Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Lexmark MX421, MX521, MX622, MX721, MX722, MX725, CX622, CX625, CX725w/firmware 073.239 and Lexmark Secure Element (P/N 57X0185)
522-EWA-2020
Microsoft Windows 10 version 1909 and Microsoft Windows Server version 1909
2019-47-INF-3134
name Lexmark MX421, MX521, MX622, MX721, MX722, MX725, CX622, CX625, CX725w/firmware 073.239 and Lexmark Secure Element (P/N 57X0185) Microsoft Windows 10 version 1909 and Microsoft Windows Server version 1909
category Multi-Function Devices Operating Systems
scheme CA ES
not_valid_after 26.01.2026 05.06.2025
not_valid_before 26.01.2021 05.06.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/522%20EWA%202020%20CT%20no%20sig%20Eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-47_Certificate.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/522%20EWA%202020%20CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-47-INF-3134.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/522%20EWA%202020%20Lexmark%20NoHD%20Security%20Target%2017.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-47-ST-lite.pdf
manufacturer Lexmark International, Inc. Microsoft Corporation
manufacturer_web https://www.lexmark.com/ https://www.microsoft.com
dgst fb6759770ff2ae8a 03f18b362454d73e
heuristics/cert_id 522-EWA-2020 2019-47-INF-3134
heuristics/cpe_matches cpe:2.3:o:lexmark:cx622_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx521_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx421_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx721_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx625_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx725:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx722_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx725:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.959:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1766:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2037:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2039:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.657:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.720:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1714:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.693:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.535:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.592:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.904:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1714:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2212:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.693:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2212:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.900:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2094:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.815:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.753:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1832:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.535:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2094:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.904:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.628:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2274:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.476:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.778:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2158:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1766:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1714:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1766:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.752:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.719:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.752:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1646:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.997:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1646:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.836:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.753:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.997:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.778:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.900:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.628:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.815:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.815:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1646:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.959:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2037:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1832:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.959:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.900:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.719:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.753:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.836:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.836:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.592:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.693:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.719:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2039:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.997:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1916:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2158:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.657:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.657:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2037:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.720:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2039:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.535:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.628:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.904:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.476:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.752:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.778:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.476:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2094:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.592:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.720:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2158:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1832:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2212:*:*:*:*:*:x64:*
heuristics/related_cves CVE-2021-44738, CVE-2023-23560, CVE-2021-44734, CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-22960 CVE-2021-33739, CVE-2022-26934, CVE-2021-40449, CVE-2022-21882, CVE-2022-26904, CVE-2021-34486, CVE-2021-31956, CVE-2022-22718, CVE-2021-31199, CVE-2021-36934, CVE-2021-31955, CVE-2021-40450, CVE-2021-36955, CVE-2022-26923, CVE-2021-31979, CVE-2021-34448, CVE-2022-21971, CVE-2022-21999, CVE-2021-1675, CVE-2022-21871, CVE-2022-21919, CVE-2021-31201, CVE-2021-41379, CVE-2021-34484, CVE-2021-33771, CVE-2021-40444, CVE-2022-24521, CVE-2022-26925, CVE-2021-36948, CVE-2021-33742
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, ASE_REQ.2
heuristics/extracted_versions 073.239 1909, 10
heuristics/scheme_data
  • certification_date: 26.01.2021
  • level: PP_HCD_V1.0
  • product: Lexmark MX421, MX521, MX622, MX721, MX722, MX725, CX622, CX625, CX725 w/firmware 073.239 and Lexmark Secure Element (P/N 57X0185)
  • vendor: Lexmark International, Inc.
  • category: Operating systems
  • certification_date: 05.06.2020
  • enhanced:
  • manufacturer: Microsoft Corp.
  • product: Microsoft Windows 10 version 1909 and Microsoft Windows Server version 1909
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/565-microsoft-windows-10-version-1909-and-microsoft-windows-server-version-1909
heuristics/protection_profiles b2cfec7a92fa2940 e34797b67a3163c5, c88af12926be2779, f4474c6c73660987
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf
pdf_data/cert_filename 522 EWA 2020 CT no sig Eng.pdf 2019-47_Certificate.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 522-EWA-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Microsoft:
    • Microsoft: 5
    • Microsoft Corporation: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • DEKRA:
    • DEKRA Testing and Certification: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20210128112935-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1640650
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20200522084033+02'00'
  • pdf_file_size_bytes: 765746
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 522 EWA 2020 CR.pdf 2019-47-INF-3134.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 522-EWA-2020: 1
  • ES:
    • 2019-47-INF-3134-v1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_SEL.1: 2
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.2: 3
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.4: 2
    • FCS_COP.1: 8
    • FCS_DTLS_EXT.1: 2
    • FCS_RBG_EXT.1: 2
    • FCS_STO_EXT.1: 2
    • FCS_TLSC_EXT.1: 3
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.3: 2
    • FCS_TLSC_EXT.4: 2
  • FDP:
    • FDP_ACF_EXT.1: 2
    • FDP_IFC_EXT.1: 4
    • FDP_RIP.2: 2
  • FIA:
    • FIA_AFL.1: 2
    • FIA_PAE_EXT.1: 1
    • FIA_PSK_EXT.1: 2
    • FIA_UAU.5: 2
  • FMT:
    • FMT_MOF_EXT.1: 2
    • FMT_SMF.1: 2
    • FMT_SMF_EXT.1: 3
  • FPT:
    • FPT_ACF_EXT.1: 2
    • FPT_ASLR_EXT.1: 2
    • FPT_SBOP_EXT.1: 2
    • FPT_SRP_EXT.1: 2
    • FPT_TST_EXT.1: 5
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.2: 2
  • FTA:
    • FTA_TAB.1: 2
    • FTA_WSE_EXT.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_ITC_EXT.1: 5
    • FTP_TRP.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 50
    • Microsoft Corporation: 3
  • Samsung:
    • Samsung: 4
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • DEKRA:
    • DEKRA Testing and Certification: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKEv1: 1
    • IKEv2: 1
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 11
  • TLS:
    • DTLS:
      • DTLS: 5
    • TLS:
      • TLS: 12
  • VPN:
    • VPN: 15
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • FIPS:
    • FIPS 140-2: 1
  • X509:
    • X.509: 8
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20210201145419-05'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20210201145434-05'00'
  • /Producer: Foxit PhantomPDF Printer Version 10.1.0.3521
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 512725
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /CreationDate: D:20200604123324+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20200604123324+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 945038
  • pdf_hyperlinks: https://www.sogis.org/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename 522 EWA 2020 Lexmark NoHD Security Target 17.pdf 2019-47-ST-lite.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 10
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 16
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 41
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1: 5
    • FCS_TLS_EXT.1: 6
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT.1: 2
    • FDP_DSK_EXT.1.2: 1
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 8
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 10
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 3
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 8
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.1: 1
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 13
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 28
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 5
    • FAU_SEL: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
  • FCS:
    • FCS_CKM: 15
    • FCS_CKM.1: 42
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 28
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 2
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.2: 6
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 70
    • FCS_COP.1.1: 5
    • FCS_DTLS_EXT: 1
    • FCS_DTLS_EXT.1: 9
    • FCS_DTLS_EXT.1.1: 2
    • FCS_DTLS_EXT.1.2: 2
    • FCS_IPSC_EXT.1: 2
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
    • FCS_TLCS_EXT: 1
    • FCS_TLCS_EXT.1: 1
    • FCS_TLSC: 2
    • FCS_TLSC_EXT: 9
    • FCS_TLSC_EXT.1: 19
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.1.5: 1
    • FCS_TLSC_EXT.2: 15
    • FCS_TLSC_EXT.2.1: 2
    • FCS_TLSC_EXT.3: 9
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 8
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 2
    • FCS_TLS_EXT.2: 2
    • FCS_TLS_EXT.3: 1
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 7
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 20
    • FDP_IFC_EXT.1.1: 2
    • FDP_RDP.2: 1
    • FDP_RIP: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_PAE_EXT: 1
    • FIA_PAE_EXT.1: 8
    • FIA_PAE_EXT.1.1: 1
    • FIA_PSK_EXT: 1
    • FIA_PSK_EXT.1: 7
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_UAU: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF_EXT.1: 8
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 8
    • FMT_SMF_EXT.1: 20
    • FMT_SMF_EXT.1.1: 3
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT: 1
    • FPT_SRP_EXT.1: 7
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT: 6
    • FPT_TST_EXT.1: 30
    • FPT_TST_EXT.1.1: 3
    • FPT_TST_EXT.1.2: 2
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 13
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 8
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 2
    • FTA_WSE_EXT.1: 9
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT: 3
    • FTP_ITC_EXT.1: 29
    • FTP_ITC_EXT.1.1: 3
    • FTP_ITC_EXT.1.2: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 2
    • A.PHYSICAL: 2
    • A.TRAINED_USERS: 2
    • A.TRUSTED_ADMIN: 2
  • D:
    • D.TSF: 12
    • D.USER: 15
  • O:
    • O.ACCESS: 1
    • O.ACCESS_: 1
    • O.ACCESS_CONTROL: 10
    • O.ADMIN_ROLES: 9
    • O.AUDIT: 12
    • O.COMMS_PROTECTION: 14
    • O.FAX_NET_SEPARATION: 4
    • O.PURGE_DATA: 6
    • O.STORAGE_ENCRYPTION: 2
    • O.TSF_SELF_TEST: 4
    • O.UPDATE_VERIFICATION: 5
    • O.USER_AUTHORIZATION: 11
  • OE:
    • OE.ADMIN_TRAINING: 2
    • OE.ADMIN_TRUST: 2
    • OE.NETWORK_PROTECTION: 2
    • OE.PHYSICAL_PROTECTION: 2
    • OE.USER_TRAINING: 2
  • OSP:
    • OSP: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.NET_COMRPOMISE: 1
    • T.TSF_COMPROMISE: 2
    • T.TSF_FAILURE: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_UPDATE: 2
  • A:
    • A.NO_TOE_BYPASS: 6
    • A.PHYSICAL: 3
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ACCOUNTABILITY: 11
    • O.AUTH_COMM: 4
    • O.CRYPTOGRAPHIC_FUNCTIONS: 3
    • O.INTEGRITY: 11
    • O.MANAGEMENT: 10
    • O.PROTECTED_COMMS: 10
    • O.PROTECTED_STORAGE: 5
    • O.SYSTEM_MONITORING: 4
    • O.TOE_ADMINISTRATION: 4
    • O.TSF_SELF_TEST: 4
    • O.WIRELESS_ACCESS_POINT_: 1
    • O.WIRELESS_ACCESS_POINT_CO: 2
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.NO_TOE_BYPASS: 6
    • OE.PHYSICAL: 3
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
    • OE.TRUSTED_ADMIN: 3
    • OE.TRUSTED_CONFIG: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 5
    • T.NETWORK_ATTACK: 7
    • T.NETWORK_EAVESDROP: 6
    • T.TSF_CONFIGURATION: 2
    • T.TSF_FAILURE: 4
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNAUTHORIZED_UPDATE: 2
    • T.UNDETECTED_ACTIONS: 2
    • T.USER_DATA_REUSE: 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 2
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 230
    • Microsoft Corporation: 5
  • Samsung:
    • Samsung: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 6
  • AES_competition:
    • AES:
      • AES: 27
      • AES-: 1
      • AES-128: 1
      • AES-256: 4
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 16
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 2
  • RSA:
    • RSA 2048: 2
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 4
      • ECDHE: 7
    • ECDSA:
      • ECDSA: 21
  • FF:
    • DH:
      • DH: 11
      • DHE: 4
      • Diffie-Hellman: 11
    • DSA:
      • DSA: 9
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 8
      • SHA-384: 5
      • SHA-512: 1
      • SHA256: 3
  • SHA:
    • SHA1:
      • SHA-1: 5
      • SHA1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-256: 13
      • SHA-384: 3
      • SHA-512: 3
      • SHA256: 4
      • SHA384: 3
      • SHA512: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 23
  • MAC:
    • MAC: 21
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 9
    • IKEv1: 11
    • IKEv2: 8
  • IPsec:
    • IPsec: 42
  • SSH:
    • SSH: 4
  • TLS:
    • TLS:
      • TLS: 3
  • IKE:
    • IKE: 49
    • IKEv1: 28
    • IKEv2: 24
  • IPsec:
    • IPsec: 214
  • PGP:
    • PGP: 1
  • TLS:
    • DTLS:
      • DTLS: 23
      • DTLS 1.0: 2
      • DTLS 1.2: 3
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 104
      • TLS 1.0: 3
      • TLS 1.1: 3
      • TLS 1.2: 5
  • VPN:
    • VPN: 134
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 4
  • TRNG:
    • TRNG: 2
  • PRNG:
    • DRBG: 8
    • PRNG: 2
  • RNG:
    • RBG: 14
    • RNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 20
    • P-384: 20
    • P-521: 14
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_NULL_WITH_NULL_NULL: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 5
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 2
    • malfunction: 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • ISO:
    • ISO/IEC 18031:2011: 3
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-56B: 1
    • NIST SP 800-90A: 3
  • RFC:
    • RFC 3164: 1
    • RFC 3602: 6
    • RFC 4106: 2
    • RFC 4109: 2
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4304: 2
    • RFC 4868: 2
    • RFC 5282: 1
    • RFC2409: 1
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 1
    • FIPS 180-4: 1
    • FIPS 186-4: 16
    • FIPS 197: 2
    • FIPS 198-1: 1
    • FIPS 198-2: 1
    • FIPS PUB 186-4: 8
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 2900-2: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38C: 3
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 2
    • NIST SP 800-38F: 3
    • NIST SP 800-56A: 2
    • NIST SP 800-56B: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90: 1
    • NIST SP 800-90A: 1
    • NIST SP 800-90B: 1
    • SP 800-56A: 1
    • SP 800-90: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2246: 3
    • RFC 2396: 1
    • RFC 2404: 1
    • RFC 2408: 1
    • RFC 2560: 1
    • RFC 2818: 1
    • RFC 3268: 1
    • RFC 3394: 1
    • RFC 3526: 2
    • RFC 3546: 2
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4301: 5
    • RFC 4303: 1
    • RFC 4304: 1
    • RFC 4306: 1
    • RFC 4346: 1
    • RFC 4347: 1
    • RFC 4366: 1
    • RFC 4492: 1
    • RFC 4681: 1
    • RFC 4868: 3
    • RFC 4945: 1
    • RFC 5216: 1
    • RFC 5246: 15
    • RFC 5280: 7
    • RFC 5288: 8
    • RFC 5289: 18
    • RFC 5430: 2
    • RFC 5759: 1
    • RFC 6066: 1
    • RFC 6125: 1
    • RFC 6347: 2
    • RFC 6379: 1
    • RFC 7296: 2
  • X509:
    • X.509: 27
    • x.509: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: kballantyne
  • /CreationDate: D:20210125090256-05'00'
  • /Creator: PDFCreator 3.2.0.11758
  • /Keywords:
  • /ModDate: D:20210125090256-05'00'
  • /Producer: PDFCreator 3.2.0.11758
  • /Subject:
  • /Title: Lexmark NoHD Security Target 17
  • pdf_file_size_bytes: 677827
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different