name |
Apple iOS 11 Safari |
EOS Original Data Security System Version 1.0 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
09.11.2020 |
01.07.2011 |
not_valid_before |
09.11.2018 |
30.08.2007 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10916-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10916-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0115_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10916-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0115_est.pdf |
manufacturer |
Apple Inc. |
Canon Inc. |
manufacturer_web |
https://www.apple.com/ |
https://www.canon.com/ |
security_level |
{} |
EAL2 |
dgst |
62abbe3d7a3f0fcf |
64931b5adc0f51a9 |
heuristics/cert_id |
CCEVS-VR-VID-10916-2018 |
JISEC-CC-CRP-C0115 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
11 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Application Software, Web Browser
- certification_date: 09.11.2018
- evaluation_facility: Acumen Security
- expiration_date: 08.11.2020
- id: CCEVS-VR-VID10916
- product: Apple iOS 11 Safari
- scheme: US
- url: https://www.niap-ccevs.org/product/10916
- vendor: Apple Inc.
|
- cert_id: JISEC-CC-CRP-C0115
- certification_date: 01.08.2007
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1
- description: PRODUCT DESCRIPTION PRODUCT DESCRIPTION The TOE is a system that consists of a Canon EOS-1D Mark III (D-SLR), Original Data Security Administrator, Original Data Security Utility, and Original Data Security Card. The TOE has the following security functionalities in order to verify originality of image files taken with the EOS-1D Mark III and to keep confidentiality of digital images. Canon EOS-1D Mark III has the following security functionalities : - a verification data generation function to verify the originality of image files, - an encryption function to encrypt/decrypt the image files, - an encryption function to encrypt/decrypt a key of image file encryption, - a connection function to identify and connect a OS Card. Original Data Security Utility has a decryption function to decrypt the image files. Original Data Security Utility/Original Data Security Administrator has a management function to support the registration of an authentication data. OS Card has the following security functionalities : - a verification function to verify the originality of image files based on the verification data, - a decryption function to decrypt the encrypted key used for image encryption, - an encryption function to encrypt/decrypt a card key, - an access control function to manage/access-control the card key, - a connection function to identify and connect a EOS-1D Mark III, - an authentication function to authenticate users of Original Data Security Utility/Original Data Security Administrator.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: EOS Original Data Security System
- product_type: IT Product (Digital Camera System)
- toe_version: 1.0
- vendor: Canon Inc.
- expiration_date: 01.07.2011
- supplier: Canon Inc.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0115_it6108.html
- toe_japan_name: EOS Original Data Security System 1.0 (Certification of this product has been revoked 2011-07)
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
1aeebf1c5963b606, c5080f741829d2e9 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_v1.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_webbrowser_ep_v2.0.pdf |
{} |
pdf_data/cert_filename |
st_vid10916-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10916-2018: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20181113111202-05'00'
- /ModDate: D:20181113111202-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181114
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10916-vr.pdf |
c0115_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10916-2018
- cert_item: for the Apple IOS 11 Safari on iPhone and iPad
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10916-2018: 1
|
- JP:
- CRP-C0115-01: 1
- Certification No. C0115: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FPT:
- FPT_DNL_EXT.1.2: 1
- FPT_TUD_EXT.1.4: 1
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- T:
- T.FLAWED_ADDON: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 2
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
- T.SAME-ORIGIN_VIOLATION: 1
|
- A:
- A.MANAGER: 1
- A.PERIPHERAL: 1
- A.PHOTOGRAPHER: 1
- A.PLATFORM: 1
- A.VIEWER: 1
- T:
- T.BACKUP: 1
- T.DISCLOSE_IMAGE: 1
- T.ILLEGAL_ACCESS: 1
- T.MODIFY_IMAGE: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2006-09-002: 2
- CCMB-2006-09-003: 2
- CCMB-2006-09-004: 2
- FIPS:
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198: 1
- FIPS186-2: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20071016174207+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /Manager: IPA
- /ModDate: D:20071016174337+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20071016084159
- /Title: CRP-e
- pdf_file_size_bytes: 183508
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
st_vid10916-st.pdf |
c0115_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_TSU_EXT.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 5
- FCS_CKM.2: 1
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 2
- FCS_STO_EXT.1: 5
- FCS_STO_EXT.1.1: 2
- FCS_TLSC_EXT: 1
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.2: 2
- FCS_TLSC_EXT.4: 2
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSS_EXT.1: 9
- FCS_TLSS_EXT.1.1: 3
- FCS_TLSS_EXT.1.3: 1
- FDP:
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 2
- FDP_COO_EXT.1: 3
- FDP_COO_EXT.1.1: 1
- FDP_DAR_EXT.1: 5
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT.1: 4
- FDP_DEC_EXT.1.1: 1
- FDP_DEC_EXT.1.2: 1
- FDP_NET_EXT.1: 3
- FDP_NET_EXT.1.1: 1
- FDP_SBX_EXT.1: 4
- FDP_SBX_EXT.1.1: 1
- FDP_SOP_EXT.1: 4
- FDP_SOP_EXT.1.1: 1
- FDP_SOP_EXT.1.2: 1
- FDP_STR_EXT.1: 4
- FDP_STR_EXT.1.1: 1
- FDP_TRK_EXT.1: 4
- FDP_TRK_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT.1: 4
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 2
- FMT_MEC_EXT: 1
- FMT_MEC_EXT.1: 4
- FMT_MEC_EXT.1.1: 2
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 4
- FMT_MOF_EXT.1.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 3
- FPR:
- FPT:
- FPT_AEX_EXT.1: 4
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 4
- FPT_AEX_EXT.1.4: 2
- FPT_AEX_EXT.1.5: 1
- FPT_AON_EXT.1: 4
- FPT_AON_EXT.1.1: 1
- FPT_API_EXT.1: 4
- FPT_API_EXT.1.1: 1
- FPT_DNL_EXT.1: 4
- FPT_DNL_EXT.1.1: 1
- FPT_DNL_EXT.1.2: 1
- FPT_IDV_EXT.1: 1
- FPT_LIB_EXT.1: 4
- FPT_LIB_EXT.1.1: 1
- FPT_MCD_EXT.1: 4
- FPT_MCD_EXT.1.1: 1
- FPT_MCD_EXT.1.2: 3
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.1.5: 2
- FPT_TUD_EXT.1.6: 1
- FTP:
- FTP_DIT_EXT.1: 5
- FTP_DIT_EXT.1.1: 1
|
- FCS:
- FCS_CKM: 40
- FCS_CKM.1: 12
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_COP: 35
- FCS_COP.1: 4
- FCS_COP.1.1: 4
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 9
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 4
- FDP_ITC: 1
- FDP_ITC.1: 25
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 12
- FDP_ITT.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.2: 22
- FMT_MSA.3: 7
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.ADDON_INTEGRITY: 1
- O.DOMAIN_ISOLATION: 1
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- O.QUALITY: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.FLAWED_ADDON: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 2
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
- T.SAME-ORIGIN_VIOLATION: 1
|
- A:
- A.MANAGER: 4
- A.PERIPHERAL: 5
- A.PHOTOGRAPHER: 5
- A.PLATFORM: 4
- A.VIEWER: 4
- O:
- O.ACCESS_CONTROL: 9
- O.ENC_IMAGE: 7
- O.ENC_OSC: 7
- O.VERIFY_IMAGE: 9
- OE:
- OE.MANAGER: 5
- OE.PERIPHERAL: 5
- OE.PHOTOGRAPHER: 5
- OE.PLATFORM: 5
- OE.VIEWER: 5
- T:
- T.BACKUP: 4
- T.DISCLOSE_IMAGE: 3
- T.DISCLOSE_OSC: 3
- T.ILLEGAL_ACCESS: 3
- T.MODIFY_IMAGE: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- PGP:
- TLS:
- SSL:
- TLS:
- TLS: 22
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 4
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 2
- secp384r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- RFC:
- RFC 2560: 1
- RFC 2818: 2
- RFC 5246: 4
- RFC 5280: 3
- RFC 5289: 10
- RFC 6125: 2
- RFC 6265: 1
- RFC 6454: 1
- RFC5280: 1
- RFC5759: 1
- X509:
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2006-09-002: 2
- CCMB-2006-09-003: 2
- CCMB-2006-09-004: 2
- FIPS:
- FIPS 186-2: 2
- FIPS PUB 186-2: 2
- FIPS PUB 197: 2
- FIPS PUB 198: 1
- FIPS186-2: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Camera Development Center
- /CreationDate: D:20070921114510+09'00'
- /Creator: PScript5.dll Version 5.2
- /Keywords:
- /ModDate: D:20070921114512+09'00'
- /Producer: Adobe Servers p033
- /Subject:
- /Title: EOS Original Data Security System Security Target
- pdf_file_size_bytes: 298281
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 45
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |