name |
Infineon Smart Card IC (Security Controller) SLE66C82P/m1474a15 and SLE66C42P/m1495a15 |
Youwipe Erasure Tool 4 with WipeCenter 4 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Data Protection |
scheme |
DE |
NL |
status |
archived |
active |
not_valid_after |
01.09.2019 |
12.08.2025 |
not_valid_before |
16.11.2004 |
12.08.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificate%200114526.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0204a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0114526-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0204b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/YouWipe_Common_Criteria_EAL3_ST_V6.0.pdf |
manufacturer |
Infineon Technologies AG |
AllWipe Oy Ltd. |
manufacturer_web |
https://www.infineon.com/ |
https://www.youwipe.com |
security_level |
EAL5 |
ALC_FLR.1, EAL3+ |
dgst |
079f81475a4b984c |
3c9501fa938f3556 |
heuristics/cert_id |
BSI-DSZ-CC-0204-2004 |
NSCIB-CC-0114526-CR |
heuristics/cert_lab |
BSI |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VLA.4, ADV_HLD.3, AVA_CCA.1, ATE_IND.2, ATE_COV.2, ASE_TSS.1, ASE_ENV.1, ALC_DVS.2, ADV_RCR.2, ADV_IMP.2, AVA_MSU.3, ASE_PPC.1, ADV_LLD.1, ASE_OBJ.1, ASE_REQ.1, AGD_ADM.1, ASE_SRE.1, ATE_DPT.2, ASE_INT.1, ADV_FSP.3, ATE_FUN.1, ALC_LCD.2, AGD_USR.1, ADV_SPM.3, ASE_DES.1, ADV_INT.1, ALC_TAT.2, AVA_SOF.1 |
ALC_CMS.3, ADV_ARC.1, ATE_IND.2, ATE_DPT.1, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ALC_DVS.1, ADV_TDS.2, ASE_ECD.1, AGD_OPE.1, AVA_VAN.2, ALC_CMC.3, ALC_FLR.1, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ADV_FSP.3, ATE_FUN.1, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1 |
heuristics/extracted_versions |
- |
4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
certificate 0114526.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL3: 1
- EAL3 augmented: 1
- EAL4: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20200820105007+01'00'
- /Creator: C458-M
- /ModDate: D:20200820163719+02'00'
- /Producer: KONICA MINOLTA bizhub C458
- /Title: C458-M&S20082010490
- pdf_file_size_bytes: 66649
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0204a.pdf |
NSCIB-CC-0114526-CR.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0204-2004
- cert_item: Infineon Smart Card IC (Security Controller) SLE66C82P/m1474a15 and SLE66C42P/m1495a15
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- NL:
|
- DE:
- NL:
- cert_id: NSCIB-CC-0114526-CR
- cert_item: Youwipe Erasure Tool 4 with WipeCenter 4
- cert_lab: Secura B.V.
- developer: AllWipe Ltd
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 10
- EAL5 augmented: 3
- EAL5+: 2
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 3: 1
- EAL 3 augmented: 1
- EAL3: 1
- EAL3 augmented: 1
- EAL3+: 1
- EAL4: 1
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 3
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 2
- ALC_TAT: 2
- ALC_TAT.2: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 4
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 5
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FPT_TST.2: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon: 25
- Infineon Technologies AG: 14
- Philips:
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 2
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- Malfunction: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 5
- Physical Probing: 1
- physical probing: 2
- side channel: 1
|
- other:
- JIL: 1
- reverse engineering: 1
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 3
- AIS 34: 2
- AIS 36: 3
- ISO:
- ISO/IEC 15408:1999: 1
- ISO/IEC15408: 1999: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2004, for the Product Smart Card IC (Security Controller) SLE66C82P/SLE66C42P / m1474/m1495, (confidential document) [8] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
- AG, Security and Chipcard ICs, SLE 66CxxxP Security Controller Family, Data Book Version 08.04, (confidential document) [10] SLE66CxxxP, Products and Bondout Errata Sheet, Version 07.04, (confidential document) [11: 1
- Management Scope (ACM_SCP), Version 1.2, 07. October 2004 (i.e. TOE Configuration List, confidential document) Certification Report BSI-DSZ-CC-0204-2004 B-26 This page is intentionally left blank: 1
- Security Controller Family, Confidential Instruction Set, 05.01, (confidential document) [12] Confidential Application Note, SLE66CxxxP, Transfer of a ROM M ask from SLE66CxxS to: 1
|
|
pdf_data/report_metadata |
- /Author: BSI
- /CreationDate: D:20041116103922
- /Creator: Microsoft Word - 0204a.doc
- /ModDate: D:20041116104205+01'00'
- /Producer: Acrobat PDFWriter 4.0 für Windows NT
- /Title: 0204a.PDF
- pdf_file_size_bytes: 197971
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 48
|
|
pdf_data/st_filename |
0204b.pdf |
YouWipe_Common_Criteria_EAL3_ST_V6.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 4
- EAL 5 augmented: 4
- EAL5: 4
- EAL5 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.2: 1
- ACM_SCP.3: 5
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 5
- ADV_HLD.3: 4
- ADV_IMP.2: 3
- ADV_INT.1: 2
- ADV_LLD.1: 11
- ADV_RCR.2: 3
- ADV_SPM.3: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.2: 1
- ALC_TAT.2: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 3
- AVA_SOF: 3
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 6
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 5
- FCS_COP.1: 17
- FCS_COP.1.1: 2
- FCS_RND: 2
- FCS_RND.1: 4
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_ITC.1: 4
- FDP_ITT.1: 3
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.2: 5
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 4
- FPT_FLS.1: 4
- FPT_ITT.1: 3
- FPT_PHP.3: 7
- FPT_SEP.1: 4
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.2: 23
- FPT_TST.2.1: 2
- FRU:
|
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.2: 5
- FCS_COP: 20
- FCS_COP.1: 3
- FCS_COP.1.1: 3
- FCS_RNG: 3
- FCS_RNG.1: 8
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_RNG.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITI.1: 6
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_STM.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.BEHAVED_DRIV: 1
- A.BEHAVED_DRIVES: 2
- A.BIOS_PREVENTI: 1
- A.BIOS_PREVENTING: 2
- A.COMPETENT_U: 1
- A.COMPETENT_USERS: 2
- A.CORRECT_DEPL: 1
- A.CORRECT_DEPLOYMENT: 3
- A.SECURE_LOCAT: 1
- A.SECURE_LOCATION: 3
- A.SYSTEM_TIME: 3
- A.TRUSTED_NET: 1
- A.TRUSTED_NETWORK: 2
- O:
- O.AUTHENTIC: 1
- O.AUTHENTICATED_USER: 5
- O.PROPER_A: 1
- O.PROPER_AUDIT: 5
- O.PROPER_ER: 1
- O.PROPER_ERASE: 7
- O.PROPER_RE: 1
- O.PROPER_REPORTS: 5
- O.USER_SEPARATION: 2
- O.USER_SEPE: 1
- O.USER_SEPERATION: 4
- OE:
- OE.BEHAVED_DRIVES: 2
- OE.BIOS_PREVENTING: 3
- OE.COMPETENT_USERS: 3
- OE.CORRECT_DEPLOYMENT: 2
- OE.PROPER_TIME: 1
- OE.SECURE_LOCATION: 4
- OE.SYSTEM_TIME: 2
- T:
- T.DATA_RECOVER: 1
- T.DATA_RECOVERY: 2
- T.UNAUTHENTIC: 1
- T.UNAUTHENTICATED_USER: 2
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 8
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Malfunction: 8
- malfunction: 1
- SCA:
- DPA: 3
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Erasure Tool User Manual v.2.0.6 well as all the hardware associated with the targeted media, are out of scope for the evaluation. YouWipe lists all the detected hardware via its user interface (GUI). The user: 1
- as well as the hardware of the mobile phone are assumed to be operating correctly and are out of scope of the evaluation. After overwriting step, the data in disk is verified to be overwritten: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: Novinsky
- /CreationDate: D:20040224141104+01'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20040224141104+01'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - SecurityTarget_12.doc
- pdf_file_size_bytes: 210823
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: f.kirbiyik
- /CreationDate: D:20200803163651+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20200803163651+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 1239579
- pdf_hyperlinks: https://www.commoncriteriaportal.org/products/#DP
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |