name |
Virtual Machine of ID Motion V1 G230 mask with AMD 122v1 |
Virtual Machine of ID Motion V1 G231 mask with AMD 122v1 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
25.03.2013 |
29.03.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_10_fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_11_fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible2013_10en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible-2013_11en.pdf |
manufacturer |
Gemalto / Trusted Labs |
Gemalto / Trusted Labs |
manufacturer_web |
https://www.gemalto.com |
https://www.gemalto.com |
security_level |
EAL7 |
EAL7 |
dgst |
36c11c9e89af25a3 |
32f420aa3f6ca59c |
heuristics/cert_id |
ANSSI-CC-2013/10 |
ANSSI-CC-2013/11 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_TDS.6, ATE_FUN.2, ADV_SPM.1, ADV_COMP.1, ADV_IMP.2, AVA_VAN.5, ALC_LCD.2, ALC_CMC.5, ALC_DVS.2, ADV_FSP.6, ATE_COV.3, ALC_TAT.3, ATE_DPT.4, ADV_INT.3 |
ADV_TDS.6, ATE_FUN.2, ADV_SPM.1, ADV_COMP.1, ADV_IMP.2, AVA_VAN.5, ALC_LCD.2, ALC_CMC.5, ALC_DVS.2, ADV_FSP.6, ATE_COV.3, ALC_TAT.3, ATE_DPT.4, ADV_INT.3 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2012/44 |
ANSSI-CC-2012/85 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, ANSSI-CC-2012/44 |
ANSSI-CC-2012/85, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0640-2010 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 |
BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0640-2010 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC-2013_10_fr.pdf |
ANSSI-CC-2013_11_fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2012/44: 5
- ANSSI-CC-2013/10: 18
|
- FR:
- ANSSI-CC-2012/85: 5
- ANSSI-CC-2013/11: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 3
- EAL4: 2
- EAL7: 2
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 3
- EAL4: 2
- EAL7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: torno
- /CreationDate: D:20130325134815+01'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20130325134815+01'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: ANSSI-CC-2013_10_fr
- pdf_file_size_bytes: 167352
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author: torno
- /CreationDate: D:20130304090501+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20130304090501+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: ANSSI-CC-2013_11_fr
- pdf_file_size_bytes: 166636
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
anssi-cc-cible2013_10en.pdf |
anssi-cc-cible-2013_11en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0606-2010: 4
- BSI-DSZ-CC-0640-2010: 7
- BSI-DSZ-CC-0813-2012: 1
|
- DE:
- BSI-DSZ-CC-0606-2010: 8
- BSI-DSZ-CC-0640-2010: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_COMP.1: 1
- ADV_FSP.6: 2
- ADV_IMP.2: 2
- ADV_INT.3: 2
- ADV_SPM.1: 2
- ADV_TDS.6: 2
- ALC:
- ALC_CMC.5: 2
- ALC_DVS.2: 2
- ALC_LCD.2: 2
- ALC_TAT.3: 2
- ATE:
- ATE_COV.3: 2
- ATE_DPT.4: 2
- ATE_FUN.2: 2
- AVA:
|
- ADV:
- ADV_COMP.1: 1
- ADV_FSP.6: 2
- ADV_IMP.2: 2
- ADV_INT.3: 2
- ADV_SPM.1: 2
- ADV_TDS.6: 2
- ALC:
- ALC_CMC.5: 2
- ALC_DVS.2: 2
- ALC_LCD.2: 2
- ALC_TAT.3: 2
- ATE:
- ATE_COV.3: 2
- ATE_DPT.4: 2
- ATE_FUN.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ACC.2: 1
- FAU_ARP: 3
- FAU_ARP.1: 4
- FAU_ARP.1.1: 1
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 5
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 4
- FDP_ACC.2: 6
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 9
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 3
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 3
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 4
- FRU_RSA.1.1: 1
|
- FAU:
- FAU_ACC.2: 1
- FAU_ARP: 3
- FAU_ARP.1: 4
- FAU_ARP.1.1: 1
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 5
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 4
- FDP_ACC.2: 6
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 9
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 3
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 3
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 4
- FRU_RSA.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLI_CONT: 1
- A.CIPHER: 1
- A.CLON: 1
- A.DECIPHER: 1
- A.DIS_MEMORY: 1
- A.LOAD: 2
- A.MOD_MEMORY: 1
- A.OPERATE: 1
- A.REMOVE: 1
- A.SECURITY: 2
- A.SIDE: 1
- A.TAMPER_ES: 2
- O:
- O.APPLI_DEV: 3
- O.CIPHER: 1
- O.DECIPHER: 1
- O.DEV_DIS_ES: 4
- O.DLV_DATA: 4
- O.EFECT_REMOVE: 1
- O.EFFECT_LOAD: 3
- O.EFFECT_REMOVE: 3
- O.FLAW: 1
- O.INIT_ACS: 3
- O.LOAD: 2
- O.REMOVE: 1
- O.RESOURCE: 3
- O.RND: 1
- O.ROLLBACK: 2
- O.SAMPLE_ACS: 1
- O.SECURITY: 1
- O.SEGREGATE: 3
- O.SIDE: 3
- O.TAMPER_ES: 5
- OSP:
- OSP.CIPHER: 1
- OSP.CONF-ALU: 1
- T:
- T.APP_CORR: 3
- T.APP_DISC: 3
- T.APP_MOD: 4
- T.APP_READ: 3
- T.APP_REMOVE: 4
- T.DEL_REMOVE: 4
- T.DIS_DATA: 6
- T.DIS_TEST_ES: 2
- T.ERR_REMOVE: 3
- T.LOAD_APP: 4
- T.LOAD_MAN: 2
- T.LOAD_MOD: 2
- T.LOAD_OTHER: 2
- T.MOD: 2
- T.MOD_DATA: 4
- T.MOD_EXE: 4
- T.MOD_LOAD: 2
- T.MOD_SHARE: 2
- T.MOD_TSF: 3
- T.RESOURCES: 2
- T.RND: 1
- T.T_CMD: 4
- T.T_ES: 2
- T.T_TOOLS: 2
|
- A:
- A.APPLI_CONT: 1
- A.CIPHER: 1
- A.CLON: 1
- A.DECIPHER: 1
- A.DIS_MEMORY: 1
- A.LOAD: 2
- A.MOD_MEMORY: 1
- A.OPERATE: 1
- A.REMOVE: 1
- A.SECURITY: 2
- A.SIDE: 1
- A.TAMPER_ES: 2
- O:
- O.APPLI_DEV: 3
- O.CIPHER: 1
- O.DECIPHER: 1
- O.DEV_DIS_ES: 4
- O.DLV_DATA: 4
- O.EFECT_REMOVE: 1
- O.EFFECT_LOAD: 3
- O.EFFECT_REMOVE: 3
- O.FLAW: 1
- O.INIT_ACS: 3
- O.LOAD: 2
- O.REMOVE: 1
- O.RESOURCE: 3
- O.RND: 1
- O.ROLLBACK: 2
- O.SAMPLE_ACS: 1
- O.SECURITY: 1
- O.SEGREGATE: 3
- O.SIDE: 3
- O.TAMPER_ES: 5
- OSP:
- OSP.CIPHER: 1
- OSP.CONF-ALU: 1
- T:
- T.APP_CORR: 3
- T.APP_DISC: 3
- T.APP_MOD: 4
- T.APP_READ: 3
- T.APP_REMOVE: 4
- T.DEL_REMOVE: 4
- T.DIS_DATA: 6
- T.DIS_TEST_ES: 2
- T.ERR_REMOVE: 3
- T.LOAD_APP: 4
- T.LOAD_MAN: 2
- T.LOAD_MOD: 2
- T.LOAD_OTHER: 2
- T.MOD: 2
- T.MOD_DATA: 4
- T.MOD_EXE: 4
- T.MOD_LOAD: 2
- T.MOD_SHARE: 2
- T.MOD_TSF: 3
- T.RESOURCES: 2
- T.RND: 1
- T.T_CMD: 4
- T.T_ES: 2
- T.T_TOOLS: 2
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 4
- Infineon Technologies: 5
- Thales:
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies: 5
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- malfunction: 1
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 1
|
- FI:
- Malfunction: 3
- malfunction: 1
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- for secure loading and execution of smartcard applications. Note that cryptographic primitives are out of scope. 1.5.4 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
- out of scope: 3
- the other subsystems of the MULTOS OS and some following ROMed applications (these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA) v1.0: 1
- these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 12 shows how these security functions satisfy the TOE security functional requirements. 7.1: 1
|
- OutOfScope:
- for secure loading and execution of smartcard applications. Note that cryptographic primitives are out of scope. 1.5.4 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
- out of scope: 3
- the other subsystems of the MULTOS OS and some following ROMed applications (these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA) v1.0: 1
- these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 12 shows how these security functions satisfy the TOE security functional requirements. 7.1: 1
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |