name |
HDD Data Encryption Kit E-Series 2.10 |
Huawei AR6000 and AR600 Series Routers running VRP software V300R019C11SPC200 Patch V300R019C11HP0095T |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
ES |
status |
archived |
active |
not_valid_after |
25.04.2021 |
09.08.2027 |
not_valid_before |
25.04.2016 |
09.08.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-40_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-40-INF-3871.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-40-ST.pdf |
manufacturer |
Canon Inc. |
Huawei Technologies España, SL |
manufacturer_web |
https://www.canon.com/ |
https://www.huawei.com/es/ |
security_level |
EAL3 |
{} |
dgst |
62bf2f602b0262f1 |
3580a8d4a27f2384 |
heuristics/cert_id |
JISEC-CC-CRP-C0506 |
2020-40-INF-3871 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
2.10 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0506
- certification_date: 01.04.2016
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0506_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an optional hardware product to encrypt data to be stored in the HDD of Canon Multifunctional Product (MFP) and printer. By using this product, data to be stored in the HDD can be encrypted without compromising the scalability or processing performance of the Canon MFP and printer. TOE security functionality The TOE provides the following security functions. - HDD Data Encryption - Cryptographic Key Management - Self-Test
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: HDD Data Encryption Kit E-Series
- product_type: Cryptographic hardware for MFPs and printers
- report_link: https://www.ipa.go.jp/en/security/c0506_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0506_est.pdf
- toe_version: 2.10
- vendor: Canon Inc.
- expiration_date: 01.05.2021
- revalidations: [frozendict({'date': '2017-04', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534_02.html'})]
- supplier: Canon Inc.
- toe_japan_name: HDD Data Encryption Kit E-Series 2.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534.html
- toe_overseas_name: HDD Data Encryption Kit E-Series 2.11
|
- category: Routers
- certification_date: 08.08.2022
- enhanced:
- category: Routers
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1581
- certification_date: 08.08.2022
- description: The TOE is AR6000&NetEngine AR600 Series Routers, which consists of the following products: AR6300, AR6280, AR6140-9G-2AC, AR6140-16G4XG, AR6121, AR6120, AR651C, AR651W, AR651, AR657W, AR611W and AR617VW-LTE4EA. The software running in this device is the Versatile Routing Platform (VRP) software version V300R019C11SPC300 Patch V300R019C11HP0095T, that is a network OS incorporating Huawei's proprietary intellectual properties and capable of supporting various network systems of Huawei.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: PP Compliant
- manufacturer: Huawei Technologies España, S.L.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1582
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1580
- type: Product
- manufacturer: Huawei Technologies España, S.L.
- product: Huawei AR6000 and AR600 Series Routers running VRP software V300R019C11SPC200 Patch V300R019C11HP0095T
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/865-huawei-ar6000-and-ar600-series-routers-running-vrp-software-v300r019c11spc200-patch-v300r019c11hp0095t
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf |
pdf_data/cert_filename |
|
2020-40_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies: 1
|
pdf_data/cert_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20220801113651+02'00'
- /ModDate: D:20220801113651+02'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 875874
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0506_erpt.pdf |
2020-40-INF-3871.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0506-01: 1
- Certification No. C0506: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP: 3
- FCS_RBG_EXT.1: 1
- FCS_SSHS_EXT.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.7: 1
- FIA_UIA_EXT.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MTD: 2
- FMT_SMF.1: 1
- FPT:
- FPT_SKP_EXT.1: 1
- FPT_STM_EXT.1: 1
- FPT_TST_EXT.1: 1
- FTA:
- FTA_SSL.4: 1
- FTA_SSL_EXT.1: 1
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 20
- Huawei Technologies: 3
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- DEKRA:
- DEKRA Testing and Certification: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20160715155737+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160715155828+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 447686
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 29
|
|
pdf_data/st_filename |
c0506_est.pdf |
2020-40-ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FPT:
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_STG: 8
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG_EXT.1: 8
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 12
- FCS_CKM.2.1: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 53
- FCS_COP.1: 5
- FCS_RBG.1: 1
- FCS_RBG_EXT: 4
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 3
- FCS_SSHS_EXT.1.2: 3
- FCS_SSHS_EXT.1.3: 3
- FCS_SSHS_EXT.1.4: 3
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 3
- FCS_SSHS_EXT.1.7: 3
- FCS_SSHS_EXT.1.8: 3
- FCS_TLSC_EXT.2: 8
- FCS_TLSC_EXT.2.1: 3
- FCS_TLSC_EXT.2.2: 3
- FCS_TLSC_EXT.2.3: 3
- FCS_TLSC_EXT.2.4: 3
- FCS_TLSC_EXT.2.5: 3
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 8
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 8
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 13
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 2
- FMT:
- FMT_MOF: 14
- FMT_MOF.1: 2
- FMT_MTD: 12
- FMT_MTD.1: 2
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 8
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 8
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 2
- FPT_STM_EXT.1: 6
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 1
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.4: 7
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 8
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 11
- FTP:
- FTP_ITC.1: 19
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC.2: 6
- FTP_TRP: 10
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 3
- O:
- O.CORRECT_TSF_OPERATION: 4
- O.CORRECT_TSF_OPETATION: 2
- O.CRYPTO: 7
- OE:
- OE.PHYSICAL_ACCESS_MANAGED: 6
- T:
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 2
- A.PHYSICAL_PROTECTION: 2
- A.REGULAR_UPDATES: 2
- A.RESIDUAL_INFORMATION: 2
- A.TRUSTED_ADMINISTRATOR: 2
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 4
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
- T.SECURITY_FUNCTIONALITY_FAILURE: 2
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 2
- T.UNDETECTED_ACTIVITY: 3
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 4
- T.UPDATE_COMPROMISE: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 2
- T.WEAK_CRYPTOGRAPHY: 2
|
pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 28
- Huawei Technologies Co: 77
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 13
- AES128: 2
- AES256: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 7
- SHA-384: 4
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 34
- TLS 1.1: 1
- TLS 1.2: 1
- TLS v1.2: 1
- TLS1.1: 1
- TLS1.2: 1
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 186-4: 4
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 2
- PKCS:
- PKCS #1: 1
- PKCS#1: 1
- PKCS#3: 1
- RFC:
- RFC 3268: 2
- RFC 3526: 5
- RFC 4251: 2
- RFC 4253: 3
- RFC 4346: 1
- RFC 5246: 2
- RFC 5280: 7
- RFC 5289: 3
- RFC 5656: 1
- RFC 5759: 2
- RFC 6125: 2
- RFC3447: 1
- RFC3526: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20160715151953+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords:
- /ModDate: D:20160715151954+09'00'
- /Producer: Adobe LiveCycle PDFGenerator
- /Subject:
- /Title: HDD Data Encryption Kit E-Series Security Target
- pdf_file_size_bytes: 420636
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |