name |
Citrix MetaFrame Presentation Server 4.0 |
Microcontrôleurs sécurisés SC23Z018, SC23ZD12A, SC23ZD08A, SC23ZD04A, SB23ZD18A, SB23ZD12A, SB23ZD08A et SB23ZD04A, incluant optionnellement la librairie cryptographique Neslib révision 3.1 |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
FR |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
01.09.2019 |
not_valid_before |
01.08.2005 |
13.09.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP219.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-61fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LFS_T488_Citrix_ST_V10.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-61en.pdf |
manufacturer |
Citrix Systems, Inc. |
STMicroelectronics |
manufacturer_web |
https://www.citrix.com |
https://www.st.com/ |
security_level |
EAL2 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
7da57a5dc5ab73a9 |
303b86d469a64d39 |
heuristics/cert_id |
CRP219 |
ANSSI-CC-2013/61 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, ADV_SPM.1, ATE_COV.1, AGD_ADM.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
AGD_PRE.1, ATE_COV.2, ALC_TAT.2, ALC_CMS.5, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_DPT.3, ATE_IND.2, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, ALC_CMC.4, ADV_IMP.1 |
heuristics/extracted_versions |
4.0 |
3.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2014/60 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2014/60 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP219.pdf |
ANSSI-CC_2013-61fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL5 Augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: CC version 3.1 révision 3
- cert_id: ANSSI-CC-2013/61
- cert_item: Microcontrôleurs sécurisés SC23Z018, SC23ZD12A, SC23ZD08A, SC23ZD04A, SB23ZD18A, SB23ZD12A, SB23ZD08A et SB23ZD04A, incluant optionnellement la librairie cryptographique Neslib révision 3.1
- cert_item_version: Référence maskset K390A, révision interne C
- cert_lab: Serma Technologies 30 Avenue Gustave Eiffel, 33608 Pessac Cedex, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P219: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FTP:
- FTP_ITC.1: 1
- FTP_ITC.2: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 3.1: 1
- NesLib v3.1: 2
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20050906112345Z
- /Creator: LFS T488 CITRIX_V40_CertRep_P219_10 - Microsoft Word
- /ModDate: D:20131119172038Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: LFS T488 CITRIX_V40_CertRep_P219_10.doc
- pdf_file_size_bytes: 1021419
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /CreationDate: D:20130916134604+02'00'
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate: D:20130916145337+02'00'
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 213105
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
LFS_T488_Citrix_ST_V10.pdf |
ANSSI-CC-cible_2013-61en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 8
- EAL2 augmented: 2
- EAL2+: 1
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_COP.1: 21
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 23
- FDP_ACF.1: 16
- FDP_IFC.1: 3
- FDP_ITT.1: 17
- FDP_ITT.1.1: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 2
- FIA_UID.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 1
- FPT_ITT.1: 15
- FPT_ITT.1.1: 2
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 1
- FTP_ITC.2: 9
- FTP_ITC.2.1: 1
- FTP_ITC.2.2: 1
- FTP_ITC.2.3: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 24
- FCS_CKM.4: 5
- FCS_COP.1: 26
- FCS_RNG: 1
- FCS_RNG.1: 6
- FDP:
- FDP_ACC.1: 1
- FDP_ACC.2: 12
- FDP_ACF.1: 11
- FDP_CKM.2: 1
- FDP_IFC.1: 9
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ITT.1: 7
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 8
- FMT_LIM.2: 9
- FMT_MSA.1: 6
- FMT_MSA.2: 1
- FMT_MSA.3: 10
- FMT_SMF.1: 10
- FMT_SMR.1: 2
- FPT:
- FPT_FLS.1: 8
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APP_: 1
- A.APP_CONFIG: 1
- A.PUBLISHED_: 1
- A.SMARTCARD: 1
- A.THIRD_PARTY_: 1
- A.TRUSTADMIN: 1
- A.USER_: 1
- OE:
- OE.CERTIFICATES: 3
- OE.CLIENT_: 1
- OE.CLIENT_PHYSICAL: 1
- OE.CLIENT_TPSW: 3
- OE.IPSEC: 8
- OE.LIMIT_AUT: 1
- OE.LIMIT_AUTH: 2
- OE.MALWARE_: 1
- OE.MALWARE_PROT: 1
- OE.MALWARE_PROTECT: 2
- OE.MEMORY: 4
- OE.OS_CONFIG: 2
- OE.OS_CONFIG_: 2
- OE.OS_CONFIG_CLIENT: 2
- OE.OS_CONFIG_SERVER: 2
- OE.PASSWORD: 1
- OE.PASSWORD_: 1
- OE.PASSWORD_SETUP: 1
- OE.SECURE_: 1
- OE.SECURE_EN: 1
- OE.SECURE_ENCRYPTION: 2
- OE.SERVER_: 1
- OE.SERVER_PHYSICAL: 2
- OE.SERVER_TH: 1
- OE.SERVER_THIRD_: 1
- OE.SERVER_THIRD_PARTY_SW: 1
- OE.SESSION_K: 1
- OE.SESSION_KEYS: 3
- OE.TRUSTED_: 1
- OE.TRUSTED_OPS: 2
- OSP:
- OT:
- OT.APPS_: 1
- OT.APPS_AVAIL: 2
- OT.AUTHENTIC_: 4
- OT.AUTHENTIC_CLIENT: 1
- OT.AUTHENTIC_SERVER: 1
- OT.CONF: 3
- OT.CONF_: 1
- OT.CONF_CLIENT: 2
- OT.CUTPASTE: 1
- OT.CUT_PASTE: 2
- OT.DRIVES: 3
- OT.GATE_ALLO: 1
- OT.GATE_ALLOW: 2
- OT.INTEG: 3
- OT.INTEG_: 1
- OT.INTEG_CLIENT: 2
- OT.SECURE_ENC: 1
- OT.SECURE_ENCRYP: 1
- OT.SECURE_ENCRYPTION: 2
- T:
- T.AUTHENTIC: 4
- T.AVAIL: 4
- T.MISDIRECT: 2
- T.MOD_CONF: 4
- T.MOD_HW_CLIENT: 1
- T.MOD_HW_SERVER: 1
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 4
- SHA-256: 3
- SHA-384: 4
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NESLIB 3.1: 2
- NesLib 3.1: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 5
- Leak-Inherent: 8
- Physical Probing: 4
- SPA: 1
- physical probing: 3
- side channel: 5
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 3
- FIPS 140-1: 1
- FIPS 140-2: 3
- FIPS 186-2: 1
- FIPS140: 10
- FIPS140-1: 2
- FIPS140-2: 2
- RFC:
- RFC 2246: 3
- RFC 2412: 1
- RFC 2451: 1
|
- BSI:
- CC:
- CCMB-2009-07-001: 3
- CCMB-2009-07-002: 11
- CCMB-2009-07-003: 2
- FIPS:
- FIPS PUB 140-2: 9
- FIPS PUB 180-1: 3
- FIPS PUB 180-2: 2
- FIPS PUB 186: 3
- FIPS PUB 197: 3
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 10116: 5
- ISO/IEC 10118-: 2
- ISO/IEC 14888: 2
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 5
- ISO/IEC 9797: 1
- ISO/IEC 9797-1: 2
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The TOE comprises the sample deployment as described below. All other configurations are out of scope of the evaluation. The deployment uses the Secure Gateway to provide TLS encryption between a TLS-: 1
- out of scope: 2
- the TOE. Note: The Windows operating system provides the function that authenticates users. This is out of scope of the TOE, so there are no mechanisms requiring assessment. Version 1.0 Page 35 of 56 July 2005: 1
|
- OutOfScope:
- 33 The Security IC Embedded Software (ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded. 34 The SC23Zxxx optionally comprises a: 1
- ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: 9:9 7/25/2005
- /Creator: Windows NT 4.0
- /Producer: GNU Ghostscript 7.05
- /Title: Untitled Document
- pdf_file_size_bytes: 328607
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
- /CreationDate: D:20130903112441Z
- /Creator: FrameMaker 7.2
- /ModDate: D:20130916145357+02'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 629787
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |