name |
OKI Color Page Printer C8800 Security Module DS 01.00 |
McAfee® Email Gateway (MEG) software v7.0.1, running on VMware server |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
19.04.2018 |
not_valid_before |
27.04.2007 |
11.12.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0093_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-241%20CR%20v1.1e.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-241%20ST%202.1.pdf |
manufacturer |
OKI Data Corporation |
McAfee, Inc. |
manufacturer_web |
|
https://www.mcafee.com/ |
security_level |
EAL3 |
EAL2+, ALC_FLR.2 |
dgst |
cba38ac094767037 |
b1a403b8d648c3b0 |
heuristics/cert_id |
JISEC-CC-CRP-C0093 |
383-4-241 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
cpe:2.3:a:mcafee:email_gateway:7.0:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:email_gateway:7.0.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2012-4597, CVE-2012-4580, CVE-2012-4595, CVE-2012-4585, CVE-2012-4583, CVE-2009-1348, CVE-2013-6349, CVE-2012-4584, CVE-2012-4596, CVE-2012-4581, CVE-2012-4586, CVE-2015-1619, CVE-2016-8005, CVE-2020-7268, CVE-2012-4582 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ALC_FLR.2, ADV_ARC.1, ATE_COV.1, AGD_OPE.1, AGD_PRE.1, ALC_DEL.1, ASE_SPD.1, ADV_TDS.1, ASE_OBJ.2, ASE_REQ.2, AVA_VAN.2, ATE_FUN.1, ASE_TSS.1, ATE_IND.2, ALC_CMC.2, ASE_CCL.1, ALC_CMS.2, ASE_ECD.1, ASE_INT.1, ADV_FSP.2 |
heuristics/extracted_versions |
01.00 |
7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0093
- certification_date: 01.04.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0093_eimg.pdf
- description: PRODUCT DESCRIPTION This TOE, which operates with a security kit installed in an OKI Color Page Printer C8800, properly uses the encipherment functionality of the kit to encipher and save data stored on an HDD in the printer for the data to be printed and managed, thereby preventing information from leaking via the HDD if the HDD is stolen and data is unauthorizedly read from it. The TOE is provided as firmware for the C8800 series of OKI Color Page Printers made by Oki Data Corporation and operates to provide security functions when an optional security kit type A1 is installed in the printer.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: OKI Color Page Printer C8800 Security Module
- product_type: IT Product (data protection function in printer systems)
- toe_version: DS 01.00
- vendor: Oki Data Corporation
- expiration_date: 01.10.2013
- supplier: Oki Data Corporation
- toe_japan_name: OKI Color Page Printer C8800 Security Module DS 01.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0093_it6119.html
- toe_overseas_name: OKI Color Page Printer C8800 Security Module DS 01.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0093_ecvr.pdf |
383-4-241 CR v1.1e.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-241-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 6
- EAL 2 augmented: 2
- EAL 2+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_STG_EXT.1: 1
- FAU_STG_EXT.3: 1
- FCS:
- FCS_CKM_EXT.4: 1
- FCS_RGB_EXT.1: 1
- FCS_SSH_EXT.1: 1
- FCS_TLS_EXT.1: 1
- FDP:
- FDP_CMM_EXT.1: 1
- FDP_CMM_EXT.2: 1
- FIA:
- FIA_PMG_EXT.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UIA_EXT.1: 1
- FPT:
- FPT_APW_EXT.1: 1
- FPT_SKP.1: 1
- FPT_TST_EXT.1: 1
- FPT_TUD_EXT.1: 1
- FTA:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 2
- FIPS 180-2: 1
- FIPS 186-2: 3
- FIPS 197: 1
- FIPS 198: 1
- FIPS 46-3: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20070427213020+09'00'
- /ModDate: D:20070427213020+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12873
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: User
- /CCEF: EWA-Canada
- /CR date: 10 December 2013
- /CR version: 1.1
- /Certificate date: 11 December 2012
- /Company: CSEC-CSTC
- /CreationDate: D:20131210121402-05'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Developer name: McAfee, Inc.
- /Document number: 383-4-241-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of McAfee, Inc. McAfee® Email Gateway Version 7.0.1 Version 1.2, 16 October 2012
- /Evaluation completion date: 16 October 2012
- /ModDate: D:20131210121407-05'00'
- /Producer: Adobe PDF Library 9.0
- /ST Title: McAfee® Email Gateway Version 7.0.1 EAL 2 + ALC_FLR.2 Security Target
- /ST date: 28 October 2013
- /ST version: 2.1
- /SourceModified: D:20131210170825
- /Sponsor: McAfee, Inc.
- /TOE Version: 7.0.1
- /TOE name and version: McAfee® Email Gateway (MEG) software v7.0.1, running on VMware Server
- /TOE short name: MEG v7.0.1
- /Title: EAL 2 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 102886
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
|
383-4-241 ST 2.1.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 3
- EAL2: 2
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADO:
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 12
- FAU_ARP.1.1: 1
- FAU_GEN: 11
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FAU_STG: 7
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 14
- FAU_STG.3.1: 2
- FAU_STG_EXT: 1
- FAU_STG_EXT.1: 13
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 20
- FCS_CKM.1.1: 1
- FCS_CKM.4: 11
- FCS_CKM_EXT.4: 16
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 40
- FCS_COP.1.1: 5
- FCS_COP.2: 1
- FCS_RBG: 3
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 10
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RGB_EXT.1: 1
- FCS_SSH: 3
- FCS_SSH_EXT: 1
- FCS_SSH_EXT.1: 11
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS: 3
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 15
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC.1: 1
- FDP_ACF: 2
- FDP_CMM.2.1: 1
- FDP_CMM_EXT: 4
- FDP_CMM_EXT.1: 39
- FDP_CMM_EXT.1.1: 5
- FDP_CMM_EXT.2: 48
- FDP_CMM_EXT.2.1: 4
- FDP_IFC: 3
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF: 5
- FDP_IFF.1: 4
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 10
- FDP_ITC.2: 8
- FDP_RIP.2: 7
- FDP_RIP.2.1: 1
- FDP_UCT: 3
- FDP_UCT.1: 4
- FDP_UCT.1.1: 1
- FIA:
- FIA_PMG: 3
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 12
- FIA_PMG_EXT.1.1: 2
- FIA_UAU: 5
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 1
- FIA_UAU_EXT.2: 12
- FIA_UAU_EXT.2.1: 2
- FIA_UIA: 2
- FIA_UIA_EXT: 2
- FIA_UIA_EXT.1: 14
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID: 1
- FIA_UID.1: 3
- FIA_UID_EXT.1: 1
- FMT:
- FMT_MOF.1: 24
- FMT_MOF.1.1: 3
- FMT_MSA.3: 2
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.2: 10
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW: 2
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 3
- FPT_APW_EXT.1.2: 2
- FPT_CKM.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_SKP: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 10
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST: 4
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TUD: 3
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 17
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_SSL.4: 7
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 11
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NO_BYPASS: 1
- A.NO_GENERAL_PURPOSE: 3
- A.NO_MALW: 1
- A.PHYSICAL: 1
- A.SEC_UPDATES: 3
- A.TRUSTED_ADMIN: 3
- O:
- O.AUDIT_PROTECT: 9
- O.AUDIT_REVIEW: 7
- O.DECRYP: 5
- O.DISPLAY_BANNER: 4
- O.MAL_CONTENT: 4
- O.NOSUB: 1
- O.PROTECTED_COMMUNICATI: 2
- O.PROTECTED_COMMUNICATIONS: 6
- O.RESIDUAL_INFORMATION_C: 2
- O.RESIDUAL_INFORMATION_CLEARING: 3
- O.S: 3
- O.SECURE_CHK: 5
- O.SECURE_MAIL: 5
- O.SESSION_LOCK: 5
- O.SYSTEM_MONITORING: 7
- O.TIME_STAMPS: 5
- O.TOE_ADMINISTRATION: 4
- O.TSF_SELFTEST: 1
- O.TSF_SELF_TEST: 5
- O.VERIFIABLE: 6
- O.VERIFIABLE_UPDATES: 3
- OE:
- OE.ADMIN_SESSION: 3
- OE.NOSUB: 7
- OE.NO_BYPASS: 2
- OE.NO_GENERAL_PURPOSE: 2
- OE.NO_MALW: 4
- OE.PHYSICAL: 2
- OE.SEC_UPDATES: 4
- OE.TRUSTED_ADMIN: 3
- T:
- T.ADMIN_ERROR: 4
- T.AUDIT_: 3
- T.AUDIT_COMP: 1
- T.BAD_DAT: 4
- T.MAL_AGENT: 4
- T.MAL_MSG: 2
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 3
- T.UNDETECTED_A: 1
- T.UNDETECTED_ACTIONS: 3
- T.UNID_ACTION: 2
- T.USER_DATA_RE: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- PGP:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 33
- TLS 1.0: 5
- TLS 1.1: 1
- TLS 1.2: 1
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 1
- SP 800-90B: 1
- PKCS:
- RFC:
- RFC 2246: 3
- RFC 2818: 2
- RFC 4253: 1
- RFC 4346: 1
- RFC 5246: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Primasec
- /CreationDate: D:20131218092508-05'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20131218092508-05'00'
- /Producer: Microsoft® Office Word 2007
- /Title: McAfee MEG7 ST
- pdf_file_size_bytes: 1436856
- pdf_hyperlinks: http://www.openssh.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |