name |
Hewlett Packard Enterprise 7900 Series, 7500 Series, 5700 Series, 5130 EI Series, 5130 HI Series and 5510 HI Series Switches with Comware 7 |
Argus Command Center Web Portal Stable Version 2.1 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
US |
MY |
status |
archived |
active |
not_valid_after |
28.02.2018 |
23.06.2026 |
not_valid_before |
04.03.2016 |
23.06.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10671-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10671-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10671-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20–%20Argus%20CC%20EAL2%20–%20Security%20Target%20[ASE]-v1.14%202.pdf |
manufacturer |
Hewlett Packard Enterprise |
Certis CISCO Security Pte Ltd (Certis) |
manufacturer_web |
https://www.hpe.com/ |
https://www.certisgroup.com/ |
security_level |
{} |
EAL2 |
dgst |
62c7b8834a9814fe |
c86ad5ef88d4cf8b |
heuristics/cert_id |
CCEVS-VR-VID-10671-2016 |
ISCB-3-RPT-C115-CR-v1 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
7900, 5510, 7500, 7, 5700, 5130 |
2.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Network Device
- certification_date: 04.03.2016
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 28.02.2018
- id: CCEVS-VR-VID10671
- product: Hewlett Packard Enterprise 7900 Series, 7500 Series, 5700 Series, 5130 EI Series, 5130 HI Series and 5510 HI Series Switches with Comware 7
- scheme: US
- url: https://www.niap-ccevs.org/product/10671
- vendor: Hewlett Packard Enterprise Company
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
{} |
pdf_data/cert_filename |
st_vid10671-ci.pdf |
ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10671-2016: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20160310113550-05'00'
- /ModDate: D:20160310113550-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 176580
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20210630131348Z
- /Creator: Word
- /ModDate: D:20210630215915+08'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 205722
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10671-vr.pdf |
ISCB-5-RPT-C115-CR-v1.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10671-2016
- cert_item: for Hewlett Packard Enterprise 7900 Series, 7500 Series, 5700 Series, 5510 HI Series, 5130 HI Series and 5130 EI Series Switches
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10671-2016: 1
|
- MY:
- ISCB-3-RPT-C115-CR-v1: 35
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
- ALC:
- ALC_CMS.2: 1
- ALC_DEL.1: 1
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_SSH_EXT.1: 2
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.4: 4
- FCS_TLS_EXT: 2
- FCS_TLS_EXT.1.1: 1
- FIA:
- FPT:
- FPT_ITT: 1
- FPT_ITT.1: 1
- FPT_TUD_EXT.1: 1
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
- FDP:
- FDP_ACC.1: 14
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 5
- FIA_SOS.1: 3
- FIA_SOS.2: 2
- FIA_UAU.1: 2
- FIA_UID.1: 7
- FMT:
- FMT_MSA.1: 7
- FMT_SMF.1: 3
- FMT_SMR.1: 3
- FTP:
- FTP_ITC.1: 17
- FTP_TRP.1: 2
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CLOUD: 1
- A.CONNECTIVITY: 1
- A.DDOS: 1
- A.MALWARE: 1
- A.THIRDPARTY: 1
- A.TIMESTAMP: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_DEV: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20210629084408Z00'00'
- /Creator: Word
- /ModDate: D:20210629084408Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 800031
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
st_vid10671-st.pdf |
2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 4
- ASE:
- ASE_CCL.1: 3
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 5
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 3
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 4
- FAU_STG_EXT.1: 3
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 3
- FCS_CKM.1.1: 1
- FCS_CKM_EXT: 4
- FCS_CKM_EXT.4: 3
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 28
- FCS_RBG_EXT: 4
- FCS_RBG_EXT.1: 3
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT: 4
- FCS_SSH_EXT.1: 4
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 5
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT: 2
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_RIP: 3
- FDP_RIP.2: 3
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT: 4
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 4
- FIA_PSK_EXT.1: 2
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_UAU: 3
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 4
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 3
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MTD: 3
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.2: 3
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 4
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT: 1
- FPT_ITT.1: 1
- FPT_SKP_EXT: 4
- FPT_SKP_EXT.1: 3
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 3
- FPT_STM.1: 3
- FPT_STM.1.1: 1
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 4
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 6
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 4
- FTA_SSL_EXT.1: 3
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 3
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_SOS.2: 5
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
|
- A:
- A.CLOUD: 3
- A.CONNECTIVITY: 4
- A.DDOS: 3
- A.MALWARE: 4
- A.THIRDPARTY: 3
- A.TIMESTAMP: 4
- A.TRUSTED_ADMIN: 4
- A.TRUSTED_DEV: 3
- O:
- O.SEC_ACCESS: 5
- O.SEC_AUTHENTICATE: 5
- O.SEC_COMMUNICATION: 5
- O.SEC_PASSWORD_GENER: 1
- O.SEC_PASSWORD_GENERATION: 3
- OE:
- OE.ADMINISTRATOR: 3
- OE.ANTI_DDOS: 3
- OE.ANTI_MALWARE: 3
- OE.DEVELOPER: 3
- OE.SAFE_CLOUD: 3
- OE.SAFE_CONNECTIVITY: 3
- OE.SYN_TIMESTAMP: 3
- OE.THIRDPARTY: 3
- T:
- T.BROKEN_AUTH: 4
- T.INTERCEPTION: 4
- T.UNAUTHORIZED_AC: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.WEAK_PASSWORD_: 1
- T.WEAK_PASSWORD_GENE: 1
- T.WEAK_PASSWORD_GENERATION: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 9
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 5
- SHA-512: 4
- SHA384: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 44
- IKEv1: 14
- IKEv2: 13
- IPsec:
- SSH:
- TLS:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 16
- P-521: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 186-2: 2
- FIPS PUB 186-3: 4
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-90: 1
- SP 800-38D: 1
- RFC:
- RFC 3602: 3
- RFC 4106: 2
- RFC 4109: 1
- RFC 4253: 1
- RFC 4301: 3
- RFC 4303: 2
- RFC 4868: 2
- RFC 6379: 1
- RFC2409: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope: 1
- environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and: 1
- infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s: 1
- inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the: 1
- out of scope: 5
- together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting: 1
|
pdf_data/st_metadata |
|
- /Author: CLAIREHYC
- /CreationDate: D:20210701124256+08'00'
- /Creator: PDFCreator Free 4.2.0
- /Keywords:
- /ModDate: D:20210701124256+08'00'
- /Producer: GPL Ghostscript 9.52
- /Subject:
- /Title: 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14
- pdf_file_size_bytes: 1022047
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |