name |
Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000) |
Xerox 4112/4127 Copier/Printer Controller+PS ROM Ver. 1.211.8 IOT ROM Ver. 46.18.0 IIT ROM Ver. 15.6.1 IIT Option ROM Ver. 14.0.4 ADF ROM Ver. 12.2.7 |
category |
Network and Network-Related Devices and Systems |
Multi-Function Devices |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
07.09.2012 |
31.03.2015 |
not_valid_before |
03.05.2005 |
12.03.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-VR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0250_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0250_est.pdf |
manufacturer |
Sourcefire Inc. |
Fuji Xerox Co., Ltd. |
manufacturer_web |
https://www.sourcefire.com/ |
https://www.fujixerox.co.jp/eng/ |
security_level |
EAL2 |
EAL3 |
dgst |
e53cc6b38f5c1c8c |
0bd10c0b5fc14416 |
heuristics/cert_id |
CCEVS-VR-0102-2005 |
JISEC-CC-CRP-C0250 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
3.2.3 |
1.211.8, 12.2.7, 14.0.4, 15.6.1, 46.18.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Wireless Monitoring
- certification_date: 03.06.2005
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID4017
- product: Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000)
- scheme: US
- url: https://www.niap-ccevs.org/product/4017
- vendor: Sourcefire, Inc.
|
- cert_id: JISEC-CC-CRP-C0250
- certification_date: 01.03.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0250_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, and scan as basic functions. The TOE is assumed to be used, at general office, from the control panel, and clients (for general user and system administrator) and servers which are linked to the TOE via internal network. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administratorç—´ Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Xerox 4112/4127 Copier/Printer
- product_type: Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0250_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0250_est.pdf
- toe_version: Controller+PS ROM Ver. 1.211.8 IOT ROM Ver. 46.18.0 IIT ROM Ver. 15.6.1 IIT Option ROM Ver. 14.0.4 ADF ROM Ver. 12.2.7
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.04.2015
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0250_it9272.html
- toe_overseas_name: Xerox 4112/4127 Copier/Printer Controller+PS ROM Ver. 1.211.8 IOT ROM Ver. 46.18.0 IIT ROM Ver. 15.6.1 IIT Option ROM Ver. 14.0.4 ADF ROM Ver. 12.2.7
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
809ce30fff5c61f3 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_v1.4.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ST_VID4017-VR.pdf |
c0250_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-05-0102
- cert_item: Sourcefire, Incorporated Sourcefire Intrusion Detection System (NS 500, NS 1000, NS 2000, NS 2100, NS 3000, MC 1000, and MC 3000
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0250-01: 1
- Certification No. C0250: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.PROTCT: 1
- T:
- T.COMDIS: 1
- T.COMINT: 1
- T.EXPOSE: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NOHALT: 1
- T.PRIVIL: 1
- T.SCNCFG: 1
- T.SCNMLC: 1
- T.SCNVUL: 1
|
- A:
- T:
- T.COMM_TAP: 1
- T.CONFDATA: 1
- T.CONSUME: 1
- T.DATA_SEC: 1
- T.RECOVER: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Vicky Ashby
- /CreationDate: D:20050526141546-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20050526141623-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Validation Report for Sourcefire
- pdf_file_size_bytes: 384618
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20100405164848+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20100405164851+09'00'
- /Producer: Acrobat Distiller 8.2.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 127666
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
ST_VID4017-ST.pdf |
c0250_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 7
- ADO_IGS.1: 8
- ADV:
- ADV_FSP.1: 10
- ADV_HLD.1: 13
- ADV_RCR.1: 6
- AGD:
- AGD_ADM.1: 13
- AGD_USR.1: 11
- ATE:
- ATE_COV.1: 6
- ATE_FUN.1: 11
- ATE_IND.2: 9
- AVA:
- AVA_SOF.1: 8
- AVA_VLA.1: 11
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.2: 11
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.2: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 3
- FDP_IFF.1: 2
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 17
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UIA.2: 1
- FIA_UID.1: 7
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ASCOPE: 3
- A.DYNMIC: 3
- A.ITNET: 1
- A.LOCATE: 3
- A.MANAGE: 2
- A.NOEVIL: 3
- A.NOTRST: 2
- A.NOTRUST: 1
- A.PROTCT: 3
- O:
- O.ACCESS: 10
- O.AU: 1
- O.AUDITS: 10
- O.CREDEN: 4
- O.E: 2
- O.EADMIN: 6
- O.EXPORT: 4
- O.I: 2
- O.IDANLZ: 7
- O.IDAUTH: 21
- O.IDSCAN: 7
- O.IDSENS: 7
- O.INSTAL: 5
- O.INTEGR: 5
- O.INTROP: 4
- O.OFLOWS: 4
- O.PERSON: 6
- O.PHYCAL: 8
- O.PR: 1
- O.PROTCT: 10
- O.RESPON: 3
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.EXPOSE: 4
- T.FACCNT: 3
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 3
- T.IMPCON: 3
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.MISACT: 3
- T.MISUSE: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.SCNCFG: 3
- T.SCNMLC: 3
- T.SCNVUL: 3
|
- A:
- O:
- O.AUDITS: 7
- O.CIPHER: 5
- O.COMM_SEC: 6
- O.MANAGE: 6
- O.RESIDUAL: 7
- O.RESTRICT: 5
- O.USER: 7
- OE:
- OE.ADMIN: 3
- OE.AUTH: 4
- OE.COMMS_SEC: 3
- OE.COMM_SEC: 1
- OE.FUNCTION: 5
- T:
- T.COMM_TAP: 4
- T.CONFDATA: 3
- T.CONSUME: 4
- T.DATA_SEC: 3
- T.RECOVER: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: CCTL
- /CreationDate: D:20050525111943-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20050525112204-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Sourcefire Security Target
- pdf_file_size_bytes: 1670374
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /Author: fx11526
- /CreationDate: D:20100325095201+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20100326162040+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - 9272_Security Target.doc
- pdf_file_size_bytes: 396988
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |