| name |
BEA WebLogic Integration V8.1 SP6 with BEA07-169.00 Security Advisory Patch |
Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèqueWear Levelling version 06.03.02.02 |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
US |
FR |
| status |
archived |
archived |
| not_valid_after |
20.07.2012 |
06.04.2025 |
| not_valid_before |
19.10.2007 |
29.01.2018 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_02-s01.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10029-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_02fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10029-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_02en.pdf |
| manufacturer |
BAE Systems, Inc. |
Wisekey |
| manufacturer_web |
https://www.baesystems.com/ |
https://www.wisekey.com |
| security_level |
EAL2+, ALC_FLR.1 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
5a82ae64e7775111 |
ff1e497a4f732f43 |
| heuristics/cert_id |
CCEVS-VR-VID-10029-2007 |
ANSSI-CC-2018/02 |
| heuristics/cert_lab |
US |
CEA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_HLD.1, AVA_VLA.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ADV_RCR.1, AGD_ADM.1, AVA_SOF.1, AGD_USR.1, ALC_FLR.1, ADV_SPM.1, ADV_FSP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions |
8.1, 169.00 |
06.04.01.07, 06.03.02.02 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2020/20 |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2016/16 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/20 |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2016/16 |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10029/
- categories: ['Web Server']
- category: Web Server
- certification_date: 19.10.2007
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10029
- product: BEA Weblogic Integration V8.1 SP6 with BEA07-169.00 security advisory patch
- scheme: US
- url: https://www.niap-ccevs.org/products/10029
- vendor: BEA Systems, Inc.
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
certificat-anssi-cc-2018_02-s01.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: jchuzel
- /CreationDate: D:20220906094656+02'00'
- /ModDate: D:20220906094656+02'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - PS-certificat-ANSSI-CC-2018_02-S01
- pdf_file_size_bytes: 1258024
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
st_vid10029-vr.pdf |
anssi-cc-2018_02fr.pdf |
| pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID10029-2007
- cert_item: BEA WebLogic Integration V8.1 SP6
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/02
- cert_item: Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèque Wear Levelling version 06.03.02.02
- cert_item_version: Part number 0x44, hardware revision E, Toolbox Library version 0x06040107, Wear Levelling Library version 0x06030202
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France. Commanditaire Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014, le 19 février 2014 avec conformité au “ Package 1 : Loader dedicated for usage by authorized users only
- US:
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10029-2007: 1
|
- FR:
- ANSSI-CC-2016/16: 3
- ANSSI-CC-2018/02: 17
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL: 1
- A.NO_UNTRUSTED: 1
- A.PHYSICAL: 1
- T:
- T.BYPASS: 1
- T.EXCESS_AUTHORITY: 1
- T.NOCRYPTO: 1
- T.NO_TIME: 1
- T.STORAGE: 1
- T.TAMPER: 1
- T.TSF_COMPROMISE: 1
- T.UNACCOUNTABLE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNDETECTED_ACTIONS: 1
- T.UNIDENTIFIED_USERS: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename |
st_vid10029-st.pdf |
anssi-cible-cc-2018_02en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 16
- EAL 2 augmented: 14
- EAL2: 1
|
- EAL:
- EAL4: 2
- EAL4+: 1
- EAL5: 9
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL: 1
- ADO_DEL.1: 7
- ADO_IGS: 1
- ADO_IGS.1: 7
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 20
- ADV_HLD: 1
- ADV_HLD.1: 16
- ADV_RCR: 1
- ADV_RCR.1: 8
- ADV_SPM.1: 5
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 18
- AGD_USR: 1
- AGD_USR.1: 15
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.1: 6
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 9
- AVA:
- AVA_SOF: 1
- AVA_SOF.1: 8
- AVA_VLA: 1
- AVA_VLA.1: 10
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAR: 2
- FAU_SAR.1: 3
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 2
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM: 21
- FCS_CKM.1: 5
- FCS_CKM.2: 2
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP: 21
- FCS_COP.1: 3
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 3
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 5
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 3
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA: 8
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.2: 18
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 3
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM: 15
- FPT_SEP: 17
- FPT_STM: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_SAS: 1
- FAU_SAS.1: 13
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.4: 12
- FCS_COP: 17
- FCS_COP.1: 15
- FCS_COP.1.1: 13
- FCS_RNG.1: 19
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 22
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_ITT.1: 22
- FDP_ITT.1.1: 1
- FDP_SDC: 1
- FDP_SDC.1: 11
- FDP_SDC.1.1: 1
- FDP_SDI.1: 3
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_API: 1
- FIA_API.1: 11
- FIA_API.1.1: 1
- FMT:
- FMT_LIM: 17
- FMT_LIM.1: 28
- FMT_LIM.1.1: 1
- FMT_LIM.2: 29
- FMT_LIM.2.1: 1
- FPT:
- FPT_FLS.1: 24
- FPT_FLS.1.1: 1
- FPT_ITT.1: 20
- FPT_ITT.1.1: 1
- FPT_PHP.3: 25
- FPT_PHP.3.1: 1
- FPT_SDI.2: 2
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 20
- FRU_FLT.2.1: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.NO_EVIL: 3
- A.NO_UNTRUSTED: 2
- A.PHYSICAL: 3
- O:
- O.AUDIT_GENERATION: 4
- O.CRYPTOGRAPHY: 3
- O.ID_AND_AUTH: 4
- O.MANAGE: 3
- O.MEDIATE: 4
- O.ROLES: 3
- O.SELF_PROTECTION: 4
- OE:
- OE.CRYPTOGRAPHY: 4
- OE.JAVA: 3
- OE.OS: 4
- T:
- T.BYPASS: 3
- T.EXCESS_AUTHORITY: 2
- T.NOCRYPTO: 2
- T.NO_TIME: 3
- T.STORAGE: 3
- T.TAMPER: 2
- T.TSF_COMPROMISE: 3
- T.UNACCOUNTABLE: 2
- T.UNAUTHORIZED_ACCESS: 3
- T.UNDETECTED_ACTIONS: 2
- T.UNIDENTIFIED_USERS: 3
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 3
- SHA-512: 3
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- Malfunction: 19
- malfunction: 8
- physical tampering: 2
- SCA:
- Leak-Inherent: 14
- Physical Probing: 1
- Physical probing: 1
- physical probing: 4
- side channel: 2
- timing attacks: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 180-4: 5
- FIPS 186-4: 4
- FIPS 197: 1
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 2
- SP 800-38A: 1
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: SAIC CCTL IA Team
- /Company: BEA Systems, Inc.
- /CreationDate: D:20071106093954-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20071106094325-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20071106125012
- /Subject: Security Target
- /Title: BEA WebLogic Platform Security Target
- pdf_file_size_bytes: 517060
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |