name |
BMC Atrium® Discovery and Dependency Mapping 10.0 |
Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
UK |
status |
archived |
archived |
not_valid_after |
10.02.2020 |
30.04.2013 |
not_valid_before |
10.02.2015 |
24.01.2006 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-259CT%20v1.0e.docx |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-259%20CR%20v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP240.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-259%20ST%20v12.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Public%20v1.04.pdf |
manufacturer |
BMC Software, Inc. |
Sony Corporation |
manufacturer_web |
https://www.bmc.com/ |
https://www.sony.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL4 |
dgst |
86e19de07e49d48a |
794b142b57afbe13 |
heuristics/cert_id |
383-4-259 |
CRP240 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.2, AVA_MSU.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, ADV_IMP.1 |
heuristics/extracted_versions |
10.0 |
0701 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
383-4-259CT v1.0e.docx |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
383-4-259 CR v1.1.pdf |
CRP240.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 383-4-259-CR
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
|
- UK:
- CERTIFICATION REPORT No. P240: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 2+: 3
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact: 1
- interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and: 1
- out of scope: 2
|
pdf_data/report_metadata |
- /Author: White, Debra E.
- /CR date: 10 February 2015
- /CR version: 1.1
- /Certificate date: 10 February 2015
- /Company: CSEC-CSTC
- /Conformance Claim: Conformance Claim (EAL number augmented?)
- /CreationDate: D:20160420101751-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Developer name: BMC Software, Inc.
- /Document number: 383-4-259-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation for BMC Software, Inc. BMC Atrium® Discovery and Dependency Mapping 10.0 Document No. 1815-000-D002-B, Version 1.2, 10 February 2015
- /Evaluation completion date: 10 February 2015
- /ModDate: D:20160420101756-04'00'
- /Producer: Adobe PDF Library 11.0
- /ST Title: BMC Atrium Discovery and Dependency Mapping 10 Security Target version 0.12, 10 February 2015
- /SourceModified: D:20160420140405
- /TOE name and version: BMC Atrium® Discovery and Dependency Mapping 10.0
- /TOE short name: BMC Atrium® Discovery
- /Title: 383-4-XXX CR vxe
- /_DocHome: -1616610741
- pdf_file_size_bytes: 167573
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author: CESG
- /CreationDate: D:20060208162208Z
- /Creator: cp240_cr_1.02 - Microsoft Word
- /ModDate: D:20120106121536Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Subject: COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL
- /Title: CRP240
- pdf_file_size_bytes: 55971
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
383-4-259 ST v12.pdf |
ST Public v1.04.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.3: 1
- ACM_CAP.4: 4
- ACM_SCP.2: 6
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 7
- ADV_FSP.2: 4
- ADV_HLD.1: 2
- ADV_HLD.2: 4
- ADV_IMP.1: 5
- ADV_LLD.1: 5
- ADV_RCR.1: 6
- ADV_SPM.1: 9
- AGD:
- AGD_ADM.1: 8
- AGD_USR.1: 6
- ALC:
- ALC_DVS.1: 5
- ALC_LCD.1: 4
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 4
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 4
- AVA_VLA.2: 6
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_STG.1: 2
- FAU_STG.2: 7
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM.1: 34
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_COP.1: 41
- FCS_COP.1.1: 4
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SAE.1: 7
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_STM.1: 4
- FPT_TRP.1: 1
- FTP:
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_COP.1: 32
- FCS_COP.1.1: 2
- FCS_IFC.1: 2
- FCS_RNG: 2
- FCS_RNG.1: 10
- FCS_RNG.1.1: 10
- FDP:
- FDP_ACC.1: 24
- FDP_ACC.1.1: 1
- FDP_ACF.1: 21
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 9
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 1
- FDP_IFC.1: 35
- FDP_IFF.1: 16
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 13
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 13
- FDP_ITT.1.1: 1
- FDP_SDI.1: 13
- FDP_SDI.1.1: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 13
- FMT_MSA.2: 15
- FMT_MSA.2.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_MTD.2: 9
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_PUT: 1
- FMT_PUT.1: 18
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 30
- FPT_FSL.1: 1
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITI.1: 11
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RCV.4: 13
- FPT_RCV.4.1: 1
- FPT_RPL.1: 11
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FRU_FLT.1: 16
- FRU_FLT.1.1: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 20
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 2
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.LOCATE: 3
- A.LOCKED_DOWN: 1
- A.LOCK_DOWN: 3
- A.NOEVIL: 4
- A.PHYSICAL_PROTECT: 3
- A.TIME: 4
- O:
- O.ACCOUNTABLE: 7
- O.AUTHORIZATION: 5
- O.DISCOVERY: 8
- O.DISCRETIONARY_: 1
- O.DISCRETIONARY_ACCESS: 4
- O.EAVESDROPPING: 7
- O.MANAGE: 8
- OE:
- OE.ADMIN: 4
- OE.LOCATE: 4
- OE.LOCKED_DOWN: 1
- OE.LOCK_DOWN: 3
- OE.NOEVIL: 4
- OE.PHYSICAL: 4
- OE.TIME: 6
- T:
- T.ACCOUNT: 4
- T.EAVESDROPPING: 3
- T.EXCEED_PRIV: 6
- T.MANAGE: 3
- T.UNAUTH_ACCESS: 8
- T.UNKNOWN: 3
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
- FF:
- DH:
- DH: 2
- DHE: 1
- Diffie-Hellman: 1
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 28
- TLS v1.0: 6
- TLSv1.0: 4
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 5
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 7
- malfunction: 18
- SCA:
- DPA: 4
- Physical Probing: 11
- SPA: 2
- physical probing: 8
- other:
- JIL: 2
- reverse engineering: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 140-2: 6
- FIPS 180-3: 3
- FIPS 186-2: 2
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- FIPS140-2: 2
- FIPS180-3: 3
- FIPS186-2: 2
- FIPS197: 2
- FIPS198-1: 2
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: tmacarthur
- /CreationDate: D:20160419134043-04'00'
- /Creator: PDFCreator Version 1.1.0
- /Keywords:
- /ModDate: D:20160419134043-04'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: BMC_ADDM_ST13a
- pdf_file_size_bytes: 455164
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
- /Author: katoh
- /CreationDate: D:20130430143756+01'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130430143756+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: 英文
- /Title: CXD3715GG/GU-x Security Target
- pdf_file_size_bytes: 861962
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 126
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |