name |
Nubo Software Thin Client v2.0 |
Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; and Sourcefire 3D Sensor with IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D3800, 3D4500, 3D5800, 3D6500, and 3D9800) Version 4.8 |
category |
Other Devices and Systems |
Detection Devices and Systems |
scheme |
US |
US |
status |
archived |
archived |
not_valid_after |
23.07.2020 |
01.11.2014 |
not_valid_before |
23.07.2018 |
23.06.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10886-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10886-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10334-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10886-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10334-st.pdf |
manufacturer |
Nubo Software Inc. |
Sourcefire Inc. |
manufacturer_web |
https://nubosoftware.com |
https://www.sourcefire.com/ |
security_level |
{} |
EAL2 |
dgst |
3ae33cfddd92a583 |
4a2daeb3b59f674a |
heuristics/cert_id |
CCEVS-VR-10886-2018 |
CCEVS-VR-VID-10334-2010 |
heuristics/cert_lab |
US |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
2.0 |
4.8 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Application Software
- certification_date: 23.07.2018
- evaluation_facility: Acumen Security
- expiration_date: 23.07.2020
- id: CCEVS-VR-VID10886
- product: Nubo Software Thin Client v2.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10886
- vendor: Nubo Software LTD
|
- category: Wireless Monitoring
- certification_date: 23.06.2010
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10334
- product: Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; and Sourcefire 3D Sensor with IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D3800, 3D4500, 3D5800, 3D6500, and 3D9800) Version 4.8
- scheme: US
- url: https://www.niap-ccevs.org/product/10334
- vendor: Sourcefire, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
CCEVS-VR-VID-10406-2011 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
CCEVS-VR-VID-10502-2012, CCEVS-VR-VID-10406-2011 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
1aeebf1c5963b606 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_v1.2.pdf |
{} |
pdf_data/cert_filename |
st_vid10886-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10886-2018: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180726124154-04'00'
- /ModDate: D:20180726124154-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 180754
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10886-vr.pdf |
st_vid10334-vr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-10886-2018
- cert_item: for the Nubo Software Thin Client v2.0
- cert_lab: US NIAP
|
- US:
- cert_id: CCEVS-VR-VID10334-2010
- cert_item: Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; and Sourcefire 3D Sensor licensed for IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D3800, 3D4500, 3D5800, 3D6500, and 3D9800) Version 4.8.2.1 (SEU 259
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10334-2010: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 10
- EAL 2 augmented: 1
- EAL 3: 1
- EAL2: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 5
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 1
- FAU_SAR: 3
- FAU_SEL: 1
- FAU_STG: 2
- FIA:
- FIA_ATD: 1
- FIA_UAU_EXT: 1
- FIA_UID: 1
- FMT:
- FMT_MOF: 1
- FMT_MTD: 1
- FMT_SMF.1: 1
- FMT_SMR: 1
- FPT:
- FTA:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- T:
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20180726124116-04'00'
- /ModDate: D:20180726124116-04'00'
- pdf_file_size_bytes: 453494
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
|
pdf_data/st_filename |
st_vid10886-st.pdf |
st_vid10334-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 5
- EAL2 augmented: 2
- EAL2+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 24
- ADV_FSP.1: 3
- ADV_FSP.2: 16
- ADV_TDS.1: 16
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 13
- AGD_PRE: 1
- AGD_PRE.1: 9
- ALC:
- ALC_CMC: 2
- ALC_CMC.2: 8
- ALC_CMS.1: 1
- ALC_CMS.2: 8
- ALC_DEL.1: 7
- ALC_FLR.2: 19
- ATE:
- ATE_COV.1: 8
- ATE_FUN.1: 12
- ATE_IND.2: 9
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 5
- FCS_CKM.2: 1
- FCS_RBG_EXT.1: 3
- FCS_RBG_EXT.1.1: 2
- FCS_STO_EXT.1: 4
- FCS_STO_EXT.1.1: 2
- FCS_TLSC_EXT: 1
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.4: 3
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSS_EXT.1: 9
- FCS_TLSS_EXT.1.1: 3
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.2: 2
- FDP:
- FDP_DAR_EXT.1: 4
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT.1: 3
- FDP_DEC_EXT.1.1: 1
- FDP_DEC_EXT.1.2: 1
- FDP_NET_EXT.1: 3
- FDP_NET_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT.1: 3
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 2
- FMT_MEC_EXT.1: 4
- FMT_MEC_EXT.1.1: 2
- FMT_SMF.1: 3
- FMT_SMF.1.1: 3
- FPR:
- FPR_ANO_EXT.1: 3
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT.1: 3
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 4
- FPT_AEX_EXT.1.4: 2
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT.1: 3
- FPT_API_EXT.1.1: 1
- FPT_LIB_EXT.1: 3
- FPT_LIB_EXT.1.1: 1
- FPT_TUD_EXT.1: 3
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.1.5: 1
- FPT_TUD_EXT.1.6: 1
- FTP:
- FTP_DIT_EXT.1: 4
- FTP_DIT_EXT.1.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 13
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SEL.1: 10
- FAU_SEL.1.1: 1
- FAU_STG.1: 3
- FAU_STG.2: 14
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 1
- FAU_STG.4: 11
- FAU_STG.4.1: 1
- FDP:
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_UAU: 3
- FIA_UAU.1: 2
- FIA_UAU_EXT.1: 18
- FIA_UAU_EXT.1.1: 2
- FIA_UAU_EXT.1.2: 2
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MTD.1: 17
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 2
- FPT_ITC.1: 2
- FPT_ITI.2: 2
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 6
- FTA:
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- O.QUALITY: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
|
- A:
- A.ACCESS: 2
- A.ASCOPE: 2
- A.DYNMIC: 2
- A.LOCATE: 2
- A.MANAGE: 2
- A.NOEVIL: 2
- A.NOTRST: 2
- A.PROTCT: 2
- O:
- O.ACCESS: 11
- O.AUDIT: 1
- O.AUDITS: 7
- O.AUDIT_PROTECTION: 5
- O.AUDIT_SORT: 5
- O.EADMIN: 3
- O.EXPORT: 2
- O.IDANLZ: 5
- O.IDAUTH: 18
- O.IDSCAN: 6
- O.IDSENS: 8
- O.INTEGR: 6
- O.OFLOWS: 5
- O.PROTCT: 9
- O.RESPON: 4
- OE:
- OE.ALARMS: 10
- OE.AUDIT: 3
- OE.AUDIT_SORT: 3
- OE.CREDEN: 5
- OE.INSTAL: 5
- OE.INTROP: 5
- OE.PERSON: 5
- OE.PHYCAL: 6
- OE.PROTECTCOMM: 21
- OE.TIME: 9
- OE.XAUTH: 24
- T:
- T.COMDIS: 2
- T.COMINT: 2
- T.FACCNT: 2
- T.FALACT: 2
- T.FALASC: 2
- T.FALREC: 2
- T.IMPCON: 2
- T.INADVE: 2
- T.INFLUX: 2
- T.LOSSOF: 2
- T.MISACT: 2
- T.MISUSE: 2
- T.NOHALT: 2
- T.PRIVIL: 2
- T.SCNCFG: 2
- T.SCNMLC: 2
- T.SCNVUL: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- RFC:
- RFC 2560: 1
- RFC 2818: 2
- RFC 5246: 9
- RFC 5280: 4
- RFC 5289: 16
- RFC 6125: 1
- RFC5280: 1
- RFC5759: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.afollestad.materialdialogs.internal: 2
- com.crashlytics.android: 2
- com.google.android.gms: 2
- com.google.common: 1
- com.google.firebase.iid: 2
- com.google.firebase.messaging: 1
- com.google.firebase.provider: 2
- com.google.gson.internal.bind: 1
- com.google.gson.reflect: 2
- com.google.gson.stream: 1
- com.google.j2objc.annotations: 2
- com.google.thirdparty.publicsuffix: 1
- java:
- java.io: 1
- java.lang: 1
- java.math: 1
- java.net: 1
- java.nio.channels: 1
- java.nio.charset: 1
- java.security: 2
- java.security.spec: 1
- java.text: 1
- java.util.concurrent.atomic: 1
- java.util.concurrent.locks: 1
- java.util.jar: 1
- java.util.logging: 1
- java.util.regex: 1
- java.util.zip: 1
- org:
- org.apache.commons.net: 2
- org.apache.http.client.methods: 1
- org.apache.http.entity: 2
- org.apache.http.message: 1
- org.json: 1
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: CygnaCom
- /CreationDate: D:20100723164527
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20100723164527
- /Producer: Microsoft® Office Word 2007
- /Title: Sourcefire 2008 ST
- pdf_file_size_bytes: 1053969
- pdf_hyperlinks: http://en.wikipedia.org/wiki/Superuser
- pdf_is_encrypted: False
- pdf_number_of_pages: 105
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |