name |
Tumbleweed Valicert Validation Authority Version 4.8, Hot Fix 3 (build 388) |
Canon iR3025/iR3030/iR3035/iR3045 Series HDD Data Erase Kit-B1 Version: 1.00 |
category |
Key Management Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
07.09.2012 |
07.10.2013 |
not_valid_before |
08.06.2006 |
26.12.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10010-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080310_c0136_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10010-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080310_c0136_est.pdf |
manufacturer |
Tumbleweed Communications Corp. |
Canon Inc. |
manufacturer_web |
https://www.axway.com |
https://www.canon.com/ |
security_level |
EAL3 |
EAL3 |
dgst |
f46670d8bfd6d52f |
72fee335b0e807c6 |
heuristics/cert_id |
CCEVS-VR-0028-2006 |
JISEC-CC-CRP-C0136 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
4.8 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0136
- certification_date: 01.12.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0136_eimg.pdf
- description: PRODUCT DESCRIPTION This product is software to be installed and used on the Canon multifunction product series iR3025/iR3030/iR3035/iR3045. The Canon iR3025/iR3030/iR3035/iR3045 series is a digital copier that offers a variety of functions including Copy, Send (Universal Send), Fax Reception, Mail Box, Print, and so on. It is also equipped with a large-capacity HDD and temporarily stores image data created during copying, printing, and other document handling operations on the HDD. In most standard multifunction products, such temporary image data is deleted only logically after use, i.e., upon completion of copying or printing, and residual information of deleted image data is not erased at all, being left exposed to the risk of reuse. The TOE is used for protecting any residual information of temporary image data from being reused.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Canon iR3025/iR3030/iR3035/iR3045 Series HDD Data Erase Kit-B1
- product_type: IT Product (data erase function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0136_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0136_est.pdf
- toe_version: Version 1.00
- vendor: Canon Inc.
- expiration_date: 01.10.2013
- supplier: Canon Inc.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0136_it7156.html
- toe_overseas_name: Canon iR3025/iR3030/iR3035/iR3045 Series HDD Data Erase Kit-B1 Version 1.00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10010-vr.pdf |
20080310_c0136_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-06-0028
- cert_item: Tumbleweed Valicert Validation Authority Version 4.8
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0136-01: 1
- Certification No. C0136: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 1
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.2: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 1
- AVA_SOF.1: 1
- AVA_VLA.1: 1
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_GEN.2: 2
- FAU_SAR.1: 1
- FAU_SAR.3: 1
- FAU_SEL.1: 2
- FAU_STG.1: 2
- FAU_STG.4: 1
- FCO:
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_CKM_CIMC.5: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_ACF_CIMC.2: 2
- FDP_CIMC_BKP.1: 1
- FDP_CIMC_CER.1: 1
- FDP_CIMC_CRL.1: 1
- FDP_CIMC_CSE.1: 1
- FDP_CIMC_OCSP.1: 1
- FDP_ITT.1: 2
- FDP_UCT.1: 2
- FIA:
- FIA_ATD.1: 2
- FIA_UAU.1: 2
- FIA_UID.1: 2
- FIA_USB.1: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MOF_CIMC.2: 1
- FMT_MOF_CIMC.4: 1
- FMT_MOF_CIMC.6: 1
- FMT_MSA.1: 2
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_MTD_CIMC.4: 2
- FMT_SMR.2: 2
- FPT:
- FPT_AMT.1: 1
- FPT_ITC.1: 2
- FPT_ITT.1: 2
- FPT_RVM.1: 2
- FPT_SEP.1: 1
- FPT_STM.1: 1
- FPT_TST_CIMC.2: 1
- FPT_TST_CIMC.3: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.ADMIN_PWD: 1
- A.NETWORK: 1
- T:
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-1: 9
- FIPS 180-2: 2
- FIPS 186-2: 2
- FIPS 46-3: 2
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Bradford O'Neill
- /CreationDate: D:20060713091647-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20060713091732-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Tumbleweed Valicert VA VR
- pdf_file_size_bytes: 486056
- pdf_hyperlinks: http://www.sans.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /CreationDate: D:20080307122247+09'00'
- /ModDate: D:20080307122247+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 290251
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
st_vid10010-st.pdf |
20080310_c0136_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 2
- EAL 1 augmented: 1
- EAL 3: 12
- EAL1: 1
- EAL1 augmented: 1
- EAL3: 4
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP: 1
- ACM_CAP.3: 17
- ACM_SCP: 1
- ACM_SCP.1: 5
- ADO:
- ADO_DEL: 1
- ADO_DEL.1: 6
- ADO_IGS: 1
- ADO_IGS.1: 6
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 9
- ADV_HLD: 1
- ADV_HLD.2: 14
- ADV_RCR: 1
- ADV_RCR.1: 5
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 12
- AGD_USR: 1
- AGD_USR.1: 10
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.2: 6
- ATE_DPT: 1
- ATE_DPT.1: 5
- ATE_FUN: 1
- ATE_FUN.1: 11
- ATE_IND: 1
- ATE_IND.2: 8
- AVA:
- AVA_MSU: 1
- AVA_MSU.1: 10
- AVA_SOF: 1
- AVA_SOF.1: 8
- AVA_VLA: 1
- AVA_VLA.1: 9
|
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 4
- ADV_HLD.2: 3
- ADV_RCR.1: 4
- AGD:
- AGD_ADM.1: 4
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 4
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 6
- FAU_GEN.2.1: 2
- FAU_SAR.1: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 2
- FAU_SAR.3.1: 1
- FAU_SEL.1: 6
- FAU_SEL.1.1: 2
- FAU_STG.1: 8
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FAU_STG.4: 6
- FAU_STG.4.1: 2
- FCO:
- FCO_NRO_CIMC.3: 4
- FCO_NRO_CIMC.3.1: 1
- FCO_NRO_CIMC.3.2: 1
- FCO_NRO_CIMC.3.3: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_CKM_CIMC.5: 4
- FCS_CKM_CIMC.5.1: 1
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 7
- FDP_ACC.1.1: 2
- FDP_ACF.1: 6
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ACF_CIMC.2: 6
- FDP_ACF_CIMC.2.1: 1
- FDP_ACF_CIMC.2.2: 1
- FDP_ACF_CIMC.3: 1
- FDP_CIMC_BKP.1: 4
- FDP_CIMC_BKP.1.1: 1
- FDP_CIMC_BKP.1.2: 1
- FDP_CIMC_BKP.1.3: 1
- FDP_CIMC_BKP.1.4: 1
- FDP_CIMC_CER.1: 5
- FDP_CIMC_CER.1.1: 1
- FDP_CIMC_CER.1.2: 1
- FDP_CIMC_CER.1.3: 1
- FDP_CIMC_CER.1.4: 1
- FDP_CIMC_CRL.1: 4
- FDP_CIMC_CRL.1.1: 1
- FDP_CIMC_CSE.1: 4
- FDP_CIMC_CSE.1.1: 1
- FDP_CIMC_OCSP.1: 4
- FDP_CIMC_OCSP.1.1: 1
- FDP_ETC_CIMC.4: 2
- FDP_ITC.1: 1
- FDP_ITT.1: 8
- FDP_ITT.1.1: 4
- FDP_UCT.1: 7
- FDP_UCT.1.1: 2
- FIA:
- FIA_ATD.1: 11
- FIA_ATD.1.1: 2
- FIA_UAU.1: 7
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_USB.1: 6
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 2
- FMT_MOF_CIMC.2: 6
- FMT_MOF_CIMC.2.1: 1
- FMT_MOF_CIMC.2.2: 1
- FMT_MOF_CIMC.3: 1
- FMT_MOF_CIMC.4: 6
- FMT_MOF_CIMC.4.1: 1
- FMT_MOF_CIMC.4.2: 1
- FMT_MOF_CIMC.5: 1
- FMT_MOF_CIMC.6: 6
- FMT_MOF_CIMC.6.1: 1
- FMT_MOF_CIMC.6.2: 1
- FMT_MOF_CIMC.6.3: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 2
- FMT_MSA.3: 2
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_MTD_CIMC.4: 5
- FMT_MTD_CIMC.4.1: 1
- FMT_MTD_CIMC.5: 1
- FMT_MTD_CIMC.6: 1
- FMT_SMF.1: 1
- FMT_SMR.2: 11
- FMT_SMR.2.1: 2
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 2
- FPT:
- FPT_AMT.1: 2
- FPT_AMT.1.1: 1
- FPT_ITC.1: 6
- FPT_ITC.1.1: 2
- FPT_ITT.1: 8
- FPT_ITT.1.1: 4
- FPT_RVM: 1
- FPT_RVM.1: 5
- FPT_RVM.1.1: 2
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 3
- FPT_STM.1.1: 1
- FPT_TST_CIMC.2: 4
- FPT_TST_CIMC.2.1: 1
- FPT_TST_CIMC.2.2: 1
- FPT_TST_CIMC.3: 4
- FPT_TST_CIMC.3.1: 1
- FPT_TST_CIMC.3.2: 1
|
- FDP:
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN: 3
- A.ADMIN_PWD: 1
- A.NETWORK: 4
- A.PWD_MANAGE: 1
- O:
- O.ADMIN_AUTH: 4
- O.AUTH_BOX: 1
- O.RESIDUAL: 5
- OE:
- OE.ADMIN: 2
- OE.ADMIN_PWD: 2
- OE.NETWORK: 2
- T:
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-1: 29
- FIPS 186-2: 2
- FIPS 198: 1
- FIPS 46-3: 2
- PKCS:
- RFC:
- RFC 2560: 3
- RFC 3280: 1
- RFC2459: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: SAIC CCTL IA Team
- /CreationDate: D:20060713092221-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20060713092902-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Subject: Security Target
- /Title: Tumbleweed Valiant Validation Authority Security Target
- pdf_file_size_bytes: 1468327
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
- /CreationDate: D:20080307122051+09'00'
- /ModDate: D:20080307122051+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 322243
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |