| name |
FortiSwitch blade appliances with FortiTRNG running FortiOS 5.0 Patch Release 7 |
Oracle Business Intelligence Enterprise Edition Release 10.1.3 |
| category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
| scheme |
US |
UK |
| status |
archived |
archived |
| not_valid_after |
22.12.2014 |
30.06.2014 |
| not_valid_before |
07.11.2014 |
30.06.2009 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10555-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP250.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10555-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/oracle-obiee_st.pdf |
| manufacturer |
Fortinet, Inc. |
Oracle Corporation UK Limited |
| manufacturer_web |
https://www.fortinet.com/ |
https://www.oracle.com/uk/ |
| security_level |
{} |
EAL3 |
| dgst |
a9e080ba99fb52ec |
c74e3cb45d789f2b |
| heuristics/cert_id |
CCEVS-VR-VID-10555-2014 |
CRP250 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
{} |
| heuristics/extracted_versions |
5.0 |
10.1.3 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10555/
- categories: ['Network Device', ' Network Switch']
- category: Network Device
- certification_date: 07.11.2014
- evaluation_facility: CGI IT Security Labs
- expiration_date: 07.11.2016
- id: CCEVS-VR-VID10555
- product: FortiSwitch blade appliances with FortiTRNG running FortiOS 5.0 Patch Release 7
- scheme: US
- url: https://www.niap-ccevs.org/products/10555
- vendor: Fortinet, Inc.
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0468-2007, CRP244, BSI-DSZ-CC-0403-2008 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0257-2004, CCEVS-VR-0020-2006, BSI-DSZ-CC-0468-2007, CRP244, BSI-DSZ-CC-0403-2008 |
| heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
st_vid10555-vr.pdf |
CRP250.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10555-2014
- cert_item: Fortinet, Inc. 326 Moodie Drive Ottawa, ON K2H 8G3, Canada www.fortinet.com FortiSwitch™ blade appliances with FortiTRNG running FortiOS™ 5.0 Patch Release 7
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10555-2014: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 140-2: 1
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author:
- /CreationDate: D:20090701102255+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20090701102604+01'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 276643
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
| pdf_data/st_filename |
st_vid10555-st.pdf |
oracle-obiee_st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0403-2008: 1
- BSI-DSZ-CC-0468-2007: 1
- UK:
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 11
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 18
- FCS_CKM.1.1: 2
- FCS_CKM.4: 6
- FCS_CKM_EXT.4: 18
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 34
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_TLS_EXT.1: 15
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 11
- FIA_PMG_EXT.1.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 6
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 12
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 17
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 6
- FMT:
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 6
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 11
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_SKP_EXT.1: 11
- FPT_SKP_EXT.1.1: 2
- FPT_SSP.1: 1
- FPT_SSP.2: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 10
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 11
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 17
- FAU_GEN.1: 2
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 7
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 3
- FCS_COP.1: 7
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 5
- FDP_ACF: 8
- FDP_ACF.1: 12
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 4
- FIA_ATD.1.1: 3
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 2
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 3
- FIA_UID.2: 2
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA: 6
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 4
- FMT_SMF: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FPT:
- FPT_ITC: 1
- FPT_ITC.1: 5
- FPT_ITC.1.1: 2
- FPT_ITT: 1
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TRC: 10
- FPT_TRC.1: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICA: 1
- O.RESIDUAL_INFORMATION_: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- A:
- A.HTTPS: 2
- A.MANAGE: 2
- A.NETWORK: 2
- A.PEER: 2
- A.PHYSICAL: 2
- A.SYS: 2
- A.TOE: 2
- O:
- O.ACCESS: 4
- O.ADMIN: 3
- O.AUDIT: 4
- O.CRYPTO: 5
- OE:
- OE.ACCOUNT: 4
- OE.ADMIN: 4
- OE.AUDIT: 8
- OE.AUDITLOG: 3
- OE.AUTHDATA: 3
- OE.FILES: 3
- OE.INSTALL: 5
- OE.MEDIA: 2
- OE.NETWORK: 3
- OE.PEER: 4
- OE.PHYSICAL: 3
- OE.PORTS: 3
- OE.RECOVERY: 2
- OE.SEP: 2
- OE.SSL: 3
- OE.TRUST: 4
- T:
- T.ABUSE: 2
- T.ACCESS: 3
- T.ATTACK: 2
- T.DATA: 3
- T.INTEGRITY: 2
- T.REPLAY: 2
- T.TRANSIT: 2
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 16
- AES-128: 4
- AES128: 1
- AES256: 1
- DES:
- constructions:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 2
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 35
- TLS 1.0: 4
- TLS 1.1: 3
- TLS 1.2: 3
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 8
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS 46-3: 3
- FIPS 8: 1
- FIPS PUB 140-2: 2
- FIPS PUB 186-2: 5
- FIPS PUB 186-3: 5
- FIPS PUB 197: 4
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-56B: 1
- NIST SP 800-90A: 1
- NIST SP 800-90B: 1
- SP 800-56B: 1
- PKCS:
- RFC:
- RFC 2246: 3
- RFC 2818: 2
- RFC 4346: 3
- RFC 5246: 3
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 60 B.2 Out of scope of the TOE: 2
- Out of scope: 2
- Privileges SecurityVersions AccountIndexs AccountDatas SqlNodeCaches GUIDStates Replications B.2 Out of scope of the TOE The following object types are also covered by the Presentation Object Access Policy: 1
- The privilege to use delivers is not granted to anyone in the evaluated configuration. It is out of scope of the TOE. User applications make calls to the Web Services to obtain access to Oracle BI: 1
- are not expected to actually be stored in the TOE because the products that could create them are out of scope of the TOE by privilege: IBots DeliveryProfiles DefaultDevices Subscriptions DashboardDeliverys: 1
- out of scope: 2
|
| pdf_data/st_metadata |
|
- /Author:
- /Company: Logica UK Limited
- /CreationDate: D:20090622102237+01'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /DateOption: 0
- /Doc_issue: Document not created from standard DOC template.
- /Document_issue: 1.7
- /Document_ref: 310.EC230647:OBIEE.6.1
- /Document_title: Security Target for Oracle Business Intelligence Enterprise Edition (10.1.3.3.2) with Quick Fix 090406
- /Issue_status: Definitive
- /Layout: 1
- /ModDate: D:20090630104804+01'00'
- /Page_numbering: 0
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Project_name: Evaluation of Oracle Business Intelligence
- /Short_copyright: Oracle
- /Short_doc_title: OBIEE (10.1.3.3.2) with Quick Fix 090406 Security Target
- /ShowTotalPages: 1
- /SourceModified: D:20090622084423
- /TOC_level: 2
- /TemplateVersion: 3.4
- /Title: Oracle
- pdf_file_size_bytes: 888351
- pdf_hyperlinks: http://en.wikipedia.org/wiki/Interface_standard, http://en.wikipedia.org/wiki/Serial_communications, http://en.wikipedia.org/wiki/Isochronous
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |