name |
Fonction de filtrage de la suite logicielle IPSFirewall,version 9.1.0.5 |
Juniper Networks JUNOS 10.0 r4 for J-Series and SRX-Series Platforms |
category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
FR |
AU |
status |
archived |
archived |
not_valid_after |
21.10.2019 |
13.07.2017 |
not_valid_before |
21.10.2014 |
15.07.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_72.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS%20T027%20Certification%20Report%201%203.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[IN.039]%20NA_ASE_ciblesec_filter_v91.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20JUNOS%2010-0%20EAL3%20Reval%20ST%20v2-0.pdf |
manufacturer |
Netasq |
Juniper Networks, Inc. |
manufacturer_web |
https://www.netasq.com/ |
https://www.juniper.net/ |
security_level |
EAL4+, ALC_FLR.3 |
EAL3 |
dgst |
0c805fd278f96fef |
f38a309403b4e023 |
heuristics/cert_id |
ANSSI-CC-2014/72 |
Certificate Number: 2011/75 |
heuristics/cert_lab |
OPPIDA |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2014-3818, CVE-2024-30380, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2022-22214, CVE-2024-39511, CVE-2023-28962, CVE-2024-39514, CVE-2023-36841, CVE-2024-39558, CVE-2013-6618, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2023-44184, CVE-2023-44175, CVE-2022-22243, CVE-2023-44186, CVE-2023-22406, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2022-22181, CVE-2022-22162, CVE-2022-22163, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2023-44194, CVE-2004-0468, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2024-21594, CVE-2024-39517, CVE-2024-21591, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2013-6170, CVE-2021-31362, CVE-2022-22197, CVE-2022-22245, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2023-22391, CVE-2023-44176 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.1, ATE_COV.2, ATE_FUN.1, ADV_TDS.2, ATE_IND.2, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_FSP.3, AVA_VAN.2, ALC_CMC.3, ATE_DPT.1, ALC_CMS.3, AGD_PRE.1 |
heuristics/extracted_versions |
9.1.0.5 |
10.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2014/70 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2014/70 |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC-2014_72.pdf |
EFS T027 Certification Report 1 3.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté ALC_FLR.3
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2014/72
- cert_item: Fonction de filtrage de la suite logicielle IPS-Firewall
- cert_item_version: Version 9.1.0.5
- cert_lab: Oppida 4-6 avenue du vieil étang, Bâtiment B 78180 Montigny le Bretonneux France
- developer: NETASQ Parc Scientifique de la Haute borne Parc Horizon, Bâtiment 6, Avenue de l’Horizon 59650 Villeneuve d’Ascq France Commanditaire NETASQ Parc Scientifique de la Haute borne Parc Horizon, Bâtiment 6, Avenue de l’Horizon 59650 Villeneuve d’Ascq France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2014/70: 1
- ANSSI-CC-2014/72: 18
|
- AU:
- Certificate Number: 2011/75: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL3: 1
- EAL4: 2
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 3
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP. Authentication services can be handled either internally (fixed user selected: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2014_72
- pdf_file_size_bytes: 293397
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /AISEF: stratsec
- /Author: Windows User
- /Category: Report
- /Cert_Level: EAL 3
- /Company: Australasian Information Security Evaluation Program
- /CreationDate: D:20110719125815+10'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Date completed: 15 July 2011
- /Developer: Juniper Networks
- /IssueDate: 15 July 2011
- /ModDate: D:20110719125849+10'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Product: Juniper Networks JUNOS 10.0 r4 for J-Series and SRX-Series Platforms
- /Recorded date: 15 July 2011
- /SourceModified: D:20110719025419
- /Subject: Certificate Number: 2011/75
- /Title: Certification Report
- /docVersion: 1.2
- pdf_file_size_bytes: 249278
- pdf_hyperlinks: http://www.juniper.net/techpubs/, http://www.dsd.gov.au/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
[IN.039] NA_ASE_ciblesec_filter_v91.pdf |
JNPR JUNOS 10-0 EAL3 Reval ST v2-0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- NL:
- CC-01: 3
- CC-02: 4
- CC-03: 4
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 4
- ASE_REQ.2.3: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.3: 2
- ADV_TDS.2: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 3
- FAU_STG.3: 7
- FAU_STG.3.1: 2
- FDP:
- FDP_IFC.2: 7
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 2
- FDP_IFF.1: 7
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FMT:
- FPT:
|
- FAU:
- FAU_ARP.1: 6
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 5
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAA.1: 6
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCO:
- FCO_NRO.2: 6
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 6
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 15
- FDP_IFC.1.1: 2
- FDP_IFF.1: 15
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ROL.1: 5
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT.1: 6
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 13
- FMT_MTD.1.1: 3
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AUDIT: 4
- O.FILTRAGE: 6
- O.PERTE_AUDIT: 5
- OE:
- OE.BONNE_PF: 2
- OE.COUPURE: 3
- OE.INTEGRE: 2
- OE.JOURNAL: 2
- OE.PERSONNEL: 2
- OE.PROTECT_BOITIERS: 2
- OE.USAGE_STRICT: 2
|
- A:
- A.CRYPTO: 2
- A.EAUTH: 1
- A.LOCATE: 2
- A.NOEVIL: 4
- A.TIME: 1
- O:
- O.ACCESS: 19
- O.AMANAGE: 21
- O.AUDIT: 23
- O.AUTHENTICITY: 14
- O.CONFIDENTIALITY: 16
- O.EADMIN: 12
- O.FLOW: 13
- O.INTEGRITY: 15
- O.PROTECT: 23
- O.ROLBAK: 8
- O.SECURE_KEY: 10
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 3
- OE.EAUTH: 3
- OE.PHYSICAL: 6
- OE.TIME: 3
- T:
- T.CONFLOSS: 5
- T.MANDAT: 5
- T.NOAUDIT: 3
- T.OPS: 6
- T.PRIVIL: 8
- T.ROUTE: 10
- T.UNTRUSTED_PATH: 7
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- RFC:
- RFC 1349: 1
- RFC 2406: 1
- RFC 2474: 1
- RFC 768: 1
- RFC 792: 1
- RFC 793: 1
|
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 2
- PKCS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP. Authentication services can be handled either internally (fixed user selected: 1
|
pdf_data/st_metadata |
- /Author: Boris Maréchal
- /CreationDate: D:20140708105454+02'00'
- /Creator: Writer
- /Producer: LibreOffice 3.6
- /Title: Cible de sécurité fonction de filtrage de la suite logicielle IPS-Firewall Version 9.1
- pdf_file_size_bytes: 670051
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
- /AAPL:Keywords: []
- /Author: RAY POTTER
- /CreationDate: D:20110714053311Z00'00'
- /Creator: Microsoft Word
- /Keywords:
- /ModDate: D:20110714053311Z00'00'
- /Producer: Mac OS X 10.6.7 Quartz PDFContext
- /Title: Microsoft Word - JNPR JUNOS 10-0 EAL3 Reval ST v2-0.doc
- pdf_file_size_bytes: 1002176
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
True |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |