| name |
SECIRON – Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 |
CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.1 (code SAAAAR : 203523) |
| category |
Mobility |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
FR |
| status |
active |
active |
| not_valid_after |
06.02.2029 |
03.07.2028 |
| not_valid_before |
06.02.2024 |
27.07.2020 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C129-CERTIFICATE-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_58-S01fr.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C129-CR-v1a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_58fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SECIRON%20–%20Android%20Mobile%20Application%20Hardening%20Sandbox%20Module%20(AMAHSM)%20version%207.0-Security%20Target-1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020-58en.pdf |
| manufacturer |
SecIron (Malaysia) Sdn. Bhd. |
Idemia |
| manufacturer_web |
https://www.seciron.com |
https://www.idemia.com |
| security_level |
EAL2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
17bfc3f4edcb545c |
25a6ded2c7f9d53d |
| heuristics/cert_id |
ISCB-3-RPT-C129-CR-v1a |
ANSSI-CC-2020/58 |
| heuristics/cert_lab |
[] |
CEA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
{} |
ASE_APD.1, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions |
7.0 |
2.1, 9.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2020/07, BSI-DSZ-CC-1110-V2-2019 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2020/07, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-V2-2019 |
| heuristics/scheme_data |
- cert_no: 2024-001-C129
- certification_date: 06.02.2024
- developer: SecIron (Malaysia) Sdn. Bhd. (201801025495 (1287515-T))
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C129
- certification_date: 06.02.2024
- developer: Unit 704, Uptown One, No. 1, Jalan SS21/58, Damansara Uptown, 47400 Petaling Jaya, SelangorE-mail: [email protected]: +601133503181Website: https://www.seciron.com
- expiration_date: 06.02.2029
- mutual_recognition: CCRA
- product: SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/ISCB-3-RPT-C129-CR-v1a.pdf
- scope: Android Mobile Application Hardening Sandbox Module is a product designed by SECIRON and developed as part of IronWALL. IronWALL is designed to safeguard against a wide range of threats, including mobile application tampering, reverse engineering, debugging, jailbreaks, application cloning, malware, repackaging and other attacks on untrusted environment. The integrated security guarantee service effectively prevents malicious attacks against mobile applications such as de-compilation, repackaging, memory injection, dynamic debugging, data theft, transaction hijacking, and application phishing, and comprehensively protects application software security.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/c129/SECIRON__Android_Mobile_Application_Hardening_Sandbox_Module_AMAHSM_version_7.0-Security_Target-1.0.pdf
- type: Mobility
- expiration_date: 06.02.2029
- level: EAL2
- product: SECIRON - Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/169
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2020/07 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2020/07, BSI-DSZ-CC-1110-V2-2019 |
| heuristics/protection_profiles |
{} |
a33327d40f253f46 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename |
ISCB-5-CERT-C129-CERTIFICATE-v1.pdf |
Certificat-CC-2020_58-S01fr.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20240222045557Z00'00'
- /Creator: Word
- /ModDate: D:20240222045557Z00'00'
- /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
- /Title: ISCB-5-CERT-C129-CERTIFICATE-v1
- pdf_file_size_bytes: 829372
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20230706165433+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230706170300+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 159880
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
ISCB-3-RPT-C129-CR-v1a.pdf |
anssi-cc-2020_58fr.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2020/58
- cert_item: CombICAO Applet v2.1 in EAC with PACE configuration for French ID on ID-One Cosmo V9.1
- cert_item_version: Code SAAAAR : 203523
- cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
- developer: IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Machine Readable Travel Document with "ICAO Application", Extended Access Control with PACE, version 1.3.2 certifié BSI-CC-PP-0056-V2-2012-MA-02 le 5 décembre 2012
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C129-CR-v1a: 30
|
- DE:
- BSI-DSZ-CC-1110-V2-2019: 1
- FR:
- ANSSI-CC-2020/07: 1
- ANSSI-CC-2020/58: 18
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-PP-0056-V2-2012-MA-02: 1
- BSI-PP-0084-2014: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Idemia:
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 1
|
| pdf_data/report_keywords/eval_facility |
|
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 2
- CESTI:
- Serma:
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20240222044408Z00'00'
- /Creator: Word
- /ModDate: D:20240222044408Z00'00'
- /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
- /Title: ISCB-3-RPT-C129-CR-v1a
- pdf_file_size_bytes: 1100872
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
|
| pdf_data/st_filename |
|
anssi-cible-cc-2020-58en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 7
- EAL5 augmented: 3
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 16
- ADV_FSP: 1
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 22
- ADV_IMP: 1
- ADV_IMP.1: 16
- ADV_INT: 1
- ADV_INT.2: 7
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 23
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 16
- AGD_PRE: 1
- AGD_PRE.1: 12
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 16
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 15
- ALC_LCD: 1
- ALC_LCD.1: 9
- ALC_SCT: 1
- ALC_STM: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 12
- APE:
- ASE:
- ASE_APD.1: 1
- ASE_CCL: 1
- ASE_CCL.1: 15
- ASE_ECD: 1
- ASE_ECD.1: 14
- ASE_INT: 1
- ASE_INT.1: 17
- ASE_OBJ: 1
- ASE_OBJ.2: 13
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD: 1
- ASE_SPD.1: 8
- ASE_TSS: 1
- ASE_TSS.1: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 8
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_DPT.3: 7
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
- AVA_VAN: 1
- AVA_VAN.3: 1
- AVA_VAN.5: 15
|
| pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 85
- FCS_CKM.1: 17
- FCS_CKM.2: 5
- FCS_CKM.4: 53
- FCS_CKM.4.1: 1
- FCS_COP: 121
- FCS_COP.1: 16
- FCS_RND: 2
- FCS_RND.1: 24
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 39
- FDP_ACC.1: 7
- FDP_ACF: 42
- FDP_ACF.1: 17
- FDP_DAU: 10
- FDP_DAU.1: 2
- FDP_IFC.1: 3
- FDP_ITC: 13
- FDP_ITC.1: 15
- FDP_ITC.2: 12
- FDP_RIP.1: 19
- FDP_RIP.1.1: 1
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 31
- FIA_AFL.1: 4
- FIA_API: 34
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_UAU: 124
- FIA_UAU.1: 4
- FIA_UAU.4: 1
- FIA_UAU.5: 2
- FIA_UAU.6: 3
- FIA_UID: 23
- FIA_UID.1: 4
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 17
- FMT_LIM.1.1: 2
- FMT_LIM.2: 16
- FMT_LIM.2.1: 2
- FMT_MOF: 30
- FMT_MOF.1: 4
- FMT_MSA.1: 3
- FMT_MSA.3: 9
- FMT_MTD: 216
- FMT_MTD.1: 21
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 73
- FMT_SMF.1.1: 1
- FMT_SMR: 43
- FMT_SMR.1: 24
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 17
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 28
- FTP_ITC.1: 8
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
- Idemia:
- Morpho:
- Oberthur:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 6
- TDES: 2
- Triple-DES: 10
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 6
- SHA-512: 4
- SHA2: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 6
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 17
- EF.DG1: 21
- EF.DG13: 2
- EF.DG14: 5
- EF.DG15: 1
- EF.DG16: 20
- EF.DG2: 6
- EF.DG3: 15
- EF.DG4: 15
- EF.DG5: 5
- EF.SOD: 13
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 18013: 6
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 1
- PKCS:
- RFC:
- SCP:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author: Shubham SAGAR
- /CreationDate: D:20200617125453+05'30'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20200617125453+05'30'
- /Producer: Microsoft® Word 2016
- /Title: Title
- pdf_file_size_bytes: 2860114
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 174
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |