| name |
Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3) |
Fuji Xerox ApeosPort-IV C7780/C6680/C5580 (G4 Model) Series Controller Software Controller ROM Ver. 1.40.7 |
| category |
Detection Devices and Systems |
Other Devices and Systems |
| scheme |
US |
JP |
| status |
archived |
archived |
| not_valid_after |
20.07.2012 |
04.07.2016 |
| not_valid_before |
28.05.2008 |
23.06.2011 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID6002-VR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0297_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6002-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0297_est.pdf |
| manufacturer |
Cisco Systems, Inc. |
Fuji Xerox Co., Ltd. |
| manufacturer_web |
https://www.cisco.com |
https://www.fujixerox.co.jp/eng/ |
| security_level |
EAL2 |
EAL3 |
| dgst |
4560880f17789ba1 |
0015603fde7d9da8 |
| heuristics/cert_id |
CCEVS-VR-0062-2004 |
JISEC-CC-CRP-C0297 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AGD_USR.1, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ALC_FLR.1, AGD_ADM.1, AVA_SOF.1, ADV_HLD.1, ADV_RCR.1, AVA_VLA.1, ADV_FSP.1 |
ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ADV_FSP.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, AVA_VAN.2, ASE_SPD.1, ATE_IND.2, ATE_DPT.1, ADV_TDS.2, ASE_ECD.1, ALC_CMS.3, AGD_PRE.1, ALC_DVS.1, ASE_TSS.1, ASE_REQ.2, ALC_CMC.3, ALC_LCD.1, ASE_OBJ.2 |
| heuristics/extracted_versions |
4.1 |
1.40.7 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/6002/
- categories: ['Wireless Monitoring']
- category: Wireless Monitoring
- certification_date: 28.05.2004
- evaluation_facility: Arca CCTL
- expiration_date:
- id: CCEVS-VR-VID6002
- product: Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3)
- scheme: US
- url: https://www.niap-ccevs.org/products/6002
- vendor: Cisco Systems, Inc.
|
- cert_id: JISEC-CC-CRP-C0297
- certification_date: 01.06.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0297_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Device (MFD) that provides copy, print, scan, fax ,etc functions as basic functions. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFD via internal network, and general user client which is directly linked to the MFD. TOE security functions To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox ApeosPort-IV C7780/C6680/C5580 (G4 Model) Series Controller Software
- product_type: Control Software for Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0297_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0297_est.pdf
- toe_version: Controller ROM Ver. 1.40.7
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.07.2016
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0297_it0320.html
- toe_japan_name: Fuji Xerox ApeosPort-IV C7780/C6680/C5580 (G4 Model) Series Controller Software Controller ROM Ver. 1.40.7
- toe_overseas_link: None
- toe_overseas_name: -----
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
809ce30fff5c61f3 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_v1.4.pdf |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ST_VID6002-VR.pdf |
c0297_erpt.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-04-0062
- cert_item: Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0297-01: 1
- Certification No. C0297: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 10
- EAL 4: 1
- EAL2: 2
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- T:
- T.COMM_TAP: 2
- T.CONFDATA: 2
- T.CONSUME: 2
- T.DATA_SEC: 2
- T.RECOVER: 2
|
| pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 58
- Cisco Systems, Inc: 14
|
|
| pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 2
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Jandria Alexander
- /CreationDate: D:20040728124750-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20040728124810-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Validators Report
- pdf_file_size_bytes: 369902
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20111005135830+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111005135859+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 382965
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
| pdf_data/st_filename |
st_vid6002-st.pdf |
c0297_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 10
- EAL2 augmented: 6
|
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 6
- ADO_IGS.1: 6
- ADV:
- ADV_FSP.1: 9
- ADV_HLD.1: 12
- ADV_RCR.1: 5
- AGD:
- AGD_ADM.1: 13
- AGD_USR.1: 10
- ALC:
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 10
- ATE_IND.2: 8
- AVA:
- AVA_SOF.1: 7
- AVA_VLA.1: 7
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 3
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 11
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_SEL: 1
- FAU_SEL.1: 10
- FAU_SEL.1.1: 1
- FAU_STG: 2
- FAU_STG.2: 12
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MDT.1: 1
- FMT_MOF.1: 19
- FMT_MOF.1.1: 2
- FMT_MTD: 1
- FMT_MTD.1: 14
- FMT_MTD.1.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA: 1
- FPT_ITA.1: 7
- FPT_ITA.1.1: 1
- FPT_ITC: 1
- FPT_ITC.1: 8
- FPT_ITC.1.1: 1
- FPT_ITI: 1
- FPT_ITI.1: 10
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_RVM: 3
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP: 3
- FPT_SEP.1: 3
- FPT_SEP_ENV: 1
- FPT_SEP_ENV.1: 5
- FPT_SEP_EXP.1: 11
- FPT_STM: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 30
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 18
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UIA.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ASCOPE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.NOTRST: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 11
- O.AUDITS: 9
- O.CREDEN: 5
- O.EADMIN: 6
- O.EIDAUTH: 3
- O.EPROTCT: 3
- O.EXPORT: 4
- O.IDANLZ: 6
- O.IDAUTH: 21
- O.IDSCAN: 8
- O.IDSENS: 9
- O.INSTAL: 5
- O.INTEGR: 7
- O.INTROP: 5
- O.OFLOWS: 5
- O.PERSON: 5
- O.PHYCAL: 6
- O.PROTCT: 6
- O.PTPROTC: 1
- O.PTPROTCT: 2
- O.RESPON: 4
- O.TIME: 4
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.ENOHALT: 1
- T.FACCNT: 3
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 3
- T.IMPCON: 3
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.MISACT: 3
- T.MISUSE: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.SCNCFG: 3
- T.SCNMLC: 3
- T.SCNVUL: 3
- T.TIME: 3
|
- A:
- O:
- O.AUDITS: 8
- O.CIPHER: 6
- O.COMM_SEC: 7
- O.FAX_SEC: 5
- O.MANAGE: 9
- O.RESIDUAL: 6
- O.RESTRICT: 7
- O.USER: 7
- OE:
- T:
- T.COMM_TAP: 5
- T.CONFDATA: 3
- T.CONSUME: 5
- T.DATA_SEC: 3
- T.RECOVER: 5
|
| pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 36
- Cisco Systems, Inc: 104
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- RFC:
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Preferred Customer
- /CreationDate: D:20120627122124
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120627122124
- /Producer: Microsoft® Office Word 2007
- /Title: Cisco Systems, Inc
- pdf_file_size_bytes: 701192
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 84
|
- /Author:
- /CreationDate: D:20110818155810+09'00'
- /Creator: eDocument Library version 2.5.4
- /ModDate: D:20110818155810+09'00'
- /Producer: eDocument Library version 2.5.4 PDF Filter
- /Title:
- pdf_file_size_bytes: 731983
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |