name |
Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00 |
CA Directory r12.0 SP3 |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
08.04.2014 |
15.05.2017 |
not_valid_before |
24.12.2008 |
01.03.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ca-directory-r120-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ca-directory-r120-sec-eng.pdf |
manufacturer |
Canon Inc. |
CA Technologies |
manufacturer_web |
https://www.canon.com/ |
https://www.ca.com |
security_level |
EAL3 |
EAL3+, ALC_FLR.1 |
dgst |
8279b5ee82292487 |
b1c92fd8a023c4f6 |
heuristics/cert_id |
JISEC-CC-CRP-C0198 |
383-4-167 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ALC_FLR.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
1.00 |
12.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0198
- certification_date: 01.12.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0198_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is optional software which adds security features to Canon iR3225/iR3230/iR3235/iR3245 series digital multifunction products. Installing this TOE replaces the system software (e.g., control software) on any of the aforementioned digital multi-function devices. As a basic function of the TOE, it controls functions of the MFP such as Copy, Print, Fax Reception, Mail Box and so on, and temporarily stores image data created during copying, printing, and other document handling operations on the HDD. In most standard multifunction products, such temporary image data is deleted only logically after use, i.e., upon completion of copying or printing, and residual information of deleted image data is not erased at all, being left exposed to the risk of reuse. TOE security functions This TOE comes with a security feature called the HDD Data Erase function, which completely deletes the HDD data, thereby eliminating any risk of the residual information of temporary image data from being reused. The TOE additionally includes the System Administrator Identification and Authentication function and the System Management function, for managing the HDD Data Erase function.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Canon iR3225/iR3230/ iR3235/iR3245 Series HDD Data Erase Kit-B2
- product_type: IT product(data erase function in digital MFP)
- report_link: https://www.ipa.go.jp/en/security/c0198_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0198_est.pdf
- toe_version: Version 1.00
- vendor: Canon Inc.
- expiration_date: 01.04.2014
- supplier: Canon Inc.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0198_it8218.html
- toe_overseas_name: Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0198_erpt.pdf |
ca-directory-r120-cert-eng.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-167-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0198-01: 1
- Certification No. C0198: 1
|
- CA:
- 383-4-167: 1
- 383-4-167-CR: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 1
- EAL 3+: 1
- EAL3+: 4
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.ADMIN_PWD: 1
- A.NETWORK: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20120425153253+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120425153352+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 587707
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: 2 February 2011
- /CR_Version: 1.0
- /Client City: Framingham
- /Client Country: USA
- /Client Full Name: CA, Inc.
- /Client Postal Code: 01702
- /Client Short Name: CA
- /Client State: Massachusetts
- /Client Street: 100 Staples Drive
- /Company: CA Technologies
- /CreationDate: D:20110328103635-04'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Developer Long: CA, Inc.
- /Developer Long Name: CA, Inc.
- /Developer Short: CA
- /Developer Short Name: CA
- /Document Date: 15 June 2010
- /EAL Level: 3+
- /EAL Level Base: 3
- /EAL Level Text: 3 augmented
- /EAL Long: EAL 3 Augmented
- /EAL Num Target: 3+
- /EAL Short: EAL3+
- /ETPlan_Doc#: 1664-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 1.0
- /ETPlan_date: 3 January 2011
- /ETProcRes_Date: 3 January 2011
- /ETProcRes_Doc#: 1664-000-D004
- /ETProcRes_Title: Evaluation Test Procedures and Test Results
- /ETProcRes_Version: 1.0
- /ETProc_Date: 3 January 2011
- /ETProc_Doc#: 1664-000-D004
- /ETProc_Title: Evaluation Test Procedures and Test Results
- /ETProc_Version: 1.0
- /ETReport_Date: 1 February 2011
- /ETReport_Doc#: 1664-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 1.2
- /EWP_Date: 17 June 2010
- /EWP_Doc#: 1664-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-167
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: 1 May 2010
- /LeadEvaluator: Greg Lague
- /LeadEvaluatorInitials: GL
- /ModDate: D:20110328103658-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Product Name: CA Directory r12.0 SP3
- /Product Short Name: CA Directory
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1664
- /ST_Date: 30 November 2010
- /ST_Title: CA Directory r12.0 SP3 Security Target for EAL3+
- /ST_Version: 3.0
- /SVC_Date: dd month yyyyy
- /SVC_Doc#: 1664-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: X.X
- /SVR_Date: dd month yyyyy
- /SVR_Doc#: 1664-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: X.X
- /SV_City: Melbourne
- /Security Classification: EWA-Canada & CA, Inc. Proprietary
- /SourceModified: D:20110328130724
- /Sponsor: CA, Inc.
- /Sponsor City: Framingham
- /Sponsor Country: USA
- /Sponsor Postal Code: 01702
- /Sponsor State: Massachusetts
- /Sponsor Street: 100 Staples Drive
- /TOE: CA Directory r12.0 SP3
- /TOE Line1: [TOE Line1 - enter later for PCR or web page]
- /TOE Line2: [TOE Line2 - enter later for PCR or web page]
- /TOE Line3: [TOE Line3 - enter later for PCR or web page]
- /TOE Line4: [TOE Line4 - enter later for PCR or web page]
- /TOE Line5: [TOE Line5 - enter later for PCR or web page]
- /TOE Short: CA Directory
- /TOE Short with version: CA Directory r12.0 SP3
- /TOE Short-NoTM: CA Directory
- /TOE Version: r12.0 SP3
- /TOE with version: CA Directory r12.0 SP3
- /TOE-NoTM: CA Directory r12.0 SP3
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /Version: Version 1.1
- /_AdHocReviewCycleID: 858570575
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: 383-4-167 CPL post request ... rick
- pdf_file_size_bytes: 83509
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
c0198_est.pdf |
ca-directory-r120-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL3: 7
- EAL3 augmented: 2
- EAL3+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 4
- ADV_HLD.2: 3
- ADV_RCR.1: 4
- AGD:
- AGD_ADM.1: 4
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 4
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
- ADV:
- ADV_ARC.1: 12
- ADV_FSP.3: 14
- ADV_TDS.2: 15
- AGD:
- AGD_OPE.1: 19
- AGD_PRE.1: 15
- ALC:
- ALC_CMC.3: 15
- ALC_CMS.2: 2
- ALC_CMS.3: 6
- ALC_DEL.1: 10
- ALC_DVS.1: 7
- ALC_FLR.1: 13
- ALC_LCD.1: 8
- ASE:
- ASE_CCL.1: 13
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.2: 12
- ASE_REQ.2: 15
- ASE_SPD.1: 9
- ASE_TSS.1: 6
- ASE_TSS.2: 1
- ATE:
- ATE_COV.2: 5
- ATE_DPT.1: 7
- ATE_FUN.1: 9
- ATE_IND.2: 8
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SEL.1: 25
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 11
- FIA_SOS.1.1: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_STM.1: 2
- FRU:
- FRU_FLT.1: 11
- FRU_FLT.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.ADMIN_PWD: 1
- A.NETWORK: 4
- A.PWD_MANAGE: 1
- O:
- O.ADMIN_AUTH: 4
- O.AUTH_BOX: 1
- O.RESIDUAL: 5
- OE:
- OE.ADMIN: 2
- OE.ADMIN_PWD: 2
- OE.NETWORK: 2
- T:
|
- A:
- O:
- O.ACCESS: 5
- O.AUDIT: 3
- O.IDENTIFY: 4
- O.MANAGE: 3
- O.PASSWORD: 3
- O.ROBUST_ADMIN_GUID: 2
- O.ROBUST_ADMIN_GUIDAN: 1
- O.SELF_PROTECTION: 3
- OE:
- OE.ADMIN: 1
- OE.AUTH: 6
- OE.FILESYS: 3
- OE.LOCATE: 2
- OE.NOEVIL: 3
- OE.SYSTIME: 4
- T:
- T.ACCESS: 7
- T.ADMIN_ERROR: 4
- T.AUDIT_COMPROMISE: 5
- T.MASK: 4
- T.MASQUERADE: 2
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of Scope: 5
- Out of Scope The following table lists the minimum hardware requirements of the TOE. Computer Role Minimum RAM: 1
- into memory and the TOE is initialized, these configuration files are not referenced and moved out of scope. 2.5.3 Identification & Authentication CA Directory provides the following levels of authentication: 1
- out of scope: 1
- • Windows Server 2003 64-bit: Used in the Evaluated Configuration • Linux x86/ servers: Out of Scope • Windows x86/64 servers: Out of Scope • AIX servers: Out of Scope • HPUX RISC: Out of Scope • HPUX: 1
|
pdf_data/st_metadata |
- /Author: Satoshi Hirota
- /CreationDate: D:20120307154318+09'00'
- /Creator: PScript5.dll Version 5.2
- /Keywords:
- /ModDate: D:20120307154318+09'00'
- /Producer: Adobe LiveCycle PDFG 7.2
- /Subject:
- /Title: HDD Data Erase Kit-B1 Security Target
- pdf_file_size_bytes: 290588
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: glague
- /CreationDate: D:20101130113109-05'00'
- /Creator: PDFCreator Version 1.0.2
- /Keywords:
- /ModDate: D:20110304084824-05'00'
- /Producer: GPL Ghostscript 8.70
- /Subject:
- /Title: Booz_Allen_CA_Directory_ASE
- pdf_file_size_bytes: 462573
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 73
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |