name |
Canon MFP Security Chip 1.00 |
IBM AIX 5L for POWER V5.3, Technology level 5300-05-02 with Argus Systems Group PitBull Foundation Suite 5.0 and optional IBM Virtual IO Server (VIOS) Version 1.3 |
category |
Other Devices and Systems |
Operating Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.09.2019 |
not_valid_before |
07.07.2006 |
16.01.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0050_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0396a.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0396b.pdf |
manufacturer |
Canon Inc. |
Innovative Security Systems, Inc. |
manufacturer_web |
|
https://www.innovativesecurity.com/ |
security_level |
EAL3 |
ALC_FLR.1, EAL4+ |
dgst |
d4ca034eb499b4b6 |
059ec6ad2ed1bf9e |
heuristics/cert_id |
JISEC-CC-CRP-C0050 |
BSI-DSZ-CC-0396-2007 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_OBJ.1, ATE_COV.2, AGD_USR.1, ASE_REQ.1, ASE_TSS.1, ADV_HLD.2, AVA_VLA.2, ATE_DPT.1, ADV_FSP.2, ADV_IMP.1, ALC_DVS.1, ADV_SPM.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ATE_IND.2, ASE_PPC.1, AGD_ADM.1, ALC_FLR.1, ASE_SRE.1, ASE_INT.1, ATE_FUN.1, ADV_RCR.1, AVA_MSU.2, ALC_LCD.1, AVA_SOF.1, ADV_LLD.1 |
heuristics/extracted_versions |
1.00 |
5.0, 5.3, 1.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0303-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0303-2006, BSI-DSZ-CC-0302-2005, BSI-DSZ-CC-0194-2002, BSI-DSZ-CC-0217-2003 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0050
- certification_date: 01.07.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0050_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the Canon MFP Security Chip and will be provided to end users as part of a security kit. The TOE allows protecting hard drives in Canon MFPs and printers from disclosure of confidential information due to theft, without sacrificing the extensibility, versatility, convenience and performance of Canon MFPs and printers. The TOE provides the following functions for protecting hard drives: - Hard drive data encryption - Cryptographic key management - Device identification and authentication
- evaluation_facility: Japan Electronics and Information Technology IndustriesAssociation, Information Technology security center (JEITA ITSC)
- product: Canon MFP Security Chip
- product_type: IT Product ( cryptographic security chip )
- report_link: https://www.ipa.go.jp/en/security/c0050_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0050_est.pdf
- toe_version: 1.00
- vendor: Canon Inc.
- expiration_date: 01.10.2013
- supplier: Canon Inc.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0050_it5069.html
- toe_japan_name: Canon MFP Security Chip 1.00
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0050_ecvr.pdf |
0396a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0396-2007
- cert_item: AIX 5L for POWER V5.3 with Technology Package 5300-05-02 with Argus Systems Group PitBull Foundation 5.0 and the Virtual IO Server (VIOS) Version 1.3
- cert_lab: BSI
- developer: Innovative Security Systems, Inc. sponsored by IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0050: 1
|
- DE:
- BSI-DSZ-CC-0303-2006: 4
- BSI-DSZ-CC-0396: 1
- BSI-DSZ-CC-0396-2007: 25
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 11
- EAL4 augmented: 3
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.1: 6
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 3
- AVA_VLA.2: 4
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_SAR.3: 1
- FAU_SEL.1: 1
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG.4: 1
- FDP:
- FDP_ACC.1: 6
- FDP_ACF.1: 6
- FDP_ETC.1: 1
- FDP_ETC.2: 1
- FDP_IFC.1: 3
- FDP_IFF.2: 3
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP: 1
- FDP_RIP.2: 1
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 1
- FIA_UAU.2: 1
- FIA_UAU.7: 1
- FIA_UID.2: 2
- FIA_USB.1: 2
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.3: 7
- FMT_MTD.1: 7
- FMT_REV.1: 3
- FMT_SMF.1: 1
- FMT_SMR.1: 2
- FPT:
- FPT_AMT.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 1
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECT: 1
- A.COOP: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NET_COMP: 1
- A.NO_EVIL_ADMIN: 1
- A.PEER: 1
- A.PROTECT: 1
- A.UTRAIN: 1
- A.UTRUST: 1
- T:
- T.UAACCESS: 1
- T.UAACTION: 1
- T.UAUSER: 1
- T.VIOS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Technical Report BSI-DSZ-CC-0396, Release 2, 2006-12-21, atsec information security GmbH (confidential document) [8] Labeled Security Protection Profile (LSPP), Issue 1.b, 8 October 1999 User Guidance: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20060707112902+09'00'
- /ModDate: D:20060707112902+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12465
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20070118130925+01'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung; AIX 5L for POWER V5.3,Innovative Security Systems, Inc., IBM Corporation,
- /ModDate: D:20070308085123+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070118120750
- /Title: Certification Report BSI-DSZ-CC-0396-2007
- pdf_file_size_bytes: 348875
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
pdf_data/st_filename |
|
0396b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL3: 3
- EAL4: 7
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.1: 8
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 11
- FAU_GEN.1.2: 1
- FAU_GEN.2: 12
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 13
- FAU_SAR.2.1: 1
- FAU_SAR.3: 10
- FAU_SAR.3.1: 1
- FAU_SEL.1: 10
- FAU_SEL.1.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 78
- FDP_ACC.1.1: 6
- FDP_ACF.1: 75
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 7
- FDP_ACF.1.4: 6
- FDP_ETC.1: 9
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 11
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 49
- FDP_IFC.1.1: 3
- FDP_IFF.1: 11
- FDP_IFF.2: 35
- FDP_IFF.2.1: 3
- FDP_IFF.2.2: 6
- FDP_IFF.2.3: 3
- FDP_IFF.2.4: 3
- FDP_IFF.2.5: 3
- FDP_IFF.2.6: 3
- FDP_IFF.2.7: 3
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 9
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_MSA.3: 1
- FDP_RIP: 23
- FDP_RIP.1: 1
- FDP_RIP.2: 13
- FIA:
- FIA_ATD.1: 28
- FIA_ATD.1.1: 2
- FIA_SOS.1: 13
- FIA_UAU.1: 3
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 11
- FIA_UID: 1
- FIA_UID.1: 8
- FIA_UID.2: 23
- FIA_UID.2.1: 2
- FIA_USB.1: 25
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 63
- FMT_MSA.1.1: 7
- FMT_MSA.3: 71
- FMT_MSA.3.1: 8
- FMT_MSA.3.2: 7
- FMT_MTD.1: 63
- FMT_MTD.1.1: 8
- FMT_REV.1: 28
- FMT_REV.1.1: 3
- FMT_REV.1.2: 3
- FMT_SMF.1: 35
- FMT_SMF.1.1: 1
- FMT_SMR.1: 32
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT.1: 9
- FPT_AMT.1.1: 1
- FPT_RVM: 19
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CLEARANCE: 3
- A.CONNECT: 8
- A.COOP: 4
- A.LOCATE: 4
- A.MANAGE: 5
- A.NET_COMP: 6
- A.NO_EVIL_ADM: 3
- A.PEER: 4
- A.PROTECT: 6
- A.SENSITIVITY: 3
- A.UTRAIN: 6
- A.UTRUST: 6
- O:
- O.AUDITING: 23
- O.AUTHORIZATION: 22
- O.DISCRETIONARY_ACCESS: 13
- O.ENFORCEMENT: 17
- O.ERASE: 8
- O.MANAGE: 21
- O.MANDATORY_ACCESS: 13
- O.MANDATORY_INTEGRITY: 10
- O.NETWORK_ACCESS: 13
- O.RESIDUAL_INFORMATION: 11
- O.STACK: 12
- O.TCB_ACCESS: 13
- O.VIOS: 12
- OE:
- OE.ADMIN: 7
- OE.CREDEN: 4
- OE.HW_SEP: 9
- OE.INFO_PROTECT: 15
- OE.INSTALL: 14
- OE.LPAR: 9
- OE.MAINTENANCE: 5
- OE.PHYSICAL: 8
- OE.PROTECT: 10
- OE.RECOVER: 7
- OE.SERIAL_LOGIN: 5
- OE.SOFTWARE_IN: 5
- T:
- T.UAACCESS: 7
- T.UAACTION: 5
- T.UAUSER: 7
- T.VIOS: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- CCIMB-2005-08-004: 1
- FIPS:
- FIPS PUB 188: 2
- FIPS PUB 189: 1
- ISO:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: atsec
- /CreationDate: D:20070306161211Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20070308084600+01'00'
- /Producer: Microsoft® Office Word 2007
- /Title: IBM AIX V5.3 w/PitBull Foundation r5.0 and opt VIOS Security Target
- pdf_file_size_bytes: 1404682
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 125
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |