name |
Symfoware Server Enterprise extended Edtion 4.0 |
ZKA SECCOS Sig v2.6.4 R1.1 |
category |
Databases |
Products for Digital Signatures |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
01.09.2019 |
not_valid_before |
26.11.2003 |
22.07.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0449a_pdf.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0449b_pdf.pdf |
manufacturer |
Fujitsu Limited |
Sagem Orga GmbH |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.sagem-orga.com/ |
security_level |
EAL4 |
AVA_MSU.3, EAL4+, AVA_VLA.4 |
dgst |
505e2adba5d4a6cf |
5abddce0ce26912a |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
BSI-DSZ-CC-0449-2009 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3, ADV_IMP.1 |
heuristics/extracted_versions |
4.0 |
1.1, 2.6.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0421-2008 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0421-2008 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0421-2008 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0421-2008 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
0449a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0449-2009
- cert_item: ZKA SECCOS Sig v2.6.4 R1.1
- cert_lab: BSI
- developer: Sagem Orga GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0421: 3
- BSI-DSZ-CC-0421-2008: 1
- BSI-DSZ-CC-0421-2008-MA-01: 1
- BSI-DSZ-CC-0449-2009: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0006-2002: 1
- BSI-PP-0002: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 4+: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA2:
- SHA-2: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Fault Injection: 1
- fault injection: 1
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 25: 3
- AIS 26: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 3
- ISO/IEC 9796-2: 1
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1, Developer Sagem ORGA GmbH (confidential document) [8] Configuration List, Version V1.08, Sagem Orga GmbH, 07.07.2009, (confidential document) [9: 1
- Atmel Smart Card IC AT90SC28872RCU, BSI-DSZ-CC-0421, T-Systems GEI GmbH, Version 1.06, 08.10.2008 (confidential document) [12] Security Target for Atmel Smart Card IC AT90SC28872RCU, registered by Bundesamt für: 1
- Target BSI-DSZ-2009-0449, ZKA SECCOS Sig v2.6.4, Version V1.06, Sagem Orga GmbH, 02.07.2009 (confidential document) [7] Evaluation Technical Report (ETR), Version 1.5, Date 08.07.2009, Product ZKA SECCOS Sig v2.6.4: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090806143205+02'00'
- /Creator: Writer
- /Keywords: "ZKA SECCOS Sig v2.6.4 R1.1, Sagem Orga GmbH, Zertifzierung, Certification, Common Criteria"
- /ModDate: D:20090810103744+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0449-2009
- pdf_file_size_bytes: 742990
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
|
0449b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0421: 1
- BSI-DSZ-CC-0421-2008: 1
- BSI-DSZ-CC-0421-2008-MA-01: 1
- BSI-DSZ-CC-0421-2008-MA-02: 1
- BSI-DSZ-CC-0449: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0006-2002: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 3
- EAL 4+: 2
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 3
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 8
- AVA_SOF: 1
- AVA_SOF.1: 4
- AVA_VLA: 1
- AVA_VLA.4: 8
|
pdf_data/st_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 6
- FCS_CKM.1.1: 3
- FCS_CKM.2: 2
- FCS_CKM.2.1: 2
- FCS_CKM.3: 1
- FCS_CKM.3.1: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 3
- FCS_COP: 2
- FCS_COP.1: 5
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 11
- FDP_ACC.1.1: 7
- FDP_ACF: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 7
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 7
- FDP_ACF.1.4: 7
- FDP_ETC: 1
- FDP_ETC.1: 1
- FDP_ETC.1.1: 2
- FDP_ETC.1.2: 2
- FDP_IFC.1: 7
- FDP_ITC: 1
- FDP_ITC.1: 7
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.1.1: 2
- FDP_SDI: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 3
- FDP_UIT: 3
- FDP_UIT.1: 4
- FDP_UIT.1.1: 8
- FDP_UIT.1.2: 7
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 1
- FIA_ATD.1: 1
- FIA_ATD.1.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 2
- FIA_UID: 1
- FIA_UID.1: 4
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 2
- FMT_MOF.1.1: 2
- FMT_MSA: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 5
- FMT_MSA.2: 7
- FMT_MSA.2.1: 1
- FMT_MSA.3: 4
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MTD: 1
- FMT_MTD.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 2
- FMT_SMR: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 3
- FPT_AMT.1.1: 2
- FPT_FLS: 1
- FPT_FLS.1: 2
- FPT_FLS.1.1: 2
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_PHP.1.1: 2
- FPT_PHP.1.2: 2
- FPT_PHP.3: 1
- FPT_PHP.3.1: 2
- FPT_TST: 1
- FPT_TST.1: 3
- FPT_TST.1.1: 3
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 10
- FTP_ITC.1.1: 8
- FTP_ITC.1.2: 8
- FTP_ITC.1.3: 10
- FTP_TRP: 2
- FTP_TRP.1: 10
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 4
- FTP_TRP.1.3: 4
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Philips:
- Sagem:
|
pdf_data/st_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 8
- SHA-512: 8
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 5
- Fault injection: 2
- physical tampering: 7
- SCA:
- DPA: 6
- SPA: 6
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- CCIMB-2005-08-004: 1
- ISO:
- ISO/IEC 10118-3: 1
- ISO/IEC 11770-3: 1
- ISO/IEC 15408: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-3: 1
- ISO/IEC 7816-4: 2
- ISO/IEC 7816-8: 1
- ISO/IEC 7816-9: 1
- ISO/IEC 9796-2: 3
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Karsten Klohs
- /Comments: OdsDok V2.00n
- /Company: ORGA-Kartensysteme GmbH
- /CreationDate: D:20090702162539+02'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20090702162724+02'00'
- /OdsAcceptance: not applicable
- /OdsApproval: not applicable
- /OdsAuthor: Karsten Klohs
- /OdsCompany: Sagem ORGA GmbH
- /OdsCompanyCity: Paderborn
- /OdsConfidentiality:
- /OdsDocCatCombined: CSL (ST-Lite)
- /OdsDocCatLong: ST-Lite
- /OdsDocID: 3SECCOS.CSL.0004
- /OdsDocPool: 3.000000
- /OdsNumber: 0004
- /OdsPPTCombined: SECCOS (SECCOS - Secure Chip Card Operating System)
- /OdsReviewProto: not applicable
- /OdsTitel: ZKA SECCOS Sig v2.6.4
- /OdsVerDate: 02.07.2009
- /OdsVerID: V1.05
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20090702142453
- /Subject: Security Target for CC Evaluation EAL 4+
- /Title: ZKA SECCOS Sig v2.6.4
- pdf_file_size_bytes: 533925
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |