name |
Tutus Farist 2.5.2 and 2.5.2-R |
Data Security Kit (E) Software Type III V1.00J |
category |
Boundary Protection Devices and Systems |
Other Devices and Systems |
scheme |
SE |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.10.2015 |
not_valid_before |
28.02.2008 |
28.09.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_CR2006001_Farist.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0270_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_ST2006001_Farist.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0270_est.pdf |
manufacturer |
Tutus Data AB |
KYOCERA MITA Corporation |
manufacturer_web |
https://www.tutus.se/ |
https://www.kyoceramita.com/ |
security_level |
EAL4+, ALC_FLR.1 |
EAL3 |
dgst |
fc01c4e211045790 |
eed9cf5e0da9753a |
heuristics/cert_id |
CSEC2006001 |
JISEC-CC-CRP-C0270 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, ASE_TSS.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
2.5.2 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0270
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0270_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 300i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Data Security Kit (E) Software Type III
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0270_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0270_est.pdf
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2015
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0270_it9267.html
- toe_japan_name: Data Security Kit (E) Software Type III V1.00J
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
20080527_CR2006001_Farist.pdf |
c0270_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0270-01: 1
- Certification No. C0270: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL4: 4
- EAL4 augmented: 1
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.AUTKEY: 1
- A.GENPUR: 1
- A.NOEMA: 1
- A.NOEVIL: 1
- A.PEERTRUST: 1
- A.PHYSEC: 1
- A.RELHARD: 1
- A.SINGE: 1
- A.SINGI: 2
|
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Ansvarigt Område/enhet: VG CSEC
- /Author: Jerry jyjoh Johansson
- /C-datum: 2005
- /CreationDate: D:20080328134755+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 för Word
- /DDocBinder: Scheme (CB)
- /DDocCabinet: QMS
- /DDocID: 2005-03-05-82BA-PLUF
- /DDocLastModDate: 2005-10-25 14:00:22
- /DDocLibrary: https://haddock.fmv.se/domdoc/cseclib.nsf
- /DDocRevision: 1,0
- /DDocTitle: 015 Certification Report - Template
- /Datum, skapat: -
- /Deluppdragsbenämning:
- /Dokumentansvarig: Jerry jyjoh Johansson
- /Dokumentansvarigs enhet: KC Ledsyst
- /Dokumentbeteckning: 25 550:46 569/2007
- /Dokumentdatum: 2007-10-30
- /Dokumenttitel: Certification Report - Färist 2.5.2-RELEASE
- /Dokumenttyp: ANVISNING
- /FMV_beteckning: 575/2005
- /Fastställarens roll: Technical Manager
- /Fastställt av: Dag Ströman
- /Giltigt från: -
- /Informationsklass:
- /Klassificeringsnr: 25 550
- /Mallversion: 2.0
- /ModDate: D:20080328134938+01'00'
- /Producer: Acrobat Elements 7.0.5 (Windows)
- /Referens ID: CB-015
- /Sekr. gäller tom.: -
- /SourceModified: D:20080328124628
- /Title: 015 Certification Report - Template
- /Uppdragsbenämning:
- /Utgåva: 1.0
- pdf_file_size_bytes: 186522
- pdf_hyperlinks: http://www.iso.ch/
- pdf_is_encrypted: True
- pdf_number_of_pages: 24
|
- /CreationDate: D:20101215173706+09'00'
- /ModDate: D:20101215173706+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 185883
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
pdf_data/st_filename |
20080527_ST2006001_Farist.pdf |
c0270_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 4+: 2
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 1
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 5
- ACM_CAP.4: 5
- ACM_SCP.2: 5
- ADO:
- ADO_DEL.2: 5
- ADO_IGS.1: 5
- ADV:
- ADV_FSP.2: 5
- ADV_HLD.2: 5
- ADV_IMP.1: 5
- ADV_LLD.1: 5
- ADV_RCR.1: 5
- ADV_SPM.1: 5
- AGD:
- AGD_ADM.1: 5
- AGD_USR.1: 5
- ALC:
- ALC_DVS.1: 5
- ALC_FLR.1: 10
- ALC_LCD.1: 5
- ALC_TAT.1: 5
- ASE:
- ATE:
- ATE_COV.2: 5
- ATE_DPT.1: 5
- ATE_FUN.1: 5
- ATE_IND.2: 5
- AVA:
- AVA_MSU.2: 9
- AVA_SOF.1: 5
- AVA_VLA.2: 6
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 15
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FCO:
- FCO_NRO.1: 9
- FCO_NRO.1.1: 2
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 66
- FCS_CKM.1: 16
- FCS_CKM.1.1: 4
- FCS_CKM.2: 13
- FCS_CKM.2.1: 5
- FCS_CKM.4: 26
- FCS_COP: 81
- FCS_COP.1: 5
- FCS_COP.1.1: 9
- FDP:
- FDP_ACC.1: 1
- FDP_ACC.2: 11
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 17
- FDP_IFC.1: 4
- FDP_IFC.1.1: 2
- FDP_IFF: 17
- FDP_IFF.1: 3
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_IFF.1.6: 2
- FDP_ITC.1: 15
- FDP_ITC.2: 13
- FDP_RIP.2: 10
- FDP_RIP.2.1: 1
- FDP_SDI.1: 6
- FDP_SDI.1.1: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID.1: 2
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 24
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 8
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_RVM.1.1: 1
|
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHKEY: 1
- A.AUTKEY: 4
- A.GENPUR: 2
- A.K: 1
- A.NOEMA: 2
- A.NOEVIL: 11
- A.PEERTRUST: 3
- A.PHYSEC: 13
- A.RELHARD: 2
- A.SINGE: 3
- A.SINGI: 3
- O:
- O.ATISRC: 6
- O.AUDIT: 5
- O.DISCLOS: 1
- O.DISCLOSE: 4
- O.IDAUTH: 5
- O.LIMEXT: 4
- O.MEDIAT: 5
- O.MODIFY: 4
- O.REMOTE: 5
- O.SECSTA: 4
- O.SELPRO: 5
- OE:
- OE.AUDIT: 5
- OE.AUTKEY: 4
- OE.FILESEC: 4
- OE.GENPUR: 3
- OE.NOEMA: 3
- OE.NOEVIL: 5
- OE.PEERTRUST: 4
- OE.PHYSEC: 7
- OE.RELHARD: 5
- OE.RESID: 5
- OE.SINGE: 3
- OE.SINGI: 3
- OE.TIME: 4
- T:
- T.ASPOOF: 3
- T.DISCLOSE: 2
- T.INISEC: 3
- T.MEDIAT: 2
- T.MODIFY: 3
- T.NOAUTH: 3
- T.REMOTE: 3
- T.SELPRO: 2
- T.TIME: 4
- T.USEACC: 2
|
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA: 2
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-01-004: 1
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- FIPS 180-2: 1
- FIPS180-2: 1
- ISO:
- RFC:
- RFC 1035: 1
- RFC 1869: 1
- RFC 1870: 1
- RFC 1891: 1
- RFC 2069: 1
- RFC 2246: 9
- RFC 2401: 1
- RFC 2404: 1
- RFC 2406: 2
- RFC 2451: 1
- RFC 2616: 1
- RFC 3602: 2
- RFC 3768: 1
- RFC 4301: 2
- RFC 4346: 4
- RFC 821: 1
- RFC 959: 1
- RFC4346: 1
- RFC821: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20071128174552+01'00'
- /Creator: Writer
- /Producer: OpenOffice.org 2.0
- /Title: Security Target
- pdf_file_size_bytes: 729763
- pdf_hyperlinks: http://www.tutus.se/
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20101129105019+09'00'
- /Creator: CubePDF
- /ModDate: D:20101129105019+09'00'
- /Producer: CubePDF
- /Title: Data Security Kit (E) Software Type III Japan Security Target
- pdf_file_size_bytes: 325114
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |