| name |
Rambus PKE4 Core version 4.1 |
Web Bytes Xilnex Framework version 3.0 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
| scheme |
NL |
MY |
| status |
active |
archived |
| not_valid_after |
11.12.2028 |
16.02.2017 |
| not_valid_before |
11.12.2023 |
16.02.2012 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CERT.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C030-CR-v1a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-LITE]%20Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Web%20Bytes%20EAL1%20Security%20Target%20(Xilnex%20Framework)%20v1.1.pdf |
| manufacturer |
Rambus Inc. |
Web Bytes Sdn Bhd |
| manufacturer_web |
https://www.rambus.com/ |
https://www.webbytes.com.my |
| security_level |
EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
EAL1 |
| dgst |
505cf4bb7f73e46d |
0136a64efd2140e4 |
| heuristics/cert_id |
NSCIB-CC-0503107-CR |
ISCB-5-RPT-C030-CR-v1a |
| heuristics/cert_lab |
|
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, ATE_COV.2, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
4.1 |
3.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
- cert_no: 2012-002-C030
- certification_date: 16.02.2012
- developer: Web Bytes Sdn Bhd
- enhanced:
- assurance_level: EAL1
- category: Other Devices and Systems
- cert_id: C030
- certification_date: 16.02.2012
- developer: Ooi Boon-Sheng Unit 1-2-33, Kompleks Mayang Mall,Jalan Mayang Pasir 1,11950 Bayan Baru,Pulau Pinang MALAYSIA URL: http://www.webbytes.com.myEmail: [email protected]:+ 6012 472 9615Fax:+ 604 611 0162
- expiration_date: 16.02.2017
- mutual_recognition: CCRA
- product: Web Bytes Xilnex Framework version 3.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C030/ISCB-5-RPT-C030-CR-v1a.pdf
- scope: Web Bytes Xilnex Framework Version 3.0 is a distribution and synchronization platform which distributes subscribed applications to multiple clients as well performs data synchronisation between all the clients in the same group. The TOE comprises of two primary components as follows: Client Software. The client software that installs directly on each user's PC which operates the daily process and update based on the user activities. Server Software. The server software that extends client software with secure communication, identification and authentication, and data synchronization. The security functions that the TOE provides include the following: Secure Transmission – All communications between the server and the client is through an SSL channel. It protects the user data from disclosure and modification. Access control – The TOE allows users to launch only the applications they subscribed to as well as accessing the database. The TOE will check the user ID and their organization ID to ensure the applications that the user is allowed to run. Identification and Authentication – Users will have to present their credentials to the server for identification and authentication before the user is allowed to launch the applications and access the user data at the backend and at the local cache. Encryption – Username and passwords are always hashed when they are being stored into the database and during authentication. Management – The TOE contains various management functions to ensure efficient and secure management of the TOE. The TOE maintains two roles, users and administrator, to ensure that the functions are restricted to only the TOE administrator.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C030/Web%20Bytes%20EAL1%20Security%20Target%20(Xilnex%20Framework)%20v1.1.pdf
- type: Distribution and synchronization platform
- expiration_date: 16.02.2017
- level: EAL1
- product: Web Bytes Xilnex Framework version 3.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/152
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
NSCIB-CC-0503107-CERT.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.3: 2
- ATE:
- AVA:
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: kruitr
- /CreationDate: D:20231220083238+01'00'
- /Creator: Bullzip PDF Printer (11.10.0.2761)
- /ModDate: D:20231220083308+01'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-0503107-CERT.doc
- pdf_file_size_bytes: 266966
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
NSCIB-CC-0503107-CR.pdf |
ISCB-5-RPT-C030-CR-v1a.pdf |
| pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-0503107-CR
- cert_item: PKE4 Core version 4.1
- cert_lab: SGS Brightsight B.V.
- developer: Rambus Inc
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- MY:
- ISCB-5-RPT-C030-CR-v1a: 29
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 6
- EAL4 augmented: 3
- EAL4+: 7
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_ITT.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
- Curve:
- Edwards:
- NIST:
- NIST P-192: 2
- NIST P-224: 2
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-192: 2
- P-224: 2
- P-256: 2
- P-384: 2
- P-521: 2
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Fault Injection: 1
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 2
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename |
[ST-LITE] Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf |
Web Bytes EAL1 Security Target (Xilnex Framework) v1.1.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 10
- EAL4 augmented: 2
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 3
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_DPT.2: 7
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.1: 2
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 34
- FCS_CKM.1: 17
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 16
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 30
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 6
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FMT:
- FPT:
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 10
- FPT_ITT.1.1: 1
- FRU:
- FRU_FLT.2: 11
- FRU_FLT.2.1: 1
|
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.2: 2
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP: 11
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 4
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
|
- OE:
- OE.ADMIN: 1
- OE.CERTIFICATES: 1
- OE.DATABASE: 1
- OE.ENVIRONMENT: 1
- OE.INSTALL: 1
- OE.NETWORK: 1
- OE.PHYSICAL: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- Curve:
- Edwards:
- NIST:
- NIST P-192: 6
- NIST P-224: 5
- NIST P-256: 6
- NIST P-384: 6
- NIST P-521: 6
- P-192: 6
- P-224: 5
- P-256: 6
- P-384: 6
- P-521: 6
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Fault Injection: 1
- fault injection: 1
- malfunction: 1
- SCA:
- DPA: 3
- SPA: 1
- side channel: 1
- side-channel: 6
- template attacks: 1
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-0004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 6
- FIPS PUB 140-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 5639: 5
- RFC 7748: 4
- RFC 8032: 5
|
- FIPS:
- FIPS 140-1: 1
- FIPS 180-2: 2
- FIPS140-1: 1
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
- curves:
- SM2: 16
- X25519: 1
- X448: 1
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- 240 in [PP] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE 241 in [PP] This refinement refers to downloading of embedded software. This refinement: 1
- This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP] This refinement is applicable without any adjustments. Guidance documents: 1
- contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP] The ST redefines this refinement as follows. The Functional Specification: 1
- in [PP] This refinement is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP] This refinement is out of scope: 1
- mechanisms. 218 in [PP] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP] This refinement is applicable without any adjustments. It must be: 1
- must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP] This refinement relates to physical testing. This refinement is out of: 1
- out of scope: 12
- out of scope for the TOE. AVA_VAN 245 in [PP] The ST redefines this refinement as follows. The vulnerability: 1
- related to the development and production of the TOE. ALC_CMS 199 in [PP] This refinement is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
- to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP] This refinement refers to features that do not provide functionality but: 1
- transitions of power save modes if provided by the TOE. 210 in [PP] This refinement in [PP] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP] This: 1
|
|
| pdf_data/st_metadata |
|
- /Author: Mahendra
- /CreationDate: D:20111229110718+08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111229110718+08'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: Xilnex Framework
- pdf_file_size_bytes: 520561
- pdf_hyperlinks: http://en.wikipedia.org/wiki/Federal_Information_Processing_Standard, http://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology, http://en.wikipedia.org/wiki/Cryptographic_hash_function, http://en.wikipedia.org/wiki/Stream_cipher, http://www.webopedia.com/TERM/E/encryption.html, http://www.webopedia.com/TERM/C/cryptography.html, http://www.webopedia.com/TERM/K/key.html, http://www.webopedia.com/TERM/I/Internet.html, http://www.webopedia.com/TERM/P/protocol.html, http://www.webopedia.com/TERM/N/Netscape.html, http://www.microsoft.com/downloads/details.aspx?FamilyID=9cfb2d51-5ff4-4491-b0e5-b386f32c0992&displaylang=en
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |