name |
S3FT9MF/S3FT9MT/S3FT9MS (S3FT9MF_20231219) (ANSSI-CC-2024/07) |
Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
FR |
JP |
status |
active |
archived |
not_valid_after |
16.05.2029 |
13.02.2022 |
not_valid_before |
16.05.2024 |
13.02.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_07fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_07fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_07.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_est.pdf |
manufacturer |
Samsung Electronics Co., Ltd. |
Hitachi, Ltd. |
manufacturer_web |
https://www.samsung.com |
https://www.hitachi.com/ |
security_level |
ASE_TSS.2, EAL6+ |
ALC_FLR.1, EAL2+ |
dgst |
c7adb2b7e2ee6ae2 |
bd28ac0feda9039e |
heuristics/cert_id |
ANSSI-CC-2024/07 |
JISEC-CC-CRP-C0536 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_IND.2, ADV_INT.3, ALC_LCD.1, ADV_SPM.1, ATE_FUN.2, ASE_CCL.1, AGD_OPE.1, ASE_SPD.1, ADV_IMP.2, ALC_TAT.3, ASE_OBJ.2, ATE_DPT.3, ASE_TSS.2, ALC_CMS.5, ADV_ARC.1, ALC_DVS.2, ASE_INT.1, AVA_VAN.5, ASE_REQ.2, ALC_DEL.1, ADV_FSP.5, AGD_PRE.1, ADV_TDS.5, ATE_COV.3, ALC_CMC.5, ASE_ECD.1 |
ATE_IND.2, ASE_CCL.1, ALC_CMS.2, AGD_OPE.1, ASE_SPD.1, AVA_VAN.2, ALC_FLR.1, ASE_OBJ.2, ADV_ARC.1, ALC_CMC.2, ATE_FUN.1, ASE_INT.1, ASE_TSS.1, ADV_FSP.2, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ATE_COV.1, ADV_TDS.1, ASE_ECD.1 |
heuristics/extracted_versions |
2024, 07 |
8.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0536
- certification_date: 01.02.2017
- claim: EAL2+ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0536_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). TOE security functionality The TOE provides the following security functionality: - Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) - Access control functionality for storage resource information and for warning banner information - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software
- product_type: Access Control Device and Systems
- report_link: https://www.ipa.go.jp/en/security/c0536_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0536_est.pdf
- toe_version: 8.0.1-02
- vendor: Hitachi, Ltd.
- expiration_date: 01.03.2022
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html
- toe_overseas_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
cf0f01bcd7be3e9c |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
{} |
pdf_data/cert_filename |
Certificat-CC-2024_07fr.pdf |
c0536_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240524143914+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240524150419+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 163458
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20170911161211+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /ModDate: D:20170911161350+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title:
- pdf_file_size_bytes: 453124
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
ANSSI-CC-2024_07fr.pdf |
c0536_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0536-01: 1
- Certification No. C0536: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 2
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- T:
- T.ILLEGAL_ACCESS: 1
- T.UNAUTHORISED_ACCESS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20171211090255+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20171211090339+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 207872
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
ANSSI-cible-CC-2024_07.pdf |
c0536_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084: 1
- BSI-CC-PP-0084-: 1
- BSI-PP-0084: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 2
- EAL 5 augmented: 2
- EAL6: 5
- EAL6 augmented: 1
- EAL6+: 2
|
- EAL:
- EAL2: 8
- EAL2 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 2
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 11
- ATE:
- ATE_COV: 1
- ATE_COV.3: 1
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 1
- FAU_SAS: 8
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 40
- FCS_CKM.1: 41
- FCS_CKM.2: 4
- FCS_CKM.4: 26
- FCS_CMK: 5
- FCS_COP: 45
- FCS_COP.1: 21
- FCS_RNG: 25
- FCS_RNG.1: 18
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 10
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF: 14
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 23
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 22
- FDP_ITC.2: 22
- FDP_ITT: 1
- FDP_ITT.1: 18
- FDP_ITT.1.1: 1
- FDP_SDC: 4
- FDP_SDC.1: 14
- FDP_SDC.1.1: 2
- FDP_SDI: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 6
- FIA_API.1: 12
- FIA_API.1.1: 2
- FMT:
- FMT_LIM: 22
- FMT_LIM.1: 28
- FMT_LIM.1.1: 2
- FMT_LIM.2: 32
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 22
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 16
- FPT_ITT.1.1: 1
- FPT_PHP: 3
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_FLT.2: 17
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 5
- O.ECDH: 7
- O.ECDSA: 6
- O.MEM_ACCESS: 1
- O.RND: 6
- O.RSA: 8
- O.SHA: 7
- O.TDES: 7
- T:
|
- A:
- A.ADMINISTRATORS: 4
- A.CLIENTS: 3
- A.NETWORKS: 3
- A.PASSWORD: 4
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 16
- Triple-DES: 5
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA224: 4
- SHA256: 4
- SHA384: 4
- SHA512: 3
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP192r1: 3
- brainpoolP192t1: 3
- brainpoolP224r1: 3
- brainpoolP224t1: 3
- brainpoolP256r1: 3
- brainpoolP256t1: 3
- brainpoolP320r1: 3
- brainpoolP320t1: 3
- brainpoolP384r1: 3
- brainpoolP384t1: 3
- brainpoolP512r1: 3
- brainpoolP512t1: 3
- NIST:
- P-192: 6
- P-224: 6
- P-256: 6
- P-384: 6
- secp192k1: 3
- secp192r1: 3
- secp224k1: 3
- secp224r1: 3
- secp256k1: 3
- secp256r1: 3
- secp384r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 5
- Malfunction: 26
- malfunction: 13
- physical tampering: 3
- SCA:
- DPA: 6
- Leak-Inherent: 24
- Physical Probing: 4
- Physical probing: 2
- SPA: 5
- physical probing: 9
- side channel: 2
- side-channel: 3
- timing attack: 2
- timing attacks: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 3
- CCMB-2017-04-002: 3
- CCMB-2017-04-003: 3
- CCMB-2017-04-004: 3
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS PUB 180-3: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-67: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20171130192201+09'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20171130192201+09'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 1103262
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |