name |
Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000) |
PikeOS Separation Kernel, 4.2.4 |
category |
Network and Network-Related Devices and Systems |
Operating Systems |
scheme |
US |
DE |
status |
archived |
active |
not_valid_after |
07.09.2012 |
07.03.2027 |
not_valid_before |
03.05.2005 |
07.03.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-VR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1041V2b_pdf.pdf |
manufacturer |
Sourcefire Inc. |
SYSGO GmbH |
manufacturer_web |
https://www.sourcefire.com/ |
https://www.SYSGO.com |
security_level |
EAL2 |
EAL3+, ALC_FLR.3 |
dgst |
e53cc6b38f5c1c8c |
1168d0d6a313f497 |
heuristics/cert_id |
CCEVS-VR-0102-2005 |
BSI-DSZ-CC-1041-V2-2022 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
AVA_VAN.2, ALC_FLR.3 |
heuristics/extracted_versions |
3.2.3 |
4.2.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1041-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1041-2018 |
heuristics/scheme_data |
- category: Wireless Monitoring
- certification_date: 03.06.2005
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID4017
- product: Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000)
- scheme: US
- url: https://www.niap-ccevs.org/product/4017
- vendor: Sourcefire, Inc.
|
- category: Operating systems
- cert_id: BSI-DSZ-CC-1041-V2-2022
- certification_date: 07.03.2022
- enhanced:
- applicant: SYSGO GmbH Am Pfaffenstein 8 55270 Klein-Winternheim
- assurance_level: EAL3,ALC_FLR.3
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 07.03.2022
- description: The TOE is the PikeOS Separation Kernel version 4.2.2 running on the microprocessor family (x86 64-bit, ARMv7, or ARMv8) hosting different applications. The TOE is referenced as PikeOS 4.2.2 base product build S5400 for Linux and Windows development host with PikeOS 4.2.2 Certification Kit build S5400.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1041-V2-2022', 'description': 'is referenced as PikeOS 4.2.4 base product build S6120 for Linux and Windows development host with PikeOS 4.2.4 Certification Kit build S6120.'}), frozendict({'id': 'BSI-DSZ-CC-1041-2018-MA-01 (18.03.2019)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-1041-2018 (Ausstellungsdatum / Certification Date 10.12.2018, gültig bis / valid until 09.12.2023) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificat', 'description': 'Build'})]
- evaluation_facility: atsec information security GmbH
- expiration_date: 06.03.2027
- product: PikeOS Separation Kernel, 4.2.4
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1041V2b_pdf.pdf?__blob=publicationFile&v=3
- product: PikeOS Separation Kernel, 4.2.4
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Betriebssysteme/1041_1041V2.html
- vendor: SYSGO GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
809ce30fff5c61f3 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_v1.4.pdf |
{} |
pdf_data/cert_filename |
|
1041V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1041-V2-2022: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220311124753+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, BSI-DSZ-CC-1041-V2"
- /ModDate: D:20220311214111+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 4.2.4
- /Title: Certification Report BSI-DSZ-CC-1041-v2-2022
- pdf_file_size_bytes: 245703
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
ST_VID4017-VR.pdf |
1041V2a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-05-0102
- cert_item: Sourcefire, Incorporated Sourcefire Intrusion Detection System (NS 500, NS 1000, NS 2000, NS 2100, NS 3000, MC 1000, and MC 3000
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ALC_FLR.3
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1041-V2-2022
- cert_item: PikeOS Separation Kernel 4.2.4
- cert_lab: BSI
- developer: SYSGO GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1041-2018: 3
- BSI-DSZ-CC-1041-V2-2022: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 1
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.PROTCT: 1
- T:
- T.COMDIS: 1
- T.COMINT: 1
- T.EXPOSE: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NOHALT: 1
- T.PRIVIL: 1
- T.SCNCFG: 1
- T.SCNMLC: 1
- T.SCNVUL: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 4, 17.02.2022, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 25.01.2022, Master Document List, 16162-9101- MDL.xlsx: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Vicky Ashby
- /CreationDate: D:20050526141546-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20050526141623-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Validation Report for Sourcefire
- pdf_file_size_bytes: 384618
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220311124935+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SYSGO GmbH, PikeOS, Separation Kernel, BSI-DSZ-CC-1041-V2"
- /ModDate: D:20220314065024+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Zertifizierung, PikeOS Separation Kernel, Version 4.2.4
- /Title: Certification Report BSI-DSZ-CC-1041-v2-2022
- pdf_file_size_bytes: 387582
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
pdf_data/st_filename |
ST_VID4017-ST.pdf |
1041V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 6
- EAL 3 augmented: 2
- EAL 3+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 7
- ADO_IGS.1: 8
- ADV:
- ADV_FSP.1: 10
- ADV_HLD.1: 13
- ADV_RCR.1: 6
- AGD:
- AGD_ADM.1: 13
- AGD_USR.1: 11
- ATE:
- ATE_COV.1: 6
- ATE_FUN.1: 11
- ATE_IND.2: 9
- AVA:
- AVA_SOF.1: 8
- AVA_VLA.1: 11
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.2: 11
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 1
- FPT_ITC.1: 1
- FPT_ITI.2: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
|
- FDP:
- FDP_ACC: 31
- FDP_ACC.2: 13
- FDP_ACF: 31
- FDP_ACF.1: 28
- FDP_IFC.2: 8
- FDP_IFF.1: 11
- FIA:
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.3: 7
- FMT_MSA.3.1: 2
- FMT_MTD: 12
- FMT_MTD.1: 3
- FMT_SMF.1: 5
- FMT_SMR.1: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ASCOPE: 3
- A.DYNMIC: 3
- A.ITNET: 1
- A.LOCATE: 3
- A.MANAGE: 2
- A.NOEVIL: 3
- A.NOTRST: 2
- A.NOTRUST: 1
- A.PROTCT: 3
- O:
- O.ACCESS: 10
- O.AU: 1
- O.AUDITS: 10
- O.CREDEN: 4
- O.E: 2
- O.EADMIN: 6
- O.EXPORT: 4
- O.I: 2
- O.IDANLZ: 7
- O.IDAUTH: 21
- O.IDSCAN: 7
- O.IDSENS: 7
- O.INSTAL: 5
- O.INTEGR: 5
- O.INTROP: 4
- O.OFLOWS: 4
- O.PERSON: 6
- O.PHYCAL: 8
- O.PR: 1
- O.PROTCT: 10
- O.RESPON: 3
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.EXPOSE: 4
- T.FACCNT: 3
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 3
- T.IMPCON: 3
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.MISACT: 3
- T.MISUSE: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.SCNCFG: 3
- T.SCNMLC: 3
- T.SCNVUL: 3
|
- A:
- A.EXCLUSIVE_RESOURCES: 4
- A.HARDWARE: 3
- A.PHYSICAL: 4
- A.PRIVILEGED_EXECUTABLES: 4
- A.TRUSTWORTHY_PERSONNEL: 4
- OE:
- OE.EXCLUSIVE_RESOURCES: 3
- OE.HARDWARE: 2
- OE.PHYSICAL: 2
- OE.PRIVILEGED_EXECUTABLES: 3
- OE.TRUSTWORTHY_PERSONNEL: 3
- OT:
- OT.API_PROTECTION: 4
- OT.CONFIDENTIALITY: 7
- OT.INTEGRITY: 4
- OT.RESOURCE_AVAILABILITY: 7
- T:
- T.DEPLETION: 4
- T.DISCLOSURE: 4
- T.EXECUTION: 4
- T.MODIFICATION: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: CCTL
- /CreationDate: D:20050525111943-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20050525112204-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Sourcefire Security Target
- pdf_file_size_bytes: 1670374
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /Author: Dominic Eschweiler / Andreas Paukert
- /BuildID: S6120
- /Company:
- /CreationDate: D:20220126153000+01'00'
- /Creator: Acrobat PDFMaker 15 for Word
- /DOORS-Baseline: N.A.
- /DocID: 00101-8000-ST
- /Keywords:
- /ModDate: D:20220126153008+01'00'
- /Producer: Adobe PDF Library 15.0
- /Revision: 20.12
- /SourceModified: D:20220126142947
- /Status: App
- /Subject: PikeOS Separation Kernel v4.2.4
- /SupplierCode: N.A.
- /TemplateAuthor: HJT
- /TemplateDate: 2012-09-10
- /TemplateID: 00014-9102-BOOK_ENG
- /TemplateRevision: 01.3
- /Title: Security Target
- /Ziel: 4.2.4
- pdf_file_size_bytes: 465508
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |