Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PR/SM for IBM z13 EC GA1 Driver Level D22H
BSI-DSZ-CC-0953-2015
Juniper Networks JUNOS 10.0 r4 for J-Series and SRX-Series Platforms
Certificate Number: 2011/75
name PR/SM for IBM z13 EC GA1 Driver Level D22H Juniper Networks JUNOS 10.0 r4 for J-Series and SRX-Series Platforms
category Operating Systems Network and Network-Related Devices and Systems
scheme DE AU
not_valid_after 15.10.2020 13.07.2017
not_valid_before 15.10.2015 15.07.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0953a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS%20T027%20Certification%20Report%201%203.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0953b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20JUNOS%2010-0%20EAL3%20Reval%20ST%20v2-0.pdf
manufacturer IBM Corporation Juniper Networks, Inc.
manufacturer_web https://www.ibm.com https://www.juniper.net/
security_level EAL5+, AVA_VAN.5, ALC_TAT.3, ATE_FUN.2, ALC_FLR.3 EAL3
dgst 7bc03fce81366b24 f38a309403b4e023
heuristics/cert_id BSI-DSZ-CC-0953-2015 Certificate Number: 2011/75
heuristics/cert_lab BSI []
heuristics/cpe_matches {} cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2014-3818, CVE-2024-30380, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2022-22214, CVE-2024-39511, CVE-2023-28962, CVE-2024-39514, CVE-2023-36841, CVE-2024-39558, CVE-2013-6618, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2023-44184, CVE-2023-44175, CVE-2022-22243, CVE-2023-44186, CVE-2023-22406, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2022-22181, CVE-2022-22162, CVE-2022-22163, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2023-44194, CVE-2004-0468, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2024-21594, CVE-2024-39517, CVE-2024-21591, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2013-6170, CVE-2021-31362, CVE-2022-22197, CVE-2022-22245, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2023-22391, CVE-2023-44176
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.4, ASE_REQ.2, ALC_DVS.1, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 ALC_DVS.1, ATE_COV.2, ATE_FUN.1, ADV_TDS.2, ATE_IND.2, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_FSP.3, AVA_VAN.2, ALC_CMC.3, ATE_DPT.1, ALC_CMS.3, AGD_PRE.1
heuristics/extracted_versions - 10.0
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-1005-2016 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-0900-2014 {}
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-1101-2019, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-1186-2023, BSI-DSZ-CC-1222-2024, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-1133-2020, BSI-DSZ-CC-1048-2018, BSI-DSZ-CC-1005-2016 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0715-2011, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-0900-2014 {}
pdf_data/report_filename 0953a_pdf.pdf EFS T027 Certification Report 1 3.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5 SOGIS Recognition Agreement for components up to EAL 4
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-0953-2015
    • cert_item: PR/SM for IBM z13 EC GA1 Driver Level D22H
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0900-2014: 3
    • BSI-DSZ-CC-0953-2015: 19
  • AU:
    • Certificate Number: 2011/75: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 12
    • EAL 5: 13
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 3: 5
    • EAL2: 1
    • EAL3: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 3
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 3
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 7
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 3
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 7
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 7
  • ADV:
    • ADV_ARC.1: 2
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.4: 3
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.PHYSICAL: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA1: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 8
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 2, 2015-09-24, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] z13 Hardware Management Console Operations Guide Version 2.13.0, Version 2.13.0, March 2015: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • out of scope: 1
    • prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP. Authentication services can be handled either internally (fixed user selected: 1
pdf_data/report_metadata
  • /AISEF: stratsec
  • /Author: Windows User
  • /Category: Report
  • /Cert_Level: EAL 3
  • /Company: Australasian Information Security Evaluation Program
  • /CreationDate: D:20110719125815+10'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /Date completed: 15 July 2011
  • /Developer: Juniper Networks
  • /IssueDate: 15 July 2011
  • /ModDate: D:20110719125849+10'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Product: Juniper Networks JUNOS 10.0 r4 for J-Series and SRX-Series Platforms
  • /Recorded date: 15 July 2011
  • /SourceModified: D:20110719025419
  • /Subject: Certificate Number: 2011/75
  • /Title: Certification Report
  • /docVersion: 1.2
  • pdf_file_size_bytes: 249278
  • pdf_hyperlinks: http://www.juniper.net/techpubs/, http://www.dsd.gov.au/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename 0953b_pdf.pdf JNPR JUNOS 10-0 EAL3 Reval ST v2-0.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0953: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 4
  • EAL:
    • EAL3: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 2
    • ADV_IMP.1: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.3: 2
    • ATE_FUN.2: 4
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.3: 2
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.3: 2
    • ALC_CMS.3: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 25
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 43
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 27
    • FMT_MSA.1: 13
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_RSA.1: 7
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_ARP.1: 6
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAA.1: 6
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCO:
    • FCO_NRO.2: 6
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 15
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_ROL.1: 5
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 6
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.SIE: 3
  • T:
    • T.LPAR_XCTL: 5
  • A:
    • A.CRYPTO: 2
    • A.EAUTH: 1
    • A.LOCATE: 2
    • A.NOEVIL: 4
    • A.TIME: 1
  • O:
    • O.ACCESS: 19
    • O.AMANAGE: 21
    • O.AUDIT: 23
    • O.AUTHENTICITY: 14
    • O.CONFIDENTIALITY: 16
    • O.EADMIN: 12
    • O.FLOW: 13
    • O.INTEGRITY: 15
    • O.PROTECT: 23
    • O.ROLBAK: 8
    • O.SECURE_KEY: 10
  • OE:
    • OE.ADMIN: 3
    • OE.CRYPTO: 3
    • OE.EAUTH: 3
    • OE.PHYSICAL: 6
    • OE.TIME: 3
  • T:
    • T.CONFLOSS: 5
    • T.MANDAT: 5
    • T.NOAUDIT: 3
    • T.OPS: 6
    • T.PRIVIL: 8
    • T.ROUTE: 10
    • T.UNTRUSTED_PATH: 7
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 13
  • SSH:
    • SSH: 10
  • TLS:
    • SSL:
      • SSL: 7
  • VPN:
    • VPN: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 14
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 2
  • PKCS:
    • PKCS#7: 1
    • PKCS7: 1
  • RFC:
    • RFC2410: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP. Authentication services can be handled either internally (fixed user selected: 1
pdf_data/st_metadata
  • /AAPL:Keywords: []
  • /Author: RAY POTTER
  • /CreationDate: D:20110714053311Z00'00'
  • /Creator: Microsoft Word
  • /Keywords:
  • /ModDate: D:20110714053311Z00'00'
  • /Producer: Mac OS X 10.6.7 Quartz PDFContext
  • /Title: Microsoft Word - JNPR JUNOS 10-0 EAL3 Reval ST v2-0.doc
  • pdf_file_size_bytes: 1002176
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_garbage False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different