name |
Symfoware Server Enterprise extended Edtion 4.0 |
Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open platform (version 2.1). |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
01.09.2019 |
not_valid_before |
26.11.2003 |
30.03.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_08en.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_08en.pdf |
manufacturer |
Fujitsu Limited |
Gemalto - Infineon Technologies AG |
manufacturer_web |
|
https://www.gemalto.com/ |
security_level |
EAL4 |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
838302a6efb2acdd |
ae320d6accec3536 |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
ANSSI-CC-2007/08 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ATE_COV.2, ADV_RCR.1, AVA_VLA.4, ALC_TAT.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_FSP.2, ADV_IMP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
4.0 |
2.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2007/19 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0269-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2007/19 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0269-2006 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0003
- certification_date: 01.11.2003
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- description: PRODUCT DESCRIPTION Symfoware Server is Fujitsu's relational database management system designed for enterprise business. Symfoware Server processes huge data speedily during user's working and also user can use it effectively for their own business style. Using SQL language, user is able to define the data structure, and access to the structured data. Symforeware Server runs on Solaris 7.
- evaluation_facility: JEITA IT Security Center
- product: Symfoware Server Enterprise extended Edition 4.0
- product_type: IT product (Database Management Product)
- vendor: Fujitsu Limited
- expiration_date: 01.01.2011
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0003_it2004.html
- toe_japan_name: Symfoware Server Enterprise extended Edtion 4.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
2007_08en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
- cc_version: Common Criteria version 2.2
- cert_id: DCSSI-2007/08
- cert_item: Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form (version 2.1). Product reference
- cert_item_version: T1000230 Usimera Protect 128K crypto on Infineon Code version: 2.1
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]
- developer: Gemalto 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG St.-Martin-Straße 76, 81609 München, Allemagne Sponsor Gemalto 6 rue de la verrerie, 92197 Meudon, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: Java Card System Protection Profile Collection, V1.0b, Configuration Standard 2.2. Reference PP/0305
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0269-2006: 6
- BSI-DSZ-CC-0269-2006-MA-02: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL4+: 1
- EAL5: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 34: 1
- AIS31: 3
- AIS34: 2
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Mathieu Robert
- /CreationDate: D:20070330160630+02'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.5
- /ModDate: D:20070330160633+03'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Card Usimera Protect: SLE88CFX4000P microcontroller embedding SIM, USIM and OTA applications on Java card open plate-form ...
- /Title: DCSSI-2007/08
- pdf_file_size_bytes: 273691
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
|
cible2007_08en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 3
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 9
- ACM_CAP: 1
- ACM_CAP.4: 19
- ACM_SCP: 1
- ACM_SCP.2: 5
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 8
- ADO_IGS: 1
- ADO_IGS.1: 6
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 10
- ADV_HLD: 1
- ADV_HLD.2: 14
- ADV_IMP: 1
- ADV_IMP.2: 12
- ADV_LLD: 1
- ADV_LLD.1: 15
- ADV_RCR: 1
- ADV_RCR.1: 5
- ADV_SPM: 1
- ADV_SPM.1: 9
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 12
- AGD_USR: 1
- AGD_USR.1: 10
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 11
- ALC_LCD: 1
- ALC_LCD.1: 7
- ALC_TAT: 1
- ALC_TAT.1: 8
- ATE:
- ATE_COV: 1
- ATE_COV.2: 6
- ATE_DPT: 1
- ATE_DPT.1: 5
- ATE_FUN: 1
- ATE_FUN.1: 10
- ATE_IND: 1
- ATE_IND.2: 8
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 17
