| name |
INTEGRITY Enterprise OS - Archon Edition |
Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Version: Controller ROM Ver. 1.180.7 |
| category |
Operating Systems |
Multi-Function Devices |
| scheme |
US |
JP |
| status |
archived |
archived |
| not_valid_after |
03.05.2024 |
17.01.2013 |
| not_valid_before |
03.05.2022 |
28.11.2008 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11258-ci.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11258-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0196_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11258-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0196_est.pdf |
| manufacturer |
Archon Secure LLC |
Fuji Xerox Co., Ltd. |
| manufacturer_web |
https://www.archonsec.com |
https://www.fujixerox.co.jp/eng/ |
| security_level |
{} |
EAL3 |
| dgst |
99da63e987e2ce63 |
35dd94d58cbf463e |
| heuristics/cert_id |
CCEVS-VR-11258-2022 |
JISEC-CC-CRP-C0196 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_TSU.1, ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ASE_OBJ.2, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ALC_CMS.1, ASE_TSS.1, ALC_TSU_EXT.1, ASE_REQ.2, ADV_FSP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, AGD_PRE.1, ASE_ECD.1, AVA_VAN.2, ASE_REQ.1, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, AGD_OPE.1, ALC_CMS.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
- |
1.180.7 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11258/
- categories: ['Operating System']
- category: Operating System
- certification_date: 03.05.2022
- evaluation_facility: Acumen Security
- expiration_date: 03.05.2024
- id: CCEVS-VR-VID11258
- product: INTEGRITY Enterprise OS - Archon Edition
- scheme: US
- url: https://www.niap-ccevs.org/products/11258
- vendor: Archon Secure LLC
|
- cert_id: JISEC-CC-CRP-C0196
- certification_date: 01.11.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0196_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions.The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator’s Security Management - Customer Engineer Operation Restriction - FAX Flow Security
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific
- product_type: Control Software for Multi Function Peripheral
- report_link: https://www.ipa.go.jp/en/security/c0196_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0196_est.pdf
- toe_version: Controller ROM Ver.1.180.7
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.03.2013
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0196_it8225.html
- toe_overseas_name: Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Controller ROM Ver.1.180.7
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
e34797b67a3163c5 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf |
{} |
| pdf_data/cert_filename |
st_vid11258-ci.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11258-2022: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20220510124045-04'00'
- /ModDate: D:20220510124045-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 179620
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
st_vid11258-vr.pdf |
c0196_erpt.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-11258-2022
- cert_item: for the INTEGRITY Enterprise OS – Archon Edition
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0196-01: 1
- Certification No. C0196: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_COP.1: 4
- FCS_RBG_EXT.1: 1
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- T:
- T.LIMITED_PHYSI: 1
- T.LOCAL_ATTAC: 1
- T.NETWORK_ATT: 1
- T.NETWORK_EAV: 1
|
- A:
- A.ADMIN: 1
- A.NET: 1
- A.SECMODE: 1
- T:
- T.CONFDATA: 1
- T.RECOVER: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 4
- SHA-512: 4
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
- NIST:
- P-256: 2
- P-384: 5
- P-521: 2
- curve P-384: 1
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- NIST:
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 1
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
|
| pdf_data/report_metadata |
- /Author: ppatin
- /CreationDate: D:20220510122315-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220510122315-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 387333
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /CreationDate: D:20090109163527+09'00'
- /ModDate: D:20090109163527+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 129825
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
| pdf_data/st_filename |
st_vid11258-st.pdf |
c0196_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_TSU.1: 1
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 1
- ADV_TDS.1: 3
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.1: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_FUN.1: 3
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 2
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 8
- FCS_RBG_EXT.1: 3
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_STO_EXT.1: 2
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 3
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.2: 2
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 2
- FCS_TLSC_EXT.4.1: 1
- FDP:
- FDP_ACF_EXT.1: 2
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT.1: 2
- FDP_IFC_EXT.1.1: 1
- FIA:
- FIA_AFL.1: 2
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 2
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 2
- FMT_MOF_EXT.1.1: 1
- FMT_SMF_EXT.1: 2
- FMT_SMF_EXT.1.1: 2
- FPT:
- FPT_ACF_EXT.1: 2
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT.1: 2
- FPT_ASLR_EXT.1.1: 1
- FPT_SBOP_EXT.1: 2
- FPT_SBOP_EXT.1.1: 1
- FPT_TST_EXT.1: 2
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 2
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_TAB.1: 2
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 2
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 2
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 2
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.ACCOUNTABILITY: 1
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LIMITED_PHYSICAL_ACCESS: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
|
- A:
- A.ADMIN: 4
- A.NET: 4
- A.SECMODE: 3
- O:
- O.CIPHER: 9
- O.FAX_SEC: 5
- O.MANAGE: 8
- O.RESIDUAL: 6
- OE:
- OE.ADMIN: 4
- OE.AUTH: 5
- OE.FUNCTION: 6
- OE.NET: 3
- T:
- T.CONFDATA: 3
- T.RECOVER: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 15
- SHA-512: 8
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 14
- P-521: 6
- curve P-384: 2
- secp384r1: 5
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-4: 2
- FIPS PUB 186-4: 4
- NIST:
- NIST SP 800-38D: 2
- NIST SP 800-38E: 2
- NIST SP 800-56A: 1
- NIST SP 800-57: 1
- NIST SP 800-90A: 1
- RFC:
- RFC 2818: 1
- RFC 5246: 2
- RFC 5280: 3
- RFC 5289: 2
- RFC 5759: 2
- RFC 6125: 2
- RFC 6960: 2
- X509:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
|
| pdf_data/st_metadata |
- /Author: Acumen Security, LLC.
- /CreationDate: D:20220504153555-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220504153555-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 695576
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_tds.cfm
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: kurata-masami
- /CreationDate: D:20090105132826+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20090109101350+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - ApeosPort-Ⅱ 7000_AP_ ST_V1.0.9_E.doc
- pdf_file_size_bytes: 327717
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |