Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
CCEVS-VR-VID-11155-2021
Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect
NSCIB-CC-0259553-CR
name VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2 Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect
category Other Devices and Systems Boundary Protection Devices and Systems
scheme US NL
status archived active
not_valid_after 28.07.2023 07.10.2027
not_valid_before 28.07.2021 07.10.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-22-0259553-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0259553-CR-1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0259553-st-v1.0.pdf
manufacturer VMware Inc. Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134-1706 USA
manufacturer_web https://www.vmware.com https://www.cisco.com
security_level {} EAL4+, ALC_FLR.2
dgst 8129b9e38f61ae35 202ed3e27c6dde49
heuristics/cert_id CCEVS-VR-VID-11155-2021 NSCIB-CC-0259553-CR
heuristics/cert_lab US
heuristics/cpe_matches {} cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.17:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.18:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower:6.4.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-44487, CVE-2024-20388, CVE-2020-3555, CVE-2021-34790, CVE-2020-3259, CVE-2020-3563, CVE-2019-1669, CVE-2021-1493, CVE-2022-20745, CVE-2020-3549, CVE-2022-20947, CVE-2019-12676, CVE-2021-34781, CVE-2022-20760, CVE-2024-20359, CVE-2020-3254, CVE-2024-20353, CVE-2020-3304, CVE-2020-3285, CVE-2019-12698, CVE-2023-20256, CVE-2022-20928, CVE-2021-34783, CVE-2022-20854, CVE-2019-12678, CVE-2021-1573, CVE-2021-34763, CVE-2023-20247, CVE-2019-12673, CVE-2019-1978, CVE-2023-20083, CVE-2020-3561, CVE-2021-40125, CVE-2023-20063, CVE-2020-3303, CVE-2021-34794, CVE-2022-20946, CVE-2021-40117, CVE-2020-3550, CVE-2020-3315, CVE-2020-3191, CVE-2023-20095, CVE-2020-3554, CVE-2020-3317, CVE-2021-34756, CVE-2022-20949, CVE-2023-20245, CVE-2022-20730, CVE-2019-12674, CVE-2021-1501, CVE-2021-34755, CVE-2019-12695, CVE-2020-3195, CVE-2021-34793, CVE-2022-20757, CVE-2021-40114, CVE-2021-34764, CVE-2022-20767, CVE-2020-3179, CVE-2020-3255, CVE-2022-20742, CVE-2020-3580, CVE-2020-3188, CVE-2020-3305, CVE-2022-20934, CVE-2021-34791, CVE-2020-3572, CVE-2021-1223, CVE-2020-3186, CVE-2022-20729, CVE-2020-3253, CVE-2023-20086, CVE-2020-3529, CVE-2021-1495, CVE-2022-20713, CVE-2021-34754, CVE-2019-12675, CVE-2020-3306, CVE-2020-3565, CVE-2020-3196, CVE-2021-1224, CVE-2022-20746, CVE-2021-1256, CVE-2020-3577, CVE-2023-20269, CVE-2019-1981, CVE-2020-3452, CVE-2019-1980, CVE-2022-20759, CVE-2021-34761, CVE-2020-3514, CVE-2021-34792, CVE-2021-40118, CVE-2020-3533, CVE-2022-20940, CVE-2020-3564, CVE-2019-1970, CVE-2022-20715, CVE-2020-3352, CVE-2020-3528, CVE-2020-3436, CVE-2021-1236, CVE-2021-34787, CVE-2020-3187, CVE-2021-34762, CVE-2023-20275, CVE-2019-12694, CVE-2021-44228, CVE-2021-40116
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ATE_DPT.2, AVA_VAN.3, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions 7.2 6.4
heuristics/scheme_data
  • category: Application Software
  • certification_date: 28.07.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 28.07.2023
  • id: CCEVS-VR-VID11155
  • product: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11155
  • vendor: VMware, LLC
heuristics/protection_profiles a1cc4a4e079f4d1f {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf {}
pdf_data/cert_filename st_vid11155-ci.pdf NSCIB-CC-22-0259553-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11155-2021: 1
  • NL:
    • CC-22-0259553: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR.2: 1
    • ALC_FLR.3: 2
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Cisco:
    • Cisco: 1
    • Cisco Systems, Inc: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210803124126-04'00'
  • /ModDate: D:20210803124126-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: kruitr
  • /CreationDate: D:20221013121014+02'00'
  • /Creator: Bullzip PDF Printer (11.0.0.2588)
  • /ModDate: D:20221013121049+02'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-22-0259553-Cert.docx
  • pdf_file_size_bytes: 253905
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11155-vr.pdf NSCIB-CC-0259553-CR-1.0.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID11155-2021
    • cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-0259553-CR
    • cert_item: Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect
    • cert_lab: SGS Brightsight B.V.
    • developer: Cisco Systems, Inc
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11155-2021: 1
  • NL:
    • NSCIB-CC-0259553-CR: 12
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
  • Cisco:
    • Cisco: 19
    • Cisco Systems, Inc: 3
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
      • TLS v1.2: 1
  • SSH:
    • SSHv2: 1
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 9
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid11155-st.pdf nscib-cc-0259553-st-v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 3
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 12
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 9
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.2: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 3
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM_EXT.1: 4
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT: 1
    • FDP_DAR_EXT.1: 5
    • FDP_DEC_EXT.1: 5
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 2
    • FDP_NET_EXT.1: 5
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 5
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 8
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 4
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 4
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_DIT_EXT.1: 6
    • FTP_DIT_EXT.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 22
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.NOEVIL: 4
    • A.PHYSEC: 2
    • A.PROTENV: 2
    • A.PROTRA: 4
    • A.REMACC: 4
    • A.SINGEN: 2
  • O:
    • O.ACCOUNTABLE: 6
    • O.ADMINISTRATION: 8
    • O.AUDIT: 8
    • O.BANNER: 4
    • O.IDAUTH: 9
    • O.LIMEXT: 4
    • O.MEDIATE: 7
    • O.MONITORING: 8
    • O.PROCOM: 8
    • O.SECFUN: 12
    • O.SECSTA: 11
    • O.SELPRO: 7
    • O.SESSION_LOCK: 4
    • O.VPN: 8
  • OE:
    • OE.NOEVIL: 3
    • OE.PHYSEC: 3
    • OE.PROTENV: 3
    • OE.PROTRA: 3
    • OE.REMACC: 3
    • OE.SINGEN: 3
  • T:
    • T.ASPOOF: 2
    • T.AUDACC: 4
    • T.AUDFUL: 4
    • T.MEDIAT: 3
    • T.NOAUTH: 7
    • T.PROCOM: 2
    • T.SELPRO: 3
    • T.UNAUTHORIZED: 6
    • T.UNDETECTED: 2
    • T.VPN: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 9
  • Cisco:
    • Cisco: 47
    • Cisco Systems, Inc: 4
  • Microsoft:
    • Microsoft: 3
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • bcrypt:
    • bcrypt: 1
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
      • TLS v1.2: 3
  • VPN:
    • VPN: 1
  • IKE:
    • IKE: 4
    • IKEv1: 1
    • IKEv2: 1
  • IPsec:
    • IPsec: 41
  • SSH:
    • SSH: 22
    • SSHv1: 1
    • SSHv2: 6
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 14
      • TLSv1.1: 1
      • TLSv1.2: 3
  • VPN:
    • VPN: 131
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • SPA: 5
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • RFC:
    • RFC 5280: 3
    • RFC 6960: 2
  • X509:
    • X.509: 8
  • CC:
    • CCMB-2017-04-004: 1
  • RFC:
    • RFC 2460: 2
    • RFC 4443: 1
    • RFC 768: 2
    • RFC 791: 2
    • RFC 792: 1
    • RFC 793: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • in the claimed Protection Profile. Therefore, the following product functionality is considered out of scope as there are no SFRs that can be mapped to this functionality: • The functionality of collecting: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different