- AVA_SOF: 8
- AVA_SOF.1: 7
- AVA_VLA: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 18
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 3
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 3
- FCS_COP: 19
- FCS_COP.1: 8
- FDP:
- FDP_ACC: 13
- FDP_ACC.1: 2
- FDP_ACC.2: 7
- FDP_ACF: 14
- FDP_ACF.1: 22
- FDP_IFC: 8
- FDP_IFC.1: 2
- FDP_IFC.2: 4
- FDP_IFF: 11
- FDP_IFF.1: 18
- FDP_IFF.2: 7
- FDP_IFF.2.2: 1
- FDP_IFF.2.7: 2
- FDP_ITC: 2
- FDP_ITC.2: 5
- FDP_RIP: 18
- FDP_RIP.1: 8
- FDP_ROL: 2
- FDP_ROL.1: 2
- FDP_SDI: 3
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 1
- FIA_UID: 13
- FIA_UID.1: 4
- FIA_UID.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 49
- FMT_MSA.1: 14
- FMT_MSA.2: 3
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 1
- FMT_MTD.3: 2
- FMT_MTD.3.1: 1
- FMT_REV: 2
- FMT_REV.1: 2
- FMT_SMF: 3
- FMT_SMF.1: 1
- FMT_SMR: 29
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FPR:
- FPR_UNO: 3
- FPR_UNO.1: 4
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT: 2
- FPT_AMT.1: 1
- FPT_FLS: 16
- FPT_FLS.1: 6
- FPT_ITT: 6
- FPT_ITT.1: 1
- FPT_ITT.3: 2
- FPT_PHP: 3
- FPT_PHP.3: 1
- FPT_RCV: 10
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_RVM: 3
- FPT_RVM.1: 3
- FPT_SEP: 3
- FPT_SEP.1: 3
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 2
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 3
- FRU_FLT.1: 1
- FRU_RSA: 4
- FRU_RSA.1: 2
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 2
- A.NATIVE: 3
- A.NET-OP_KEY_MGT: 2
- A.VERIFICATION: 2
- D:
- D.API_DATA: 2
- D.APP_CODE: 2
- D.APP_C_DATA: 2
- D.APP_I_DATA: 2
- D.AUTH-APPLI_ATTRIB: 2
- D.AUTH-CRYPTO_ALGO: 3
- D.AUTH-KEY_ATTRIB: 2
- D.AUTH_CODE: 2
- D.CRYPTO: 3
- D.JCS_CODE: 2
- D.JCS_DATA: 2
- D.NET_ACCESS: 2
- D.NET_AUTH_KEY: 3
- D.PIN: 2
- D.SEC_DATA: 2
- O:
- O.APPLET: 23
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.JAVAOBJECT: 39
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 8
- O.REMOTE_OBJECT: 1
- O.RMI_SERVICE: 9
- O.ROR: 10
- OE:
- OE.APPLET: 2
- OE.DEVELOPMENT: 2
- OE.KEY_MANAGEMENT: 2
- OE.NATIVE: 1
- OE.VERIFICATION: 2
- OP:
- OP.ARRAY_ACCESS: 3
- OP.BYTECODE: 1
- OP.CREATE: 5
- OP.DELETE_APPLET: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.GET_ROR: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.INVOKE: 6
- OP.JAVA: 4
- OP.PUT: 3
- OP.RECEIVE: 1
- OP.RET_RORD: 2
- OP.SEND: 1
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- OSP.NATIVE: 3
- OSP.VERIFICATION: 2
- OT:
- OT.ACCOUNT_NET_ACCESS: 2
- OT.ALARM: 2
- OT.AUTH-ALGO_CONFID: 2
- OT.AUTH-ALGO_EXEC: 2
- OT.AUTH-ALGO_INTEG: 2
- OT.AUTH-KEYS_CONFID: 2
- OT.AUTH-KEYS_INTEG: 2
- OT.CARD-MANAGEMENT: 2
- OT.CIPHER: 3
- OT.DELETION: 2
- OT.FIREWALL: 2
- OT.INSTALL: 2
- OT.KEY-MNGT: 6
- OT.LOAD: 2
- OT.NATIVE: 5
- OT.OBJ-DELETION: 2
- OT.OPERATE: 2
- OT.PIN-MNGT: 3
- OT.REALLOCATION: 2
- OT.REMOTE: 2
- OT.RESOURCES: 2
- OT.SCP: 7
- OT.SHRD_VAR_CONFID: 2
- OT.SHRD_VAR_INTEG: 2
- OT.SID: 2
- OT.TRANSACTION: 3
- R:
- T:
- T.AUTH-ALGO_DISCLOSURE: 2
- T.AUTH-ALGO_EXE: 2
- T.AUTH-ALGO_MODIFICATION: 2
- T.AUTH-DATA_DISCLOSURE: 2
- T.AUTH-DATA_MODIFICATION: 2
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.DELETION: 2
- T.EXE-CODE: 4
- T.EXE-CODE-REMOTE: 2
- T.INSTALL: 2
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 2
- T.NATIVE: 2
- T.OBJ-DELETION: 2
- T.PHYSICAL: 3
- T.RESOURCES: 2
- T.SID: 4
- T.UNAUTH_NET_ACCESS: 2
|
pdf_data/st_keywords/vendor |
|
- Axalto:
- Gemalto:
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 2
- malfunction: 1
- physical tampering: 2
- SCA:
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 2
- FIPS 46-3: 2
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
- Java Card 2.2: 2
- Java Card 2.2.1: 1
- Java Card 3.4.3: 1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.service: 1
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Sorin Aurel SPORNIC
- /Category: CC evaluation
- /Company: Axalto
- /CreationDate: D:20070323143339+01'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /ModDate: D:20070327163427+03'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /SourceModified: D:20070323133327
- /Subject: Security Target for Usimera Protect
- /Title: D1019540
- /classification-date: 21/03/2007
- /classification-version: Version 3.6.0
- /security-level: AXLT-Public
- pdf_file_size_bytes: 555904
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |