Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Thinklogical TLX320 Matrix Switch
SERTIT-076
NetApp DataFort FC520 v2, LKM 2.5.1
CCEVS-VR-VID-10035-2009
name Thinklogical TLX320 Matrix Switch NetApp DataFort FC520 v2, LKM 2.5.1
category Other Devices and Systems Data Protection
scheme NO US
not_valid_after 22.09.2021 20.07.2012
not_valid_before 22.09.2016 01.04.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10035-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ThinklogicalSecurityTarget_1_3_TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10035-st.pdf
manufacturer Thinklogical NetApp, Inc.
manufacturer_web https://www.thinklogical.com/ https://www.netapp.com/
security_level EAL4 EAL4+, ALC_FLR.1
dgst a67b05a18bbe6cfc 436894360f619ed2
heuristics/cert_id SERTIT-076 CCEVS-VR-VID-10035-2009
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions - 2.5.1
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 22.09.2016
  • developer: Thinklogical
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-076
    • certification_date: 22.09.2016
    • description: The TOE provides remote connections from a set of shared computers to a set of shared peripherals. The switching capability of the TOE is used to connect ports on a particular computer to a particular peripheral set. The corresponding electronic signal from a computer port is transformed into an optical signal by the Velocity extender, transmitted through an optical fiber, switched by the TOE to another optical fiber, and then transformed back to an electronic form by the Velocity extender. The resulting signal is used by the shared peripherals. The TOE provides a capability to dynamically change the switching configuration to connect a particular computer to a particular peripheral set. The TOE enforces secure separation of information flows corresponding to different switched connections. The corresponding Data Separation Security Policy is the main security feature of the TOE.
    • developer: Thinklogical
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135040-1607952626/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135043-1607952629/SERTIT/Sertifikater/2016/76/ThinklogicalSecurityTarget_1_3_TLX320.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135046-1607952632/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf'})]})
    • evaluation_facility: Norconsult AS
    • level: EAL 4
    • mutual_recognition: CCRA, SOG-IS
    • product: TLX320 Matrix Switch Chassis (TLX-MSC-000320 Rev A), TLX48 / TLX320 Matrix Switch Data Input and Output Card, 16 Ports, SFP+, Multi-Mode (TLX-MSD-M00016 Rev A), Single Mode (TLX-MSDS00016 Rev A), Velocity Matrix Switch 320 Data Input Retimer Card, 16 Ports, SFP+, Multi-Mode (VXM-D00T16 Rev A), Single Mode (VXM-D0ST16 Rev A)
  • product: Thinklogical TLX320 Matrix Switch
  • url: https://sertit.no/certified-products/product-archive/thinklogical-tlx320-matrix-switch
  • category: Sensitive Data Protection, System Access Control
  • certification_date: 20.02.2009
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date:
  • id: CCEVS-VR-VID10035
  • product: NetApp DataFort FC520 v2, LKM 2.5.1
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10035
  • vendor: NetApp, Inc.
pdf_data/report_filename 20160922 Sertit-076 CR v1.0 Certification Report TLX320.pdf st_vid10035-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10035-2009
    • cert_item: NetApp Decru DataFort FC520v2, LKM 2.5.1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-076: 16
  • US:
    • CCEVS-VR-VID10035-2009: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 19
    • EAL1: 1
    • EAL7: 1
  • EAL:
    • EAL 4: 3
    • EAL4: 16
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_AUT.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_MSU.2: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 1
  • FAU:
    • FAU_GEN.1: 1
    • FAU_STG_ENV.1: 1
    • FAU_STG_EXP.1: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.4: 1
    • FCS_CKM_EXP.5: 1
    • FCS_CKM_EXP.6: 1
    • FCS_CKM_EXP.7: 1
    • FCS_CKM_EXP.8: 1
    • FCS_COP: 3
    • FCS_COP_EXP.1: 1
    • FCS_COP_EXP.2: 1
    • FCS_COP_EXP.3: 1
    • FCS_COP_EXP.4: 1
    • FCS_COP_EXP.5: 1
  • FDP:
    • FDP_IFC.1: 1
    • FDP_IFF.1: 2
  • FIA:
    • FIA_EAU_ENV.2: 1
    • FIA_EAU_EXP.5: 1
    • FIA_EID_ENV.2: 1
    • FIA_EID_EXP.1: 1
    • FIA_UAU_ENV.5: 1
    • FIA_UAU_EXP.5: 1
    • FIA_UID_ENV.2: 1
    • FIA_UID_EXP.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_RCV.4: 1
    • FPT_RVM_ENV.1: 1
    • FPT_RVM_EXP.1: 1
    • FPT_SEP_ENV.1: 1
    • FPT_SEP_EXP.1: 1
    • FPT_STM_ENV.1: 1
    • FPT_STM_EXP.1: 1
  • FTP:
    • FTP_ITC_ENV.1: 1
    • FTP_ITC_EXP.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.EMISSIO: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
    • A.SCENARIO: 1
  • O:
    • O.CONF: 1
    • O.CONNECT: 1
  • OE:
    • OE.EMISSIO: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
    • OE.SCENARIO: 1
  • T:
    • T.ATTACK: 1
    • T.INSTALL: 1
    • T.RESIDUAL: 1
    • T.STATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • Norconsult:
    • Norconsult AS: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 2
  • constructions:
    • MAC:
      • HMAC-SHA-256: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 4
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • FIPS:
    • FIPS 140: 3
    • FIPS 140-2: 14
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Rage, Arne Høye
  • /CreationDate: D:20160922162516Z00'00'
  • /Creator: Microsoft Word
  • /Keywords: ugradert
  • /ModDate: D:20160922162516Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 875983
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Author: James E Brosey
  • /CreationDate: D:20090326171341
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20090326171341
  • /Producer: Microsoft® Office Word 2007
  • /Title: Validation Report
  • pdf_file_size_bytes: 443011
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename ThinklogicalSecurityTarget_1_3_TLX320.pdf st_vid10035-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 7
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 1
    • EAL4: 11
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT.1: 3
    • ACM_CAP.4: 2
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 2
    • ADV_IMP.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.1: 2
    • ADV_SPM.1: 8
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 6
    • ALC_FLR.1: 13
    • ALC_LCD.1: 6
    • ALC_TAT.1: 6
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 3
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA.3: 3
  • FAU:
    • FAU_GEN.1: 19
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG_ENV.1: 11
    • FAU_STG_ENV.1.1: 1
    • FAU_STG_ENV.1.2: 1
    • FAU_STG_ENV.1.3: 1
    • FAU_STG_ENV.1.4: 1
    • FAU_STG_ENV.1.5: 1
    • FAU_STG_ENV.1.6: 1
    • FAU_STG_EXP.1: 12
    • FAU_STG_EXP.1.1: 1
    • FAU_STG_EXP.1.2: 1
  • FCS:
    • FCS_CKM: 41
    • FCS_CKM.1: 3
    • FCS_CKM.4: 33
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXP: 1
    • FCS_CKM_EXP.5: 12
    • FCS_CKM_EXP.5.1: 1
    • FCS_CKM_EXP.6: 13
    • FCS_CKM_EXP.6.1: 1
    • FCS_CKM_EXP.7: 17
    • FCS_CKM_EXP.7.1: 1
    • FCS_CKM_EXP.7.2: 1
    • FCS_CKM_EXP.8: 14
    • FCS_CKM_EXP.8.1: 1
    • FCS_CKM_EXP.8.2: 1
    • FCS_COP: 51
    • FCS_COP.1: 2
    • FCS_COP_EXP.1: 16
    • FCS_COP_EXP.1.1: 1
    • FCS_COP_EXP.2: 15
    • FCS_COP_EXP.2.1: 1
    • FCS_COP_EXP.3: 12
    • FCS_COP_EXP.3.1: 1
    • FCS_COP_EXP.4: 14
    • FCS_COP_EXP.4.1: 1
    • FCS_COP_EXP.4.2: 1
    • FCS_COP_EXP.5: 16
    • FCS_COP_EXP.5.1: 1
  • FDP:
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 14
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_IFF.3: 2
    • FDP_ITC: 1
  • FIA:
    • FIA_EAU_ENV.2: 7
    • FIA_EAU_ENV.2.1: 1
    • FIA_EAU_EXP.5: 14
    • FIA_EAU_EXP.5.1: 1
    • FIA_EAU_EXP.5.2: 1
    • FIA_EID_ENV.2: 6
    • FIA_EID_ENV.2.1: 1
    • FIA_EID_ENV.2.2: 1
    • FIA_EID_EXP.1: 8
    • FIA_EID_EXP.1.1: 1
    • FIA_EID_EXP.1.2: 1
    • FIA_UAU: 1
    • FIA_UAU_ENV.5: 7
    • FIA_UAU_ENV.5.1: 1
    • FIA_UAU_ENV.5.2: 1
    • FIA_UAU_EXP.5: 15
    • FIA_UAU_EXP.5.1: 1
    • FIA_UAU_EXP.5.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 2
    • FIA_UID_ENV.2: 6
    • FIA_UID_ENV.2.1: 1
    • FIA_UID_EXP.2: 8
    • FIA_UID_EXP.2.1: 1
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 25
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 36
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_RCV.4: 12
    • FPT_RCV.4.1: 1
    • FPT_RVM_ENV.1: 8
    • FPT_RVM_ENV.1.1: 1
    • FPT_RVM_EXP.1: 11
    • FPT_RVM_EXP.1.1: 1
    • FPT_RVM_EXP.1.2: 1
    • FPT_RVM_EXP.1.3: 1
    • FPT_SEP_ENV.1: 7
    • FPT_SEP_ENV.1.1: 1
    • FPT_SEP_EXP.1: 10
    • FPT_SEP_EXP.1.1: 1
    • FPT_SEP_EXP.1.2: 1
    • FPT_SEP_EXP.1.3: 1
    • FPT_SEP_EXP.1.4: 1
    • FPT_STM.1: 1
    • FPT_STM_ENV.1: 7
    • FPT_STM_ENV.1.1: 1
    • FPT_STM_EXP.1: 14
    • FPT_STM_EXP.1.1: 1
  • FTP:
    • FTP_ITC_ENV.1: 8
    • FTP_ITC_ENV.1.1: 1
    • FTP_ITC_ENV.1.2: 1
    • FTP_ITC_EXP.1: 12
    • FTP_ITC_EXP.1.1: 1
    • FTP_ITC_EXP.1.2: 1
    • FTP_ITC_EXP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.EMISSION: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.SCENARIO: 2
  • O:
    • O.CONF: 7
    • O.CONNECT: 3
    • O.CRYPTOGRAPHY: 1
  • OE:
    • OE.EMISSION: 2
    • OE.INSTAL: 1
    • OE.MANAGE: 4
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
    • OE.SCENARIO: 2
  • T:
    • T.ATTACK: 3
    • T.COMINT: 1
    • T.INSTALL: 3
    • T.RESIDUAL: 3
    • T.STATE: 3
  • O:
    • O.IFC: 8
    • O.LKM: 9
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 54
      • AES-: 1
      • AES-256: 4
  • DES:
    • 3DES:
      • 3DES: 34
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 13
      • HMAC-SHA-256: 9
      • HMAC-SHA-512: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 16
      • Diffie-Hellman: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
      • SHA1: 1
    • SHA2:
      • SHA-256: 7
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 6
    • Key agreement: 1
  • KEX:
    • Key Exchange: 8
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 2
    • IKEv1: 6
  • IPsec:
    • IPsec: 20
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 32
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 20
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-521: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 2
    • FIPS 140-2: 23
    • FIPS 180-2: 2
    • FIPS 186-2: 8
    • FIPS 197: 7
    • FIPS 198: 3
    • FIPS 46-3: 5
    • FIPS PUB 140-2: 1
    • FIPS PUB 146-3: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198: 1
  • NIST:
    • NIST SP 800-56A: 5
  • RFC:
    • RFC 2104: 1
    • RFC 2246: 3
    • RFC 2404: 1
    • RFC 2407: 1
    • RFC 2408: 1
    • RFC 2409: 2
    • RFC 2411: 1
    • RFC 2631: 1
    • RFC 3602: 1
    • RFC 4109: 1
    • RFC 4301: 1
    • RFC 4304: 1
    • RFC 4305: 1
    • RFC 4306: 1
    • RFC 4346: 1
pdf_data/st_metadata
  • /Author: MICHELE ROBERTS
  • /CreationDate: D:20160922164335+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20160922164335+00'00'
  • /Title:
  • pdf_file_size_bytes: 487151
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different