products Division |
Certis CISCO Security Pte Ltd (Certis) |
manufacturer_web |
https://www.atmel.com |
https://www.certisgroup.com/ |
security_level |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
EAL2 |
dgst |
03f7c749e5ea5a43 |
c86ad5ef88d4cf8b |
heuristics/cert_id |
ANSSI-CC-2008/08 |
ISCB-3-RPT-C115-CR-v1 |
heuristics/cert_lab |
CEA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, ADV_RCR.1, AVA_VLA.4, ALC_TAT.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_FSP.2, ADV_IMP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
2.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20210630131348Z
- /Creator: Word
- /ModDate: D:20210630215915+08'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 205722
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
dcssi-2008_08en.pdf |
ISCB-5-RPT-C115-CR-v1.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
- cc_version: Common Criteria version 2.3 compliant with ISO 15408:2005
- cert_id: DCSSI-2008/08
- cert_item: ATMEL Secure Microcontroller AT90SC9604RU rev. E
- cert_item_version: AT90SC9604RU, reference AT58U08 revision E
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 40 87, email : [email protected]
- developer: Atmel Secure Microcontroller Solutions Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR – Scotland, United Kingdom Sponsor Atmel Secure Microcontroller Solutions Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR – Scotland, United Kingdom
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: PP/9806
|
|
pdf_data/report_keywords/cc_cert_id |
|
- MY:
- ISCB-3-RPT-C115-CR-v1: 35
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 1
|
- ALC:
- ALC_CMS.2: 1
- ALC_DEL.1: 1
|
pdf_data/report_keywords/cc_sfr |
|
- FDP:
- FDP_ACC.1: 14
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 5
- FIA_SOS.1: 3
- FIA_SOS.2: 2
- FIA_UAU.1: 2
- FIA_UID.1: 7
- FMT:
- FMT_MSA.1: 7
- FMT_SMF.1: 3
- FMT_SMR.1: 3
- FTP:
- FTP_ITC.1: 17
- FTP_TRP.1: 2
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CLOUD: 1
- A.CONNECTIVITY: 1
- A.DDOS: 1
- A.MALWARE: 1
- A.THIRDPARTY: 1
- A.TIMESTAMP: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_DEV: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 1
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Mathieu Robert
- /CreationDate: D:20080314103032+01'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.5
- /ModDate: D:20080314103035+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: ATMEL Secure Microcontroller AT90SC9604RU rev. E
- /Title: DCSSI-2008/08
- pdf_file_size_bytes: 252931
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 16
|
- /CreationDate: D:20210629084408Z00'00'
- /Creator: Word
- /ModDate: D:20210629084408Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 800031
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
dcssi-cible2008_08en.pdf |
2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.2: 3
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 4
- AVA_SOF.1: 1
- AVA_VLA.4: 3
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 4
- ASE:
- ASE_CCL.1: 3
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 5
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FDP:
- FDP_ACC.2: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 2
- FDP_IFF.1: 2
- FDP_SDI.1: 2
- FIA:
- FIA_ATD.1: 5
- FIA_UAU.2: 5
- FIA_UID.2: 5
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.1: 2
- FMT_MSA.3: 2
- FMT_SMF.1: 3
- FMT_SMR.1: 2
- FPR:
- FPT:
- FPT_PHP.2: 2
- FPT_PHP.3: 2
- FPT_TST.1: 2
|
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_SOS.2: 5
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.DEV_ORG: 1
- A.DLV_AUDIT: 1
- A.DLV_PROTECT: 2
- A.DLV_RESP: 1
- A.SOFT_ARCHI: 1
- A.USE_DIAG: 1
- A.USE_PROD: 2
- A.USE_SYS: 1
- A.USE_TEST: 1
- O:
- O.CLON: 1
- O.CRYPTO: 2
- O.DESIGN_ACS: 1
- O.DEV_DIS: 1
- O.DEV_TOOLS: 1
- O.DIS_MECHANISM: 1
- O.DIS_MEMORY: 1
- O.DLV_AUDIT: 1
- O.DLV_PROTECT: 2
- O.DLV_RESP: 1
- O.DSOFT_ACS: 1
- O.FLAW: 1
- O.IC_DLV: 1
- O.MASK_FAB: 1
- O.MECH_ACS: 1
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.SOFT_ACS: 1
- O.SOFT_DLV: 1
- O.SOFT_MECH: 1
- O.TAMPER: 1
- O.TEST_OPERATE: 2
- O.TI_ACS: 1
- O.TOE_PRT: 1
- O.USE_DIAG: 1
- O.USE_SYS: 1
- T:
- T.CLON: 2
- T.DIS_DEL: 2
- T.DIS_DESIGN: 2
- T.DIS_DSOFT: 2
- T.DIS_INFO: 2
- T.DIS_PHOTOMASK: 2
- T.DIS_SOFT: 2
- T.DIS_TEST: 2
- T.DIS_TOOLS: 2
- T.MOD_DEL: 2
- T.MOD_DESIGN: 2
- T.MOD_DSOFT: 2
- T.MOD_PHOTOMASK: 2
- T.MOD_SOFT: 2
- T.T_DEL: 2
- T.T_PHOTOMASK: 2
- T.T_PRODUCT: 2
- T.T_SAMPLE: 2
|
- A:
- A.CLOUD: 3
- A.CONNECTIVITY: 4
- A.DDOS: 3
- A.MALWARE: 4
- A.THIRDPARTY: 3
- A.TIMESTAMP: 4
- A.TRUSTED_ADMIN: 4
- A.TRUSTED_DEV: 3
- O:
- O.SEC_ACCESS: 5
- O.SEC_AUTHENTICATE: 5
- O.SEC_COMMUNICATION: 5
- O.SEC_PASSWORD_GENER: 1
- O.SEC_PASSWORD_GENERATION: 3
- OE:
- OE.ADMINISTRATOR: 3
- OE.ANTI_DDOS: 3
- OE.ANTI_MALWARE: 3
- OE.DEVELOPER: 3
- OE.SAFE_CLOUD: 3
- OE.SAFE_CONNECTIVITY: 3
- OE.SYN_TIMESTAMP: 3
- OE.THIRDPARTY: 3
- T:
- T.BROKEN_AUTH: 4
- T.INTERCEPTION: 4
- T.UNAUTHORIZED_AC: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.WEAK_PASSWORD_: 1
- T.WEAK_PASSWORD_GENE: 1
- T.WEAK_PASSWORD_GENERATION: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 1
- physical tampering: 5
- SCA:
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope: 1
- environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and: 1
- infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s: 1
- inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the: 1
- out of scope: 5
- together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting: 1
|
pdf_data/st_metadata |
- /Author: sc188jb
- /CreationDate: D:20080213154951Z
- /Creator: FrameMaker 6.0
- /ModDate: D:20080304082104Z
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: TPG0142A.book
- pdf_file_size_bytes: 569355
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 71
|
- /Author: CLAIREHYC
- /CreationDate: D:20210701124256+08'00'
- /Creator: PDFCreator Free 4.2.0
- /Keywords:
- /ModDate: D:20210701124256+08'00'
- /Producer: GPL Ghostscript 9.52
- /Subject:
- /Title: 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14
- pdf_file_size_bytes: 1022047
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |