name |
Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 |
HP StorageWorks P9000 Command View Advanced Edition Software Common Component Version: 7.0.1-00 |
category |
Other Devices and Systems |
Access Control Devices and Systems |
scheme |
US |
JP |
status |
active |
archived |
not_valid_after |
31.01.2027 |
01.09.2016 |
not_valid_before |
31.01.2022 |
15.08.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-st1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_est.pdf |
manufacturer |
Vertiv IT Systems |
Hewlett-Packard Company |
manufacturer_web |
|
https://www.hp.com |
security_level |
{} |
EAL2+, ALC_FLR.1 |
dgst |
cae7cbcadc444d12 |
c63773cb15a5150c |
heuristics/cert_id |
CCEVS-VR-VID-11254-2022 |
JISEC-CC-CRP-C0305 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:hp:9000:-:*:*:*:*:*:*:*, cpe:2.3:a:hp:p9000_command_view_advanced_edition_software:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2016-2003, CVE-2010-4107 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
40404 |
7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0305
- certification_date: 01.08.2011
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0305_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: HP StorageWorks P9000 Device Manager Software, HP StorageWorks P9000 Replication Manager Software, HP StorageWorks P9000 Tiered Storage Manager Software, and HP StorageWorks P9000 Tuning Manager Software. These products, in combination with TOE, are commonly referred to as HP StorageWorks P9000 Command View Advanced Edition Software. TOE is a foundational module for HP StorageWorks P9000 Command View Advanced Edition Software, and is packaged with all products. TOE security functions TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: HP StorageWorks P9000 Command View Advanced Edition Software Common Component
- product_type: Foundational Module Software
- report_link: https://www.ipa.go.jp/en/security/c0305_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0305_est.pdf
- toe_version: 7.0.1-00
- vendor: Hewlett-Packard Company
- expiration_date: 01.09.2016
- supplier: Hewlett-Packard Company
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0305_it0331.html
- toe_overseas_name: HP StorageWorks P9000 Command View Advanced Edition Software Common Component 7.0.1-00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid11254-vr.pdf |
c0305_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11254-2022
- cert_item: for the Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 Peripheral Sharing Devices Version 1.0
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11254-2022: 1
|
- JP:
- CRP-C0305-01: 1
- Certification No. C0305: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_FLR.1: 3
- ALC_FLR.2: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_TEMPEST: 1
- A.NO_WIRELESS_DEVICES: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_CONFIG: 1
- A.USER_ALLOWED_ACCESS: 1
- T:
- T.DATA_LEAK: 1
- T.FAILED: 1
- T.LOGICAL_TAMPER: 1
- T.PHYSICAL_TAMPER: 1
- T.REPLACEMENT: 1
- T.RESIDUAL_LEAK: 1
- T.SIGNAL_LEAK: 1
- T.UNAUTHORIZED_DEVICES: 1
- T.UNINTENDED_USE: 1
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- A.VERSION: 1
- T:
- T.ILLEGAL_ACCESS: 2
- T.UNAUTHORISED_ACCESS: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: ppatin
- /CreationDate: D:20220131200223-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220131200223-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 459318
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110927171053+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110928093233+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 347111
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
st_vid11254-st1.pdf |
c0305_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 7
- EAL2 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_APC_EXT: 15
- FDP_APC_EXT.1: 10
- FDP_APC_EXT.1.1: 1
- FDP_APC_EXT.1.2: 1
- FDP_APC_EXT.1.3: 1
- FDP_APC_EXT.1.4: 1
- FDP_FIL_EXT: 15
- FDP_FIL_EXT.1: 7
- FDP_FIL_EXT.1.1: 1
- FDP_FIL_EXT.1.2: 1
- FDP_FIL_EXT.1.3: 1
- FDP_FLS_EXT: 1
- FDP_PDC_EXT: 16
- FDP_PDC_EXT.1: 25
- FDP_PDC_EXT.1.1: 2
- FDP_PDC_EXT.1.2: 1
- FDP_PDC_EXT.1.3: 1
- FDP_PDC_EXT.1.4: 1
- FDP_PDC_EXT.1.5: 1
- FDP_PDC_EXT.2: 6
- FDP_PDC_EXT.2.1: 1
- FDP_PDC_EXT.2.2: 1
- FDP_PDC_EXT.3: 7
- FDP_PDC_EXT.3.1: 1
- FDP_PDC_EXT.3.2: 1
- FDP_RDR_EXT: 4
- FDP_RDR_EXT.1: 14
- FDP_RDR_EXT.1.1: 2
- FDP_RIP_EXT: 4
- FDP_RIP_EXT.1: 8
- FDP_RIP_EXT.1.1: 2
- FDP_SWI_EXT: 4
- FDP_SWI_EXT.1: 10
- FDP_SWI_EXT.1.1: 2
- FDP_UDF_EXT: 10
- FDP_UDF_EXT.1: 5
- FDP_UDF_EXT.1.1: 1
- FPT:
- FPT_FLS_EXT: 3
- FPT_FLS_EXT.1: 9
- FPT_FLS_EXT.1.1: 3
- FPT_NTA_EXT: 4
- FPT_NTA_EXT.1: 8
- FPT_NTA_EXT.1.1: 2
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 2
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 10
- FPT_TST_EXT.1.1: 2
- FTA:
|
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_PHYSICAL: 1
- A.NO_TEMPEST: 2
- A.NO_WIRELESS: 1
- A.NO_WIRELESS_DEVICES: 1
- A.PHYSICAL: 1
- A.TRUSTED: 1
- A.TRUSTED_ADMIN: 2
- A.TRUSTED_CONFIG: 1
- A.USER_ALLOWED: 1
- A.USER_ALLOWED_ACCESS: 1
- O:
- O.ANTI_TAMPERING: 2
- O.AUTHORIZED: 2
- O.COMPUTER: 5
- O.EMULATED_INPUT: 3
- O.LEAK: 1
- O.LEAK_PREVENTION: 1
- O.NO_OTHER: 3
- O.NO_TOE_ACCESS: 2
- O.NO_USER: 1
- O.NO_USER_DATA: 1
- O.PERIPHERAL: 1
- O.PERIPHERAL_PORTS: 1
- O.REJECT: 4
- O.SELF_TEST: 4
- O.SELF_TEST_FAIL: 2
- O.TAMPER: 1
- O.TAMPER_EVIDENT: 2
- O.UNIDIRECTIONAL: 3
- O.USER_DATA: 2
- OE:
- OE.NO_TEMPEST: 2
- OE.NO_WIRELESS: 1
- OE.NO_WIRELESS_DEVICES: 1
- OE.PHYSICAL: 3
- OE.TRUSTED: 2
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
- T:
- T.DATA_LEAK: 2
- T.FAILED: 2
- T.LOGICAL: 1
- T.LOGICAL_TAMPER: 1
- T.PHYSICAL: 1
- T.PHYSICAL_TAMPER: 1
- T.REPLACEMENT: 2
- T.RESIDUAL: 1
- T.RESIDUAL_LEAK: 1
- T.SIGNAL_LEAK: 2
- T.UNAUTHORIZED: 1
- T.UNAUTHORIZED_DEVICES: 1
- T.UNINTENDED: 1
- T.UNINTENDED_USE: 1
|
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.CLIENTS: 4
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 3
- A.VERSION: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- OE:
- OE.BANNER: 4
- OE.PASSWORD: 4
- OE.SECURE_CHANNEL: 4
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 4
- Microsoft Corporation: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Physical Tampering: 1
- physical tampering: 6
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Teresa MacArthur
- /Client Full Name: Vertiv
- /Client Short Name: Vertiv
- /Comments: CC V3.1 Security Target
Template Version 1_0
- /Company: EWA-Canada
- /CreationDate: D:20220105170543+01'00'
- /Creator: Acrobat PDFMaker 17 for Word
- /Document Number: 2149-001-D102C4B
- /ModDate: D:20220105170614+01'00'
- /Producer: Adobe PDF Library 17.11.238
- /Product_Name: Vertiv Secure USB HID Filter
- /ST_Date: 5 January 2022
- /ST_Version: 1.15
- /SourceModified: D:20220105160457
- /Title: Security Target
- pdf_file_size_bytes: 763032
- pdf_hyperlinks: mailto:[email protected], http://www.vertiv.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
- /Author: Hewlett-Packard Company
- /CreationDate: D:20110926112601
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110926112601
- /Producer: Microsoft® Office Word 2007
- /Subject: CVAE-ST
- /Title: HP StorageWorks P9000 Command View Advanced Edition Software Common Component Security Target
- pdf_file_size_bytes: 448528
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |