| name |
Thales Trusted Security Filter TSF201 |
SECIRON – Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 |
| category |
Boundary Protection Devices and Systems |
Mobility |
| scheme |
NO |
MY |
| status |
archived |
active |
| not_valid_after |
21.06.2022 |
06.02.2029 |
| not_valid_before |
01.02.2016 |
06.02.2024 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C129-CERTIFICATE-v1.pdf |
| report_link |
https://www.commoncriteriaportal.org/files/epfiles/20160201%20SERTIT-060%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C129-CR-v1a.pdf |
| st_link |
https://www.commoncriteriaportal.org/files/epfiles/3AQ%2025940%20AAAA%20377%20EN%20Security%20Target%20for%20TSF%20201%20ed%20%202.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SECIRON%20–%20Android%20Mobile%20Application%20Hardening%20Sandbox%20Module%20(AMAHSM)%20version%207.0-Security%20Target-1.0.pdf |
| manufacturer |
Thales Norway AS |
SecIron (Malaysia) Sdn. Bhd. |
| manufacturer_web |
|
https://www.seciron.com |
| security_level |
EAL5, ALC_FLR.3 |
EAL2 |
| dgst |
1da3d62f11bf4beb |
17bfc3f4edcb545c |
| heuristics/cert_id |
SERTIT-060 |
ISCB-3-RPT-C129-CR-v1a |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, AVA_VAN.4, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
{} |
| heuristics/extracted_versions |
- |
7.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- category: Boundary Protection Devices and Systems
- certification_date: 01.02.2016
- developer: Thales Norway AS
- enhanced:
- category: Boundary Protection Devices and Systems
- cert_id: SERTIT-060
- certification_date: 01.02.2016
- description: The TOE is a contents-filtering gateway consisting of both hardware and software. It enables data transfer in a secure manner between two IP networks of different security classifications. Its design shall be trusted to perform separation of data between a HIGH (high security classification) network and a LOW (low security classification) network in a way upholding the security policy concerning data export and import between the individual networks.
- developer: Thales Norway AS
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135010-1607952512/SERTIT/Sertifikater/2016/60/20160201%20Sertit-060%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135016-1607952522/SERTIT/Sertifikater/2016/60/2018%20TSF201%20Security%20Target.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/135019-1607952527/SERTIT/Sertifikater/2016/60/3AQ%2025940%20AAAA%20377%20EN%20Security%20Target%20for%20TSF%20201%20ed%20%202.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/136621-1625575272/SERTIT/Sertifikater/2016/60/3AQ%2025940%20AAAA%20377%20Security%20Target%20for%20TSF%20201%20v4.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135013-1607952517/SERTIT/Sertifikater/2016/60/20160201%20SERTIT-060%20CR%20v1.0.pdf'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/135007-1607952508/SERTIT/Sertifikater/2016/60/20181129%20Sertit-060%20Maintenance%20report%201.0.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/136615-1625568416/SERTIT/Sertifikater/2016/60/SERTIT-060%20MR%20v%202.0.pdf'})]})
- evaluation_facility: NTT Com Security (Norway) AS
- expiration_date: 01.02.2021
- level: EAL 5, ALC_FLR.3
- mutual_recognition: CCRA, SOG-IS
- product: HW version: 3AQ 25960 BAAA rev. C; SW version: 3AQ 25950 AAAA rev. 2.2 build 0013
- sponsor: Thales Norway AS
- product: Thales Trusted Security Filter TSF201
- url: https://sertit.no/certified-products/product-archive/thales-trusted-security-filter-tsf201
|
- cert_no: 2024-001-C129
- certification_date: 06.02.2024
- developer: SecIron (Malaysia) Sdn. Bhd. (201801025495 (1287515-T))
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C129
- certification_date: 06.02.2024
- developer: Unit 704, Uptown One, No. 1, Jalan SS21/58, Damansara Uptown, 47400 Petaling Jaya, SelangorE-mail: [email protected]: +601133503181Website: https://www.seciron.com
- expiration_date: 06.02.2029
- mutual_recognition: CCRA
- product: SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/ISCB-3-RPT-C129-CR-v1a.pdf
- scope: Android Mobile Application Hardening Sandbox Module is a product designed by SECIRON and developed as part of IronWALL. IronWALL is designed to safeguard against a wide range of threats, including mobile application tampering, reverse engineering, debugging, jailbreaks, application cloning, malware, repackaging and other attacks on untrusted environment. The integrated security guarantee service effectively prevents malicious attacks against mobile applications such as de-compilation, repackaging, memory injection, dynamic debugging, data theft, transaction hijacking, and application phishing, and comprehensively protects application software security.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/SECIRON__Android_Mobile_Application_Hardening_Sandbox_Module_AMAHSM_version_7.0-Security_Target-1.0.pdf
- type: Mobility
- expiration_date: 06.02.2029
- level: EAL2
- product: SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/169
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
ISCB-5-CERT-C129-CERTIFICATE-v1.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20240222045557Z00'00'
- /Creator: Word
- /ModDate: D:20240222045557Z00'00'
- /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
- /Title: ISCB-5-CERT-C129-CERTIFICATE-v1
- pdf_file_size_bytes: 829372
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
20160201 SERTIT-060 CR v1.0.pdf |
ISCB-3-RPT-C129-CR-v1a.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- MY:
- ISCB-5-RPT-C129-CR-v1a: 30
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 2
- EAL1: 1
- EAL5: 19
- EAL5 augmented: 18
- EAL7: 1
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 1
- FAU_GEN.1: 1
- FAU_SAA.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.2: 2
- FDP_IFF.1: 2
- FDP_IFF.6: 2
- FDP_ITC.2: 2
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.1: 1
- FPT_STM.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CLEARANCE: 1
- A.MAN: 1
- A.PHYSICAL: 1
- A.TRAINING: 1
- A.USAGE: 1
- O:
- O.ALARM: 1
- O.AUDIT: 1
- O.CRYPTO: 1
- O.EMERGENCY: 1
- O.FILTER: 1
- O.FW: 1
- O.KEY: 2
- O.NO: 1
- O.ROBUST: 1
- O.SECURE: 2
- O.SELF: 1
- OE:
- OE.AUDIT: 1
- OE.KEY: 1
- OE.MAN: 1
- T:
- T.ILLEGAL: 1
- T.MISUSE: 1
- T.SECURE: 1
- T.TAMPERING: 1
- T.TEMPEST: 1
- T.UNAUTHORISED: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Arne
- /CreationDate: D:20160203130054+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20160203130146+01'00'
- /Producer: Acrobat Distiller 9.5.5 (Windows)
- /Title: Microsoft Word - 20160201 SERTIT-060 CR v1.0.docx
- pdf_file_size_bytes: 607971
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /CreationDate: D:20240222044408Z00'00'
- /Creator: Word
- /ModDate: D:20240222044408Z00'00'
- /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
- /Title: ISCB-3-RPT-C129-CR-v1a
- pdf_file_size_bytes: 1100872
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
| pdf_data/st_filename |
3AQ 25940 AAAA 377 EN Security Target for TSF 201 ed 2.pdf |
|
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 4
- EAL5 augmented: 2
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 11
- FAU_ARP.1.1: 2
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA: 1
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.2.2: 1
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 18
- FCS_COP.1.1: 2
- FCS_ITC.1: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 10
- FDP_IFC.2: 16
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.6: 10
- FDP_IFF.6.1: 1
- FDP_ITC.1: 7
- FDP_ITC.2: 20
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_DES_EXT.1: 9
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 14
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CLEARANCE: 4
- A.MAN: 3
- A.PHYSICAL: 5
- A.TRAINING: 3
- A.USAGE: 4
- O:
- O.ALARM: 6
- O.AUDIT: 10
- O.CRYPTO: 7
- O.EMERGENCY: 9
- O.FILTER: 12
- O.FW: 6
- O.KEY: 13
- O.NO: 10
- O.ROBUST: 12
- O.SECURE: 16
- O.SELF: 8
- OE:
- OE.AUDIT: 4
- OE.KEY: 3
- OE.MAN: 4
- T:
- T.CONN: 4
- T.ILLEGAL: 4
- T.MISUSE: 3
- T.SECURE: 4
- T.TAMPERING: 5
- T.TEMPEST: 4
- T.UNAUTHORISED: 3
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 1
- physical tampering: 3
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- RFC:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: a3143
- /CreationDate: D:20150914135017+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151106125350+01'00'
- /Producer: Microsoft® Word 2010
- /Title: System/Subsystem Specification
- pdf_file_size_bytes: 963956
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
False |
| state/st/download_ok |
True |
False |
| state/st/extract_ok |
True |
False |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |