Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Tripp Lite B002a Secure KVM Switch Series
CCEVS-VR-11062-2020
Huawei GaussDB 200 version 6.5.1 build e3690037
2019-32-INF-3664
name Tripp Lite B002a Secure KVM Switch Series Huawei GaussDB 200 version 6.5.1 build e3690037
category Other Devices and Systems Databases
scheme US ES
status archived active
not_valid_after 09.07.2022 22.03.2027
not_valid_before 09.07.2020 22.03.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_VID11062-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_VID11062-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_VID11062-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf
manufacturer Tripp Lite Huawei Technologies Co., Ltd.
manufacturer_web https://www.tripplite.com https://www.huawei.com
security_level {} EAL2+, ALC_FLR.2
dgst 96402fa45cae4c3f b91f3f25e268a1e0
heuristics/cert_id CCEVS-VR-11062-2020 2019-32-INF-3664
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:a:huawei:gaussdb_200:6.5.1:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.5:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2020-1811, CVE-2020-1790, CVE-2020-1853
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 6.5.1
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 09.07.2020
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 09.07.2022
  • id: CCEVS-VR-VID11062
  • product: Tripp Lite B002a Secure KVM Switch Series
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11062
  • vendor: Trippe Manufacturing Company
  • category: Database management systems
  • certification_date: 22.03.2022
  • enhanced:
  • manufacturer: Huawei Technologies Co., Ltd.
  • product: Huawei GaussDB 200 version 6.5.1 build e3690037
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037
heuristics/protection_profiles da2e45c9b3fbb700 3f6ac99252bbf14e
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf
pdf_data/cert_filename st_VID11062-ci.pdf 2019-32_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11062-2020: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0088-V2: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • R:
    • R.C: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 2
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/cert_metadata
  • /CreationDate: D:20200715122218-04'00'
  • /ModDate: D:20200715122218-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 179835
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20220310164952+01'00'
  • /ModDate: D:20220310164952+01'00'
  • /Producer: GPL Ghostscript 9.27
  • pdf_file_size_bytes: 847729
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_VID11062-vr.pdf 2019-32-INF-3664.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-11062-20209
    • cert_item: for Tripp Lite B002a Secure KVM Switch Series
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-32-INF-3664- v1: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0088-V2: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 7
    • EAL2+: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_OPE.1: 1
    • AGD_PRE: 4
  • ALC:
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
    • ALC_FLR.2: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SEL.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_REV.1: 2
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_TRC.1: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_TSE.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 5
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 14
    • Huawei Technologies Co: 3
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 7
  • DEKRA:
    • DEKRA Testing and Certification: 5
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 6
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
      • TLSv1.1: 1
      • TLSv1.2: 2
pdf_data/report_metadata
  • /CreationDate: D:20220325091528+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220325091528+01'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 909986
  • pdf_hyperlinks: https://www.sogis.org/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename st_VID11062-st.pdf 2019-32-ST.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0088-V2: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 49
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 53
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_RIP.1: 14
    • FDP_RIP.1.1: 5
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 2
    • FMT_MSA.3: 6
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 18
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT.1: 9
    • FTA_ATH_EXT.1.1: 2
    • FTA_ATH_EXT.2: 5
    • FTA_ATH_EXT.2.1: 1
    • FTA_CIN_EXT: 1
    • FTA_CIN_EXT.1: 7
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 2
    • FAU_MTD.1: 2
    • FAU_SEL.1: 10
    • FAU_SEL.1.1: 2
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 2
  • FIA:
    • FIA_ATD.1: 16
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID.1: 15
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_USB.1: 5
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 15
    • FMT_REV.1.1: 5
    • FMT_REV.1.2: 3
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITT.1: 1
    • FPT_STM.1: 1
    • FPT_TRC.1: 11
    • FPT_TRC.1.1: 2
    • FPT_TRC.1.2: 2
  • FTA:
    • FTA_MCS.1: 9
    • FTA_MCS.1.1: 2
    • FTA_MCS.1.2: 2
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 2
    • A.NO_TEMPEST: 2
    • A.PHYSICAL: 2
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 2
  • O:
    • O.ANTI_TAMPERING: 6
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRI: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIG: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 3
    • O.ANTI_TAMPERING_BACKUP_POWER: 5
    • O.ANTI_TAMPERING_INDICATION: 5
    • O.ANTI_TAMPERING_PERMANENTLY_: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DIS: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABL: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 6
    • O.AUTHORIZED_SWITCHING: 5
    • O.COMPUTER_INTERFACE_ISOLATION: 9
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
    • O.COMPUTER_INTERFACE_ISOLATION_U: 2
    • O.COMPUTER_TO_AUDIO_ISOLATION: 5
    • O.CONTINUOUS_INDICATION: 5
    • O.DISABLE_UNAUTHORIZED_ENDPOINT: 1
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 4
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 1
    • O.DISABLE_UNAUTHORIZED_PERIPHERA: 1
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 3
    • O.DISPLAYPORT_AUX_FILTERING: 2
    • O.KEYBOARD_AND_MOUSE_TIED: 5
    • O.KEYBOARD_MOUSE_EMULATED: 5
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 5
    • O.NO_ANALOG_AUDIO_INPUT: 6
    • O.NO_CONNECTED_COMPUTER_CONTRO: 2
    • O.NO_CONNECTED_COMPUTER_CONTROL: 3
    • O.NO_DOCKING_PROTOCOLS: 5
    • O.NO_OTHER_EXTERNAL_INTERFACES: 8
    • O.NO_TOE_ACCESS: 5
    • O.NO_USER_DATA_RETENTION: 7
    • O.PERIPHERAL_PORTS_ISOLATION: 10
    • O.PURGE_TOE: 2
    • O.PURGE_TOE_KB_DATA_WHILE_SWITC: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCH: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHING: 1
    • O.SELF_TEST: 10
    • O.SELF_TEST_FAIL_INDICATION: 5
    • O.SELF_TEST_FAIL_TOE_DISABLE: 9
    • O.TAMPER_EVIDENT_LABEL: 7
    • O.UNIDIRECTIONAL_AUDIO_OUT: 5
    • O.UNIDIRECTIONAL_EDID: 3
    • O.UNIDIRECTIONAL_VIDEO: 7
    • O.UNIDIRERCTIONAL_EDID: 4
    • O.USER_AUTHENTICATION_ADMIN: 5
    • O.USER_AUTHENTICATION_ISOLATION: 4
    • O.USER_AUTHENTICATION_RESET: 9
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 7
  • OE:
    • OE.NO_TEMPEST: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED_ADMIN: 5
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 2
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 2
    • T.RESIDUAL_LEAK: 2
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVICE: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.AUTHUSER: 2
    • A.CONNECT: 3
    • A.MANAGE: 3
    • A.NO_GENERA: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.PEER_FUNC: 1
    • A.PHYSICAL: 3
    • A.SUPPORT: 4
    • A.TRAINEDUS: 1
    • A.TRAINEDUSER: 1
  • O:
    • O.ADMIN_RO: 3
    • O.ADMIN_ROL: 1
    • O.ADMIN_ROLE: 7
    • O.AUDIT: 2
    • O.AUDIT_GE: 2
    • O.AUDIT_GENERATION: 3
    • O.DISCRETIO: 3
    • O.DISCRETIONARY: 1
    • O.DISCRETIONARY_ACCESS: 5
    • O.MANAGE: 13
    • O.MEDIATE: 9
    • O.RESIDUAL: 2
    • O.RESIDUAL_: 1
    • O.RESIDUAL_I: 1
    • O.RESIDUAL_INFORM: 1
    • O.RESIDUAL_INFORMATION: 6
    • O.TOE_ACCE: 8
    • O.TOE_ACCES: 1
    • O.TOE_ACCESS: 10
  • OE:
    • OE.ADMIN: 10
    • OE.INFO: 5
    • OE.INFO_PRO: 4
    • OE.INFO_PROTECT: 11
    • OE.IT_REMOT: 4
    • OE.IT_REMOTE: 6
    • OE.IT_TRUST: 4
    • OE.IT_TRUSTED: 1
    • OE.IT_TRUSTED_SYSTEM: 5
    • OE.NO_GENE: 3
    • OE.NO_GENERAL: 1
    • OE.NO_GENERAL_PURPOSE: 4
    • OE.PHYSICAL: 8
  • T:
    • T.ACCESS_TSF: 2
    • T.ACCESS_TSFDATA: 2
    • T.ACCESS_TSFFUNC: 1
    • T.IA_MASQUE: 2
    • T.IA_MASQUERADE: 2
    • T.IA_USER: 2
    • T.RESIDUAL_: 1
    • T.RESIDUAL_DATA: 2
    • T.TSF: 1
    • T.TSF_COMPR: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHOR: 2
    • T.UNAUTHORIZED_ACCESS: 2
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 9
    • Huawei Technologies Co: 87
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 8
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools: 1
    • Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz: 1
    • Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the: 1
    • including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE: 1
    • is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to: 1
    • out of scope: 7
    • provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a: 1
    • this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE: 1
    • with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are: 1
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different