name |
Morpho JC ePassport V2.0.1 (BAC) |
Red Hat Enterprise Linux Version 7.1 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Operating Systems |
scheme |
DE |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
26.09.2021 |
not_valid_before |
21.12.2011 |
26.09.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0744a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0999a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0744b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0999b_pdf.pdf |
manufacturer |
Morpho B.V. |
Red Hat, Inc. |
manufacturer_web |
https://www.morpho.com |
https://www.redhat.com |
security_level |
EAL4+, ALC_DVS.2 |
EAL4+, ALC_FLR.3 |
dgst |
1f5f7bd43767d4fe |
8126b64e36fd4969 |
heuristics/cert_id |
BSI-DSZ-CC-0744-2011 |
BSI-DSZ-CC-0999-2016 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
cpe:2.3:o:redhat:enterprise_linux:7.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2001-0690, CVE-2003-0247, CVE-2002-0044, CVE-2000-0701, CVE-2002-0045, CVE-2001-0889, CVE-2002-1160, CVE-2001-0787, CVE-2002-0836, CVE-2002-1155, CVE-1999-0297, CVE-2000-0017, CVE-2002-0638, CVE-2001-0886, CVE-2003-0464, CVE-2007-3103, CVE-1999-0037, CVE-2001-0872, CVE-2016-7091, CVE-2015-7833, CVE-2003-0364, CVE-2001-1383, CVE-2002-1232, CVE-1999-0894, CVE-1999-0798, CVE-2003-0434, CVE-2001-0635, CVE-2003-0188, CVE-2001-0977, CVE-2001-1002, CVE-2003-0248, CVE-2001-0859, CVE-2003-0461, CVE-2003-0041, CVE-2003-0354, CVE-2003-0194, CVE-2017-1000253, CVE-1999-1288, CVE-2002-0080, CVE-2000-1207, CVE-2002-0083, CVE-2003-0370 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_INT.3, ATE_COMP.1, APE_INT.1, APE_SPD.1, ALC_COMP.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
2.0.1 |
7.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0731-2011 |
BSI-DSZ-CC-0754-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007 |
BSI-DSZ-CC-0754-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
OCSI/CERT/SYS/06/2017/RC, 2/PC1/AC223/2024 |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0731-2011 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
OCSI/CERT/SYS/06/2017/RC, 2/PC1/AC223/2024 |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0731-2011 |
{} |
heuristics/protection_profiles |
60455fc9564e2545 |
70cdc8b0cf910af7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0744a_pdf.pdf |
0999a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0744-2011
- cert_item: Morpho JC ePassport V2.0.1 (BAC
- cert_lab: BSI
- developer: Morpho B.V
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0999-2016
- cert_item: Red Hat Enterprise Linux Version 7.1
- cert_lab: BSI
- developer: Red Hat
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Operating System Protection Profile, Version 2.0, 01 June 2010, BSI-CC-PP-0067-2010, OSPP Extended Package – Advanced Management, Version 2.0, 28 May 2010, OSPP Extended Package – Labeled Security, Version 2.0, 28 May 2010
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0645-2010: 3
- BSI-DSZ-CC-0731-2011: 2
- BSI-DSZ-CC-0743-: 1
- BSI-DSZ-CC-0743-2011: 5
- BSI-DSZ-CC-0744-2011: 22
- BSI-DSZ-CC-0750-2011: 3
- BSI-DSZ-CC-S-0004-2010: 1
|
- DE:
- BSI-DSZ-CC-0754-2012: 3
- BSI-DSZ-CC-0999-2016: 25
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 5
- BSI-CC-PP-0056-2009: 1
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 7
- EAL 4 augmented: 3
- EAL 5: 2
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 10
- EAL 4 augmented: 3
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL4: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 3
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 3
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 4
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 3
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 1
- FCS_RNG.1: 3
- FIA:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Morpho:
- NXP:
- NXP: 11
- NXP Semiconductors: 3
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 3
- Triple-DES: 1
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-256: 27
- SHA-384: 19
- SHA-512: 15
- SHA256: 1
- SHA384: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- IKE:
- IKE: 19
- IKEv1: 7
- IKEv2: 9
- IPsec:
- PGP:
- SSH:
- TLS:
- TLS:
- TLS: 7
- TLS 1.1: 1
- TLS v1.0: 2
- TLS v1.1: 1
- TLSv1.1: 4
- TLSv1.2: 8
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 12
- NIST P-384: 2
- NIST P-521: 3
- P-256: 20
- P-384: 30
- P-521: 29
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 23: 1
- BSI 7125: 2
- BSI 7148: 1
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 4
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 3
- AIS 36: 2
- AIS 38: 2
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 1
- ICAO:
|
- BSI:
- AIS 20: 2
- AIS 32: 1
- AIS 38: 1
- FIPS:
- FIPS 186-4: 3
- FIPS180-4: 36
- FIPS186-4: 30
- FIPS197: 5
- FIPS198-1: 6
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- SP 800-38A: 3
- SP 800-67: 2
- PKCS:
- RFC:
- RFC 4253: 1
- RFC 5996: 1
- RFC1321: 1
- RFC2104: 3
- RFC2246: 1
- RFC2404: 2
- RFC2409: 9
- RFC2451: 1
- RFC2898: 1
- RFC3447: 15
- RFC3526: 3
- RFC3602: 1
- RFC3686: 1
- RFC4251: 3
- RFC4252: 4
- RFC4253: 12
- RFC4303: 1
- RFC4307: 4
- RFC4344: 1
- RFC4346: 5
- RFC4419: 1
- RFC4492: 3
- RFC4595: 1
- RFC4868: 1
- RFC5114: 2
- RFC5228: 1
- RFC5246: 8
- RFC5647: 1
- RFC5656: 2
- RFC5903: 2
- RFC5930: 1
- RFC5996: 6
- RFC6151: 1
- RFC6668: 3
- RFC7427: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 0.1.4, 06.12.2011, Security Target for Morpho JC ePassport version 2.0.1 (BAC), Morpho B.V. (confidential document) [7] Machine Readable Travel Document with "ICAO Application" Basic Access Control, Version 1.10: 1
- 3., 06.12.2011, Morpho B.V. (confidential document) [11] Preparative Procedures for the Morpho JC ePassport version 2.0.1 (BAC), document version 0.1: 1
- ETR), Version 2, 19.12.2011, Morpho JC ePassport version 2.0.1 (BAC), TÜV Informationstechnik GmbH (confidential document) [10] Configuration List, Scope for the Morpho JC ePassport version 2.0.1 (BAC), document version 0: 1
- Secure Smart Card Controller Revision 3, Version 2, 14.04.2011, TÜV Informationstechnik GmbH (confidential document) [17] ICAO Doc 9303, Part 1, “Machine Readable Passports”, sixth edition, 2006, Part. 2: 1
|
- ConfidentialDocument:
- 7] Evaluation Technical Report, Version: 3, Date: 2016-06-30, atsec information security GmbH (confidential document) [8] Operating System Protection Profile, Version 2.0, 01 June 2010, BSI-CC-PP-0067-2010, OSPP: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- list for the TOE: CI list for source, Date 2016-05-13, File name rhel-71-brew-logs.tar.bz2 (confidential document) [10] EAL4 Evaluated Configuration Guide for Red Hat Enterprise Linux 7.1, Version 0.25, Date: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20120116090949+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, BAC, Basic Access Control, Morpho"
- /ModDate: D:20120116091421+01'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0744-2011
- pdf_file_size_bytes: 962017
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20161014092452+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, OSPP, Linux, Red Hat Enterprise Linux 7.1"
- /ModDate: D:20161020103304+02'00'
- /Producer: LibreOffice 4.2
- /Subject: Certification Report
- /Title: Certification Report BSI-DSZ-CC-0999-2016
- pdf_file_size_bytes: 1107217
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
pdf_data/st_filename |
0744b_pdf.pdf |
0999b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0645-: 1
- BSI-DSZ-CC-0645-2010: 1
- BSI-DSZ-CC-0731-2011: 2
- BSI-DSZ-CC-0743: 1
- BSI-DSZ-CC-0744: 2
- BSI-DSZ-CC-0750-: 1
- BSI-DSZ-CC-0750-2011: 1
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 3
- EAL4 augmented: 2
|
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_SPM.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN.3: 1
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 18
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 7
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 11
- FCS_COP.1: 7
- FCS_RND: 8
- FCS_RND.1: 8
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_UCT.1: 4
- FDP_UCT.1.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API.1: 1
- FIA_SOS.2: 1
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 10
- FIA_UAU.4.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 14
- FMT_LIM.1.1: 2
- FMT_LIM.2: 13
- FMT_LIM.2.1: 2
- FMT_MSA.3: 1
- FMT_MTD: 9
- FMT_MTD.1: 4
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 60
- FCS_CKM.1.1: 4
- FCS_CKM.2: 31
- FCS_CKM.2.1: 3
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 36
- FCS_COP.1.1: 5
- FCS_RNG: 2
- FCS_RNG.1: 64
- FCS_RNG.1.1: 7
- FCS_RNG.1.2: 8
- FDP:
- FDP_ACC.1: 47
- FDP_ACC.1.1: 3
- FDP_ACC.2: 38
- FDP_ACC.2.1: 4
- FDP_ACC.2.2: 4
- FDP_ACF: 1
- FDP_ACF.1: 50
- FDP_ACF.1.1: 7
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 7
- FDP_CDP: 5
- FDP_CDP.1: 14
- FDP_CDP.1.1: 2
- FDP_ETC.2: 15
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 16
- FDP_IFC.2: 21
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 14
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 4
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.2: 7
- FDP_IFF.2.1: 1
- FDP_IFF.2.2: 1
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_ITC.1: 14
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 30
- FDP_ITC.2.1: 3
- FDP_ITC.2.2: 3
- FDP_ITC.2.3: 3
- FDP_ITC.2.4: 3
- FDP_ITC.2.5: 3
- FDP_RIP.2: 13
- FDP_RIP.2.1: 1
- FDP_RIP.3: 13
- FDP_RIP.3.1: 1
- FDP_TDC.1: 1
- FDP_UCT: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 22
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FIA_USB.1: 1
- FIA_USB.2: 10
- FIA_USB.2.1: 1
- FIA_USB.2.2: 1
- FIA_USB.2.3: 1
- FIA_USB.2.4: 1
- FMT:
- FMT_MSA.1: 64
- FMT_MSA.1.1: 7
- FMT_MSA.3: 64
- FMT_MSA.3.1: 9
- FMT_MSA.3.2: 9
- FMT_MSA.4: 6
- FMT_MSA.4.1: 1
- FMT_MTD.1: 121
- FMT_MTD.1.1: 18
- FMT_REV.1: 12
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMF_RMT.1: 3
- FMT_SMR.1: 3
- FMT_SMR.2: 43
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_FLS.1: 27
- FPT_FLS.1.1: 3
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 30
- FPT_TDC.1.1: 3
- FPT_TDC.1.2: 3
- FTA:
- FTA_SSL.1: 7
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 7
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 15
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.AUTHUSER: 3
- A.CONNECT: 4
- A.DETECT: 3
- A.IT: 3
- A.KEYS: 3
- A.MANAGE: 5
- A.PEER: 6
- A.PHYSICAL: 4
- A.TRAINEDUSER: 3
- O:
- O.AUDITING: 15
- O.COMP: 37
- O.CP: 19
- O.CRYPTO: 19
- O.DISCRETIONARY: 11
- O.LS: 29
- O.MANAGE: 27
- O.NETWORK: 12
- O.ROLE: 17
- O.RUNTIME: 8
- O.SUBJECT: 11
- O.TRUSTED_CHANNEL: 5
- OE:
- OE.ADMIN: 6
- OE.INFO_PROTECT: 9
- OE.INSTALL: 4
- OE.IT: 4
- OE.MAINTENANCE: 3
- OE.PHYSICAL: 3
- OE.RECOVER: 4
- OE.REMOTE: 4
- OE.TRUSTED: 4
- T:
- T.ACCESS: 27
- T.COMM: 5
- T.DATA_NOT_SEPARATED: 3
- T.IA: 6
- T.RESTRICT: 3
- T.ROLE: 6
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 1
- TÜViT: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 1
- SHA-256: 7
- SHA-384: 4
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- KEX:
- Key Exchange: 4
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 19
- IKEv1: 11
- IKEv2: 13
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 24
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.1: 1
- TLS v1.2: 1
- TLSv1.0: 1
- TLSv1.1: 3
- TLSv1.2: 1
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 1
- P-384: 1
- P-521: 1
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 1
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 2
- timing attacks: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 7
- EF.DG1: 19
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 3
- EF.DG16: 19
- EF.DG2: 7
- EF.DG3: 6
- EF.DG4: 5
- EF.DG5: 6
- EF.SOD: 7
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 180-212: 1
- FIPS 197: 1
- FIPS 46-3: 3
- FIPS46: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- RFC:
|
- BSI:
- FIPS:
- FIPS 140-2: 22
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS PUB 186-4: 4
- FIPS140-2: 1
- FIPS180-4: 2
- FIPS197: 2
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
- RFC 5246: 5
- RFC 768: 1
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
- RFC2401: 2
- RFC2402: 2
- RFC2406: 2
- RFC2407: 2
- RFC2408: 2
- RFC2409: 7
- RFC3526: 4
- RFC3602: 3
- RFC4252: 10
- RFC4253: 18
- RFC4301: 3
- RFC4303: 4
- RFC4307: 5
- RFC4346: 3
- RFC4419: 3
- RFC5114: 3
- RFC5246: 5
- RFC5656: 4
- RFC5996: 5
- RFC6668: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples Page 136 of 156 Classification: public Version: 0.21 Copyright © 2016: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
pdf_data/st_metadata |
- /Author: Morpho bv
- /CreationDate: D:20111206132301+01'00'
- /Creator: PDFCreator Version 1.0.1
- /Keywords: ASE-Lite, ST-Lite, BSI-DSZ-CC-0744, BAC, ePassport, ePass, MRTD, Machine Readable Travel Documents, CC, EAL4+
- /ModDate: D:20111206132301+01'00'
- /Producer: GPL Ghostscript 8.71
- /Subject: Security Target Lite for the Morpho JC ePassport, version 2.0.1 (BAC)
- /Title: 8929-8134-112 Morpho JC ePassport 2.0.1-J3A095R3 - ASE-Lite BAC V1.0.0
- pdf_file_size_bytes: 378211
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
- /Author: Stephan Mueller (generated by CCTool version 2.8.1.5)
- /CreationDate: D:20160817065518Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, Linux Distribution, Embedded Linux
- /ModDate: D:20160817065518Z
- /Producer: XEP 4.18 build 20100322
- /Subject: Red Hat Enterprise Linux
- /Title: Red Hat Enterprise Linux, Version 7.1 (version 0.21 as of 2016-06-09)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 1487091
- pdf_hyperlinks: http://tools.ietf.org/html/rfc2409, http://tools.ietf.org/html/rfc5114, http://tools.ietf.org/html/rfc5656, http://tools.ietf.org/html/rfc3526, http://www.ietf.org/rfc/rfc4307.txt, http://tools.ietf.org/html/rfc4301, http://tools.ietf.org/html/rfc3602, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://tools.ietf.org/html/rfc4252, http://tools.ietf.org/html/rfc2402, http://tools.ietf.org/html/rfc4253, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf, http://tools.ietf.org/html/rfc5246, http://tools.ietf.org/html/rfc5996, http://tools.ietf.org/html/rfc4303, http://tools.ietf.org/html/rfc2406, http://tools.ietf.org/html/rfc4419, http://tools.ietf.org/html/rfc2407, http://tools.ietf.org/html/rfc2401, http://tools.ietf.org/html/rfc6668, http://tools.ietf.org/html/rfc4346, http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf, http://tools.ietf.org/html/rfc2408
- pdf_is_encrypted: False
- pdf_number_of_pages: 156
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |