name |
McAfee Enterprise Mobility Management 12.0 |
NXP JCOP 3 SECID P40 ChipDoc-Lite in SSCD Configuration (version 1.0.10) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
FR |
status |
archived |
archived |
not_valid_after |
04.09.2019 |
12.03.2023 |
not_valid_before |
04.09.2014 |
12.03.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CT%20v1.0e.docx |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CR%20v1.0e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018-07fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20ST%20v1.16.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2018_07en.pdf |
manufacturer |
McAfee, Inc. |
NXP Semiconductors |
manufacturer_web |
https://www.mcafee.com/ |
https://www.nxp.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
b193f130f541449d |
7c742cbf21424f57 |
heuristics/cert_id |
383-4-275 |
ANSSI-CC-2018/07 |
heuristics/cert_lab |
CANADA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
12.0 |
1.0.10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
NSCIB-CC-65156-CR2, NSCIB-CC-65655-CR2 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
NSCIB-CC-65156-CR2, NSCIB-CC-65655-CR2 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
d918b28fd7bb5d79, 27abdb9c6ab375a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf |
pdf_data/cert_filename |
383-4-275 CT v1.0e.docx |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
383-4-275 CR v1.0e.pdf |
anssi-cc-2018-07fr.pdf |
pdf_data/report_frontpage |
- FR:
- CA:
- cert_id: 383-4-275-CR
- cert_lab: CANADA
|
- FR:
- cc_security_level: EAL5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2018/07
- cert_item: NXP JCOP 3 SECID P40 ChipDoc-Lite in SSCD Configuration
- cert_item_version: Version 1.0.10
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: NXP Semiconductors GmbH Troplowitzstr. 20, 22529 Hamburg, Allemagne Commanditaire NXP Semiconductors GmbH Troplowitzstr. 20, 22529 Hamburg, Allemagne
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP-SSCD-Part2] Protection profiles for secure signature creation device - Device with key generation, v2.0.1 ; [PP-SSCD-Part3] Protection profiles for secure signature creation device - Device with key import, v1.0.2
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- NL:
- NSCIB-CC-65156-CR2: 1
- NSCIB-CC-65655-CR2: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-: 3
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 2+: 3
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL5: 4
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 23
- NXP Semiconductors: 4
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA: 1
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: cpclark
- /CR date: 04 September 2014
- /CR version: 1.0
- /Certificate date: 04 September 2014
- /Company: CSEC-CSTC
- /Conformance Claim: EAL 2 augmented
- /CreationDate: D:20140922130520-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: McAfee, Inc.
- /Document number: 383-4-275-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of McAfee, Inc. McAfee Enterprise Mobility Management 12.0, Version 0.3, 15 August 2014
- /Evaluation completion date: 15 August 2014
- /ModDate: D:20140922130523-04'00'
- /Producer: Adobe PDF Library 10.0
- /ST Title: Security Target: McAfee Enterprise Mobility Management 12.0, v1.16, 20 July 2014
- /SourceModified: D:20140903182940
- /TOE name and version: McAfee Enterprise Mobility Management 12.0
- /TOE short name: McAfee EMM v12.0
- /Title: 383-4-XXX CR vxe
- /_DocHome: -1616610741
- pdf_file_size_bytes: 289620
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Category: Référence, Version
- /Comments: NXP Semiconductors GmbH
- /Company: SGDSN/ANSSI
- /CreationDate: D:20180314154523+01'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.026
- /ModDate: D:20180314174237+01'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20180314144518
- /Subject:
- /Title:
- pdf_file_size_bytes: 265654
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
383-4-275 ST v1.16.pdf |
anssi-cible-2018_07en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- NL:
- NSCIB-15-65655-CR: 1
- NSCIB-CC-15-65156: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 3
- BSI-CC-PP-0075: 3
- BSI-CC-PP0059-2009-MA-01–: 1
- BSI-CC-PP0075-2012–: 2
- BSI-PP-0035: 1
- BSI-PP-0035-2007: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 4+: 2
- EAL 5+: 4
- EAL4: 6
- EAL4 augmented: 2
- EAL4+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.2: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 3
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 6
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 11
- FDP_ACC.1: 6
- FDP_ACF: 10
- FDP_ACF.1: 18
- FDP_ITC: 2
- FDP_ITC.1: 5
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_SDI: 7
- FDP_SDI.2: 6
- FDP_UCT: 5
- FDP_UCT.1: 3
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1: 7
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 5
- FMT_MSA: 7
- FMT_MSA.1: 4
- FMT_MSA.2: 7
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 7
- FMT_MSA.4.1: 1
- FMT_MTD: 9
- FMT_MTD.1: 2
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 15
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_ITC.1: 1
- FPT_PHP.1: 4
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.DATABASE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.PKI: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 14
- O.AUDITS: 4
- O.EADMIN: 6
- O.IDAUTH: 19
- O.INTEGRITY: 6
- O.MOBILE_POLICY: 3
- OE:
- OE.AUDIT_REVIEW: 2
- OE.CREDEN: 3
- OE.CRYPTO: 4
- OE.DATABASE: 4
- OE.INSTALL: 5
- OE.INTEROP: 3
- OE.MOBILE_ACCESS: 2
- OE.PERSON: 8
- OE.PHYCAL: 6
- OE.PKI: 3
- OE.PROTECT: 5
- OE.STORAGE: 4
- OE.TIME: 4
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.IMPCON: 3
- T.LOSSOF: 3
- T.MOBILE_POLICY: 3
- T.NOHALT: 3
- T.PRIVIL: 3
|
- A:
- A.CGA: 5
- A.CSP: 4
- A.SCA: 5
- A.SCP: 1
- OE:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 40
- NXP Semiconductors: 22
- NXP Semiconductors N.V: 60
|
pdf_data/st_keywords/eval_facility |
|
- BrightSight:
- BrightSight: 1
- Brightsight: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 4
- SCA:
- DPA: 2
- SPA: 2
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 46-3: 3
- ISO:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- of policies for managed mobile devices. 1.6.2 McAfee EMM Portal The McAfee Client Application (out of scope) connects to the EMM Portal to request the policy for the device. The McAfee EMM Portal (EMM Portal: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Primasec
- /CreationDate: D:20140924094632-04'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20140924094632-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Enterprise Mobility Management 12.0
- /Title: Security Target
- pdf_file_size_bytes: 1436557
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /CreationDate: D:20180202125246Z
- /Creator: Microsoft® Word 2016
- /ModDate: D:20180314174256+01'00'
- /Producer: Microsoft® Word 2016
- /Title:
- pdf_file_size_bytes: 1495602
- pdf_hyperlinks: http://www.nxp.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |