name |
BooleBox On Premises V 4.2 |
SECIRON – Android mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 |
category |
Data Protection |
Mobility |
scheme |
IT |
MY |
status |
active |
active |
not_valid_after |
23.04.2025 |
06.02.2029 |
not_valid_before |
23.04.2020 |
06.02.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C129-CERTIFICATE-v1.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_boolebox_42_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C129-CR-v1a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_boolebox_42_v1.5.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SECIRON%20–%20Android%20Mobile%20Application%20Hardening%20Sandbox%20Module%20(AMAHSM)%20version%207.0-Security%20Target-1.0.pdf |
manufacturer |
Boole Server S.r.l. |
SecIron (Malaysia) Sdn. Bhd. |
manufacturer_web |
https://www.booleserver.com/ |
https://www.seciron.com |
security_level |
EAL2+, ALC_FLR.2 |
EAL2 |
dgst |
efccd1dfa8e8195d |
17bfc3f4edcb545c |
heuristics/cert_id |
OCSI/CERT/IMQ/06/2018/RC |
ISCB-3-RPT-C129-CR-v1a |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.2 |
7.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
ISCB-5-CERT-C129-CERTIFICATE-v1.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20240222045557Z00'00'
- /Creator: Word
- /ModDate: D:20240222045557Z00'00'
- /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
- /Title: ISCB-5-CERT-C129-CERTIFICATE-v1
- pdf_file_size_bytes: 829372
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
rc_boolebox_42_v1.0.pdf |
ISCB-3-RPT-C129-CR-v1a.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- IT:
- OCSI/CERT/IMQ/06/2018/RC: 27
|
- MY:
- ISCB-5-RPT-C129-CR-v1a: 30
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: OCSI
- /CreationDate: D:20200422093535+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20200423165945+00'00'
- /Producer: Modified using InfoCert Dike
- /Subject: ---
- /Title: Rapporto di Certificazione del prodotto “BooleBox On Premises V Ѐ⸂”
- pdf_file_size_bytes: 623576
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /CreationDate: D:20240222044408Z00'00'
- /Creator: Word
- /ModDate: D:20240222044408Z00'00'
- /Producer: macOS Version 11.7.10 (Build 20G1427) Quartz PDFContext
- /Title: ISCB-3-RPT-C129-CR-v1a
- pdf_file_size_bytes: 1100872
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
st_boolebox_42_v1.5.pdf |
SECIRON – Android Mobile Application Hardening Sandbox Module (AMAHSM) version 7.0-Security Target-1.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 1
- EAL2+: 3
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FDP:
- FDP_ACC.1: 26
- FDP_ACC.1.1: 3
- FDP_ACF: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 6
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 22
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 7
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 7
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_XXX.1: 1
- FIA_XXX.1.1: 2
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 15
- FMT_MSA.1.1: 3
- FMT_MSA.3: 18
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_PSE.1: 7
- FPR_PSE.1.1: 1
- FPR_PSE.1.2: 1
- FPR_PSE.1.3: 1
- FPR_UNO.1: 7
- FPR_UNO.1.1: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TEE: 2
- FPT_TEE.1: 7
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FTP:
- FTP_ITC.1: 3
- FTP_TRP.1: 3
|
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP.1: 8
- FCS_COP.1.1: 2
- FDP:
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FPT:
- FPT_ITT.1: 6
- FPT_ITT.1.1: 3
- FPT_ITT.3: 4
- FPT_ITT.3.1: 1
- FPT_ITT.3.2: 1
- FPT_STM.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ALIGNEDBACKUPS: 2
- A.ASSUMPTION: 1
- A.CERTIFICATE: 3
- A.DBMS_ACCESS: 3
- A.DOC_ACCESS: 2
- A.OS_ACCESS: 2
- A.OS_RESTRICT: 3
- A.SECCOMM: 3
- A.STORAGE_ACCESS: 3
- A.TIME: 3
- A.TOE_EVALUATED: 2
- A.TRAINING: 2
- A.TRUST: 3
- A.UPDATE: 2
- O:
- O.ACCESS: 13
- O.ANTI_BRUTE: 9
- O.AUDIT: 7
- O.AUDIT_PROT: 4
- O.CONFIDENTIAL: 3
- O.CONFIG: 7
- O.CRYPTO: 10
- O.IDENTIFY: 15
- O.INTEGRITY: 5
- O.MANAGE: 7
- O.OTP: 5
- O.PRIVACY: 4
- O.STRONG_PERSONALKEY: 6
- O.USER: 6
- OE:
- OE.ALIGNEDBACKUP: 6
- OE.AUDIT: 5
- OE.AUDIT_PROTECT: 1
- OE.BACKUP: 1
- OE.CERTIFICATE: 4
- OE.CONTINUITY: 3
- OE.CRYPTO: 8
- OE.DB: 3
- OE.DOC: 4
- OE.IDENTIFY: 6
- OE.INTEGRITY: 4
- OE.LOG_STORE: 4
- OE.PERSONALKEY: 4
- OE.PHYSICAL_ACCESS: 6
- OE.SO: 8
- OE.STAFF: 18
- OE.STORAGE: 3
- OE.TIME: 8
- T:
- T.CONFIDENTIALITY: 2
- T.CONFIG: 3
- T.CRASH: 1
- T.EXHAUST: 3
- T.INSTALL: 2
- T.INTEGRITY: 3
- T.INTERCEPT: 2
- T.INTERR: 2
- T.KEY_ACCESS: 2
- T.KEY_GUESS: 3
- T.LOSSOF: 3
- T.MASQUERADE: 3
- T.NOTRACE: 2
- T.PRIVACY: 2
- T.PRIVIL: 1
- T.REPLAY: 3
- T.SCREEN: 3
- T.THREAT: 1
|
- A:
- O:
- O.DATA: 5
- O.LOGS: 4
- O.TAMPER: 4
- OE:
- T:
- T.DATA: 2
- T.LOGS: 3
- T.TAMPER: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-256: 10
- AES256: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
|
- FIPS:
- FIPS 180-4: 1
- FIPS 186-5: 1
- FIPS 197: 2
- FIPS PUB 197: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. See Table 18: file sharing permissions configurable in a sharing template [142] Guest (G) Guest: 1
- activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. The Windows OS is indispensable on the END USER side in order to use this security function. [22: 1
- and editable only in their BooleBox storage. [25] Watermark With BooleBox users can protect their confidential documents and the intellectual property of their shared files through an indelible watermark displaying key: 1
- confidential information through e-mail in total security. With BooleBox it is possible to attach confidential documents to e-mails with the assurance that no one can intercept since the email message itself is: 1
|
- OutOfScope:
- 2, or FCS_COP.1 FCS_CKM.4 Yes (FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1) No - FCS_CKM.4 is not: 1
- FCS_COP.1) No - FCS_CKM.4 is not applicable as key management is out of scope FCS_COP.1 FDP_ITC.1, or FDP_ITC.2, or FCS_CKM.1 FCS_CKM.4 Yes (FCS_CKM.1: 1
- as key management is out of scope FPT_ITT.1 - - - FPT_ITT.3 FPT_ITT.1 Yes - FAU_GEN.1 FPT_STM.1 No The timestamp is provided by the: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: Boole Server S.r.l.
- /CreationDate: D:20200507102310Z00'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20200507102310Z00'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Title: BooleBox on Premises v4.2 Security Target v1.5
- pdf_file_size_bytes: 2607031
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
- /Author: wlim
- /CreationDate: D:20231228204556+08'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20231228204556+08'00'
- /Producer: Microsoft® Word 2021
- /Subject: SECIRON – Android Mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 Security Target
- /Title: SECIRON – Android Mobile Application Hardening Sandbox Module (AMAHSM) version: 7.0 Security Target
- pdf_file_size_bytes: 641532
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |