name |
Logiciel embarqué dans les équipements NOKIA 1830 Photonic Service Switch en configuration PSS/32 et PSS/8 v.9.1.0, build 14.28-40 |
Virtual Machine of ID Motion V1 G231 mask with AMD 122v1 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
09.10.2022 |
01.09.2019 |
not_valid_before |
09.10.2017 |
29.03.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_58fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_11_fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_58en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible-2013_11en.pdf |
manufacturer |
Nokia Corporation |
Gemalto / Trusted Labs |
manufacturer_web |
https://www.nokia.com/ |
https://www.gemalto.com |
security_level |
AVA_VAN.3, EAL3+, ALC_FLR.3 |
EAL7 |
dgst |
ee2bac3bc365da40 |
32f420aa3f6ca59c |
heuristics/cert_id |
ANSSI-CC-2017/58 |
ANSSI-CC-2013/11 |
heuristics/cert_lab |
AMOSSYS |
[] |
heuristics/cpe_matches |
cpe:2.3:h:nokia:1830_photonic_service_switch-32:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.3, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_FLR.3, ALC_DVS.1, ASE_REQ.2, ADV_TDS.2, ALC_CMS.3, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ADV_FSP.3, ASE_OBJ.2, AVA_VAN.3, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_LCD.1 |
ATE_DPT.4, ALC_LCD.2, ADV_IMP.2, ATE_COV.3, ALC_TAT.3, AVA_VAN.5, ADV_INT.3, ADV_SPM.1, ALC_CMC.5, ADV_FSP.6, ADV_TDS.6, ATE_FUN.2, ADV_COMP.1, ALC_DVS.2 |
heuristics/extracted_versions |
9.1.0, 14.28 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2012/85 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, ANSSI-CC-2012/85, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0606-2010 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0606-2010 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
anssi-cc-2017_58fr.pdf |
ANSSI-CC-2013_11_fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 3 augmenté ALC_FLR.3, AVA_VAN.3
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/58
- cert_item: Logiciel embarqué dans les équipements NOKIA 1830 Photonic Service Switch en configuration PSS/32 et PSS/8
- cert_item_version: Version 9.1.0, build 14.28-40
- cert_lab: Amossys 4 bis allée du bâtiment, 35000 Rennes, France
- developer: NOKIA Route de villejust, 91602 Nozay, France Commanditaire NOKIA Route de villejust, 91602 Nozay, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Aucune
|
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2012/85: 5
- ANSSI-CC-2013/11: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 2
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL3: 2
- EAL4: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 3
- EAL4: 2
- EAL7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: torno
- /CreationDate: D:20130304090501+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20130304090501+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: ANSSI-CC-2013_11_fr
- pdf_file_size_bytes: 166636
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
anssi-cible-cc-2017_58en.pdf |
anssi-cc-cible-2013_11en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0606-2010: 8
- BSI-DSZ-CC-0640-2010: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 3
- EAL3+: 66
- EAL4+: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 5
- AVA_VAN.4: 2
|
- ADV:
- ADV_COMP.1: 1
- ADV_FSP.6: 2
- ADV_IMP.2: 2
- ADV_INT.3: 2
- ADV_SPM.1: 2
- ADV_TDS.6: 2
- ALC:
- ALC_CMC.5: 2
- ALC_DVS.2: 2
- ALC_LCD.2: 2
- ALC_TAT.3: 2
- ATE:
- ATE_COV.3: 2
- ATE_DPT.4: 2
- ATE_FUN.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAA.1: 6
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_STG: 3
- FAU_STG_EXT: 1
- FAU_STG_EXT.1: 11
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.3: 10
- FAU_STG_EXT.3.1: 2
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 16
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 16
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 7
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 15
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.3: 5
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TUD_EXT: 4
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_AFL.1: 1
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
|
- FAU:
- FAU_ACC.2: 1
- FAU_ARP: 3
- FAU_ARP.1: 4
- FAU_ARP.1.1: 1
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 5
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 4
- FDP_ACC.2: 6
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 9
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 3
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 3
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_TST.2: 1
- FRU:
- FRU_FLT.2: 1
- FRU_RSA: 3
- FRU_RSA.1: 4
- FRU_RSA.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.ALARM: 1
- O.AUDIT: 4
- O.MANAGEMENT: 1
- O.RESIDUAL_INFO_CLEARING: 1
- O.SELF_TEST: 1
- OE:
|
- A:
- A.APPLI_CONT: 1
- A.CIPHER: 1
- A.CLON: 1
- A.DECIPHER: 1
- A.DIS_MEMORY: 1
- A.LOAD: 2
- A.MOD_MEMORY: 1
- A.OPERATE: 1
- A.REMOVE: 1
- A.SECURITY: 2
- A.SIDE: 1
- A.TAMPER_ES: 2
- O:
- O.APPLI_DEV: 3
- O.CIPHER: 1
- O.DECIPHER: 1
- O.DEV_DIS_ES: 4
- O.DLV_DATA: 4
- O.EFECT_REMOVE: 1
- O.EFFECT_LOAD: 3
- O.EFFECT_REMOVE: 3
- O.FLAW: 1
- O.INIT_ACS: 3
- O.LOAD: 2
- O.REMOVE: 1
- O.RESOURCE: 3
- O.RND: 1
- O.ROLLBACK: 2
- O.SAMPLE_ACS: 1
- O.SECURITY: 1
- O.SEGREGATE: 3
- O.SIDE: 3
- O.TAMPER_ES: 5
- OSP:
- OSP.CIPHER: 1
- OSP.CONF-ALU: 1
- T:
- T.APP_CORR: 3
- T.APP_DISC: 3
- T.APP_MOD: 4
- T.APP_READ: 3
- T.APP_REMOVE: 4
- T.DEL_REMOVE: 4
- T.DIS_DATA: 6
- T.DIS_TEST_ES: 2
- T.ERR_REMOVE: 3
- T.LOAD_APP: 4
- T.LOAD_MAN: 2
- T.LOAD_MOD: 2
- T.LOAD_OTHER: 2
- T.MOD: 2
- T.MOD_DATA: 4
- T.MOD_EXE: 4
- T.MOD_LOAD: 2
- T.MOD_SHARE: 2
- T.MOD_TSF: 3
- T.RESOURCES: 2
- T.RND: 1
- T.T_CMD: 4
- T.T_ES: 2
- T.T_TOOLS: 2
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies: 5
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 1
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS PUB 140-2: 1
- NIST:
- RFC:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- for secure loading and execution of smartcard applications. Note that cryptographic primitives are out of scope. 1.5.4 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
- out of scope: 3
- the other subsystems of the MULTOS OS and some following ROMed applications (these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA) v1.0: 1
- these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 12 shows how these security functions satisfy the TOE security functional requirements. 7.1: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20170927114227+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20171011102035+02'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 1490065
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 66
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |