Red Hat Enterprise Linux Libreswan Cryptographic Module v4.0

This certificate has known related CVEs, which means that the certified product might be vulnerable.

Certificate #2721

Webpage information ?

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 29.08.2016 , 20.12.2016
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat With module Red Hat Enterprise Linux NSS Cryptographic Module v4.0 validated to FIPS 140-2 under Cert. #2711 operating in FIPS mode and Red Hat Enterprise Linux 7.1 OpenSSL Module validated to FIPS 140-2 under Cert. #2441 operating in FIPS mode
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description Red Hat Enterprise Linux Libreswan Cryptographic Module v4.0 is a software only cryptographic module that provides the IKE protocol version 1 and version 2 key agreement services required for IPSec.
Tested configurations
  • Red Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 with PAA
  • Red Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 without PAA
  • Red Hat Enterprise Linux 7.1 running on IBM Power8 Little Endian 8286-41A
  • Red Hat Enterprise Linux 7.1 running on IBM z13 (single-user mode)
Vendor Red Hat®, Inc.
References

This certificate's webpage directly references 2 certificates, transitively this expands into 2 certificates.

Security policy ?

Symmetric Algorithms
AES, DES, TDES, TDEA, HMAC, HMAC-SHA-256, CMAC
Asymmetric Algorithms
RSA 2048, Diffie-Hellman, DSA
Hash functions
SHA-256
Schemes
MAC
Protocols
IKEv1, IKEv2, IKE
Libraries
OpenSSL, NSS
Block cipher modes
GCM, CCM

Security level
Level 1, level 1

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS140-2, FIPS180-4, FIPS197, FIPS198-1, SP 800-135, PKCS#1, RFC3394, RFC5649

File metadata

Title FIPS 140-2 Non-Proprietary Security Policy
Keywords FIPS 140-2
Author Alejandro Fabio Masino
Creation date D:20161219105537-06'00'
Pages 20
Creator Writer
Producer LibreOffice 5.1

References

Outgoing
  • 2711 - historical - Red Hat Enterprise Linux NSS Cryptographic Module v4.0
  • 2441 - historical - Red Hat Enterprise Linux 6.6 OpenSSL Module, Red Hat Enterprise Linux 7.1 OpenSSL Module
Incoming
  • 2798 - historical - Red Hat Enterprise Linux Kernel Crypto API Cryptographic Module v4.0 with CPACF
  • 2742 - historical - Red Hat Enterprise Linux Kernel Crypto API Cryptographic Module v4.0

Heuristics ?

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-1999-0002
C M N
HIGH 10.0 10.0 12.10.1998 04:00
CVE-1999-0009
C M N
HIGH 10.0 10.0 08.04.1998 04:00
CVE-1999-0034
C M N
HIGH 7.2 10.0 29.05.1997 04:00
CVE-1999-0037
C M N
HIGH 7.5 6.4 21.05.1997 04:00
CVE-1999-0041
C M N
HIGH 7.5 6.4 13.02.1997 05:00
CVE-1999-0042
C M N
HIGH 10.0 10.0 07.04.1997 04:00
CVE-1999-0043
C M N
HIGH 10.0 10.0 04.12.1996 05:00
CVE-1999-0130
C M N
HIGH 7.2 10.0 16.11.1996 05:00
CVE-1999-0192
C M N
HIGH 10.0 10.0 18.10.1997 04:00
CVE-1999-0297
C M N
HIGH 7.2 10.0 12.12.1996 05:00
CVE-1999-0390
C M N
HIGH 7.2 10.0 04.01.1999 05:00
CVE-1999-0769
C M N
HIGH 7.2 10.0 25.08.1999 04:00
CVE-1999-0798
C M N
HIGH 10.0 10.0 04.12.1998 05:00
CVE-1999-0868
C M N
HIGH 7.2 10.0 20.02.1997 05:00
CVE-1999-0872
C M N
HIGH 7.2 10.0 25.08.1999 04:00
CVE-1999-0894
C M N
HIGH 10.0 10.0 04.01.2000 05:00
CVE-1999-1182
C M N
HIGH 7.2 10.0 17.07.1997 04:00
CVE-1999-1288
C M N
MEDIUM 4.6 6.4 19.11.1998 05:00
CVE-1999-1299
C M N
HIGH 10.0 10.0 03.02.1997 05:00
CVE-1999-1329
C M N
HIGH 7.2 10.0 31.12.1999 05:00
CVE-1999-1332
C M N
LOW 2.1 2.9 31.12.1999 05:00
CVE-1999-1333
C M N
HIGH 7.5 6.4 31.12.1999 05:00
CVE-1999-1335
C M N
MEDIUM 6.4 4.9 31.12.1999 05:00
CVE-1999-1346
C M N
HIGH 7.5 6.4 07.10.1999 04:00
CVE-1999-1347
C M N
MEDIUM 4.6 6.4 07.10.1999 04:00
CVE-1999-1348
C M N
LOW 2.1 2.9 30.06.1999 04:00
CVE-2000-0017
C M N
HIGH 10.0 10.0 21.12.1999 05:00
CVE-2000-0118
C M N
HIGH 7.2 10.0 09.06.1999 04:00
CVE-2000-0170
C M N
HIGH 7.2 10.0 26.02.2000 05:00
CVE-2000-0701
C M N
MEDIUM 4.6 6.4 20.10.2000 04:00
CVE-2000-1207
C M N
HIGH 7.2 10.0 30.09.2000 04:00
CVE-2000-1220
C M N
HIGH 10.0 10.0 08.01.2000 05:00
CVE-2001-0690
C M N
HIGH 7.5 6.4 20.09.2001 04:00
CVE-2001-0886
C M N
MEDIUM 4.6 6.4 21.12.2001 05:00
CVE-2001-0889
C M N
HIGH 7.5 6.4 19.12.2001 05:00
CVE-2005-0087
C M N
MEDIUM 4.6 6.4 27.04.2005 04:00
CVE-2005-2492
C M N
LOW 3.6 4.9 14.09.2005 19:03
CVE-2006-5170
C M N
HIGH 7.5 6.4 10.10.2006 04:06
CVE-2007-2030
C M N
MEDIUM 4.9 6.9 16.04.2007 20:19
CVE-2007-3103
C M N
MEDIUM 6.2 10.0 15.07.2007 22:30
CVE-2007-5079
C M N
MEDIUM 6.0 6.4 25.09.2007 01:17
CVE-2007-5494
C M N
MEDIUM 4.9 6.9 30.11.2007 02:46
CVE-2007-6285
C M N
MEDIUM 6.2 10.0 20.12.2007 22:46
CVE-2009-0846
C M N
HIGH 10.0 10.0 09.04.2009 00:30
CVE-2009-1837
C M N
HIGH 7.5 5.9 12.06.2009 21:30
CVE-2009-2416
C M N
MEDIUM 6.5 3.6 11.08.2009 18:30
CVE-2009-4067
C M N
MEDIUM 6.8 5.9 11.02.2020 19:15
CVE-2010-0013
C M N
HIGH 7.5 3.6 09.01.2010 18:30
CVE-2010-4251
C M N
HIGH 7.5 3.6 26.05.2011 16:55
CVE-2010-4805
C M N
HIGH 7.5 3.6 26.05.2011 16:55
CVE-2011-1145
C M N
HIGH 7.8 5.9 14.11.2019 02:15
CVE-2011-2525
C M N
HIGH 7.8 5.9 02.02.2012 04:09
CVE-2011-2699
C M N
HIGH 7.5 3.6 24.05.2012 23:55
CVE-2011-2717
C M N
CRITICAL 9.8 5.9 27.11.2019 21:15
CVE-2011-2897
C M N
CRITICAL 9.8 5.9 12.11.2019 14:15
CVE-2011-3188
C M N
CRITICAL 9.1 5.2 24.05.2012 23:55
CVE-2011-3191
C M N
HIGH 8.8 5.9 24.05.2012 23:55
CVE-2011-3363
C M N
MEDIUM 6.5 3.6 24.05.2012 23:55
CVE-2011-3585
C M N
MEDIUM 4.7 3.6 31.12.2019 20:15
CVE-2011-4967
C M N
HIGH 7.5 3.6 19.11.2019 16:15
CVE-2012-1097
C M N
HIGH 7.8 5.9 17.05.2012 11:00
CVE-2014-6271
C M N
CRITICAL 9.8 5.9 24.09.2014 18:48
CVE-2014-7169
C M N
CRITICAL 9.8 5.9 25.09.2014 01:55
CVE-2015-1819
C M N
MEDIUM 5.0 2.9 14.08.2015 18:59
CVE-2015-2877
C M N
LOW 3.3 1.4 03.03.2017 11:59
CVE-2016-4983
C M N
LOW 3.3 1.4 05.11.2019 22:15
CVE-2016-7091
C M N
MEDIUM 4.4 3.6 22.12.2016 21:59

References ?

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2011-2897', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-1999-0009', 'CVE-1999-0041', 'CVE-1999-0002', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2011-4967', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-1999-0034']} values added.
    • The direct_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2011-2897', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-1999-0009', 'CVE-1999-0041', 'CVE-1999-0002', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2011-4967', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-1999-0034']} values added.
    • The indirect_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2011-2897', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-1999-0009', 'CVE-1999-0041', 'CVE-1999-0002', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2011-4967', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-1999-0034']} values added.
  • 01.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2009-1837', 'CVE-2009-2416', 'CVE-2009-0846', 'CVE-2014-6271', 'CVE-2014-7169', 'CVE-2010-0013']} values added.
    • The direct_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2009-1837', 'CVE-2009-2416', 'CVE-2009-0846', 'CVE-2014-6271', 'CVE-2014-7169', 'CVE-2010-0013']} values added.
    • The indirect_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2009-1837', 'CVE-2009-2416', 'CVE-2009-0846', 'CVE-2014-6271', 'CVE-2014-7169', 'CVE-2010-0013']} values added.
  • 18.05.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889']} values added.
    • The direct_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889']} values added.
    • The indirect_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889']} values added.
  • 19.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1333', 'CVE-1999-1335', 'CVE-1999-1332', 'CVE-2001-0889']} values discarded.
    • The direct_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1333', 'CVE-1999-1335', 'CVE-1999-1332', 'CVE-2001-0889']} values discarded.
    • The indirect_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1333', 'CVE-1999-1335', 'CVE-1999-1332', 'CVE-2001-0889']} values discarded.
  • 09.02.2023 The certificate data changed.
    Certificate changed

    The cert_id was updated.

    • The new value is 2721.

    The web extraction data was updated.

    • The following values were inserted: {'validation_history': [{'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2016-08-29', 'validation_type': 'Initial', 'lab': 'ATSEC INFORMATION SECURITY CORP'}, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2016-12-20', 'validation_type': 'Update', 'lab': 'ATSEC INFORMATION SECURITY CORP'}], 'vendor_url': 'http://www.redhat.com', 'certificate_pdf_url': 'https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertAug2016.pdf', 'hw_versions': None, 'fw_versions': None}.
    • The standard property was set to FIPS 140-2.
    • The status property was set to historical.
    • The level property was set to 1.
    • The embodiment property was set to Multi-Chip Stand Alone.
    • The mentioned_certs property was updated, with the {'2711': 1, '2441': 1} data.
    • The following properties were deleted: ['date_validation', 'algorithms', 'vendor_www', 'lab', 'lab_nvlap', 'security_policy_www', 'certificate_www', 'hw_version', 'fw_version', 'product_url'].

    The PDF extraction data was updated.

    • The following values were inserted: {'policy_metadata': {'pdf_file_size_bytes': 173906, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/Title': 'FIPS 140-2 Non-Proprietary Security Policy', '/Author': 'Alejandro Fabio Masino', '/Keywords': 'FIPS 140-2', '/Creator': 'Writer', '/Producer': 'LibreOffice 5.1', '/CreationDate': "D:20161219105537-06'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.atsec.com/']}}}.
    • The following properties were deleted: ['cert_id', 'algorithms', 'clean_cert_ids', 'st_metadata'].

    The computed heuristics were updated.

    • The following values were inserted: {'policy_prunned_references': {'_type': 'Set', 'elements': ['2711', '2441']}, 'module_prunned_references': {'_type': 'Set', 'elements': ['2711', '2441']}, 'policy_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '1399', '1403', '1405', '1409', '1402', '1404', '1401', '1398', '1397', '1406', '1400', '2441']}}, 'module_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}}, 'direct_transitive_cves': {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2005-0087', 'CVE-2009-4067', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-2011-3363', 'CVE-2011-3191', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-2007-6285', 'CVE-2011-3188', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-2011-2525', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2005-2492', 'CVE-2011-2897', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-2000-0701', 'CVE-1999-0009', 'CVE-1999-0002', 'CVE-1999-0041', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2006-5170', 'CVE-2007-2030', 'CVE-2011-4967', 'CVE-2016-7091', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2011-2699', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-2010-4805', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-2015-2877', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2010-4251', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2012-1097', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-2007-5494', 'CVE-1999-0034']}, 'indirect_transitive_cves': {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2005-0087', 'CVE-2009-4067', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-2011-3363', 'CVE-2011-3191', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-2007-6285', 'CVE-2011-3188', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-2011-2525', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2005-2492', 'CVE-2011-2897', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-2000-0701', 'CVE-1999-0009', 'CVE-1999-0002', 'CVE-1999-0041', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2006-5170', 'CVE-2007-2030', 'CVE-2011-4967', 'CVE-2016-7091', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2011-2699', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-2010-4805', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-2015-2877', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2010-4251', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2012-1097', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-2007-5494', 'CVE-1999-0034']}}.
    • The algorithms property was set to {'_type': 'Set', 'elements': ['CVL#680', 'CVL#681', 'CVL#679']}.
    • The following properties were deleted: ['keywords', 'unmatched_algs', 'clean_cert_ids', 'st_references', 'web_references'].

    The state was updated.

    • The following values were inserted: {'module_download_ok': True, 'policy_download_ok': True, 'policy_convert_garbage': False, 'policy_convert_ok': True, 'module_extract_ok': True, 'policy_extract_ok': True, 'policy_pdf_hash': '51ef058076692a3dc7d051e70e9613598442d38ea9d4d709a7d3a2a7288e4b50', 'policy_txt_hash': '27581efa0595a0daa6a71f55903b725e8e8c3619ed767c51a7b924e0ddcc32d3'}.
    • The following properties were deleted: ['sp_path', 'html_path', 'tables_done', 'file_status', 'txt_state'].
  • 07.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The clean_cert_ids property was updated, with the {'#2711': 1} values inserted.
    • The st_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['2711']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['701', '982', '315', '970', '969', '625', '632', '963', '964', '961', '965', '656', '52', '958', '967', '753', '66', '274', '959', '312', '224', '64', '560', '962', '327', '739', '572', '342', '305', '756', '979', '309', '51', '340', '971', '978', '2711', '354', '957', '960', '980', '435', '1003', '966', '76', '399', '320', '412']}}} data.
  • 05.11.2022 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The algorithms property was set to {'_type': 'Set', 'elements': []}.

    The computed heuristics were updated.

    • The algorithms property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#680', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#679', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#681', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}]} values discarded.
  • 01.11.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The clean_cert_ids property was updated.
    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['2711']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['2711']}}} data.
  • 29.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The clean_cert_ids property was updated, with the {'#2711': 1} values inserted.
    • The st_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['2711']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['2711']}}} data.
  • 28.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The clean_cert_ids property was updated.
    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['2711']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['2711']}}} data.
  • 25.10.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The keywords property was updated, with the {'fips_cert_id': {'__update__': {'Cert': {'__delete__': ['#1']}}}, 'fips_certlike': {'__update__': {'Certlike': {'__update__': {'SHA-256': 6}, '__delete__': ['SHA2']}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__delete__': ['AES-']}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 4}, '__delete__': ['DEA']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC': 10}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 6}, '__delete__': ['SHA-2', 'SHA2']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 1}}}, '__delete__': ['KA']}, 'crypto_protocol': {'__delete__': ['TLS']}, 'ecc_curve': {}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 9}}, 'NSS': {'__update__': {'NSS': 12}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'NIST': {'SP 800-135': 4}, 'RFC': {'RFC3394': 1, 'RFC5649': 1}}}} data.
    • The algorithms property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#679', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 168', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 10', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 6', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '3500', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 8', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '8', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 11', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 6', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '86', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2600', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '390', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 7', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 140', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#681', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 8286', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '41', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A 2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A\n3072', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '380', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 128', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '135', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '13', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 112', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#680', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 192', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 3', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 7', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}]}.

    The computed heuristics were updated.

    • The algorithms property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#679', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 168', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 10', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 6', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '3500', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 8', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '8', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 11', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 6', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '86', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2600', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '390', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 7', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 140', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#681', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 8286', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '41', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A 2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A\n3072', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '380', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 128', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '135', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '13', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 112', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#680', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 192', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 3', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 7', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}]} values added.
    • The clean_cert_ids property was updated, with the {'#2711': 1} values inserted.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}} data.
    • The web_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}} data.

    The state was updated.

    • The tables_done property was set to True.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2008-1951', 'CVE-2010-0729', 'CVE-2012-2124', 'CVE-2005-4890', 'CVE-2014-0224']} values discarded.
  • 08.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*']} values discarded.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The web_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 31.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2011-0536', 'CVE-2011-1011']} values discarded.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.fips.FIPSCertificate.

    The computed heuristics were updated.

    • The following values were inserted: {'clean_cert_ids': {'#2441': 1}}.
    • The _type property was set to sec_certs.sample.fips.FIPSCertificate.Heuristics.
    • The keywords property was set to {}.
    • The algorithms property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#680', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#679', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#681', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}]}.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The web_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.

    The state was updated.

    • The _type property was set to sec_certs.sample.fips.FIPSCertificate.InternalState.
    • The following properties were deleted: ['fragment_path'].
  • 23.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 21.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The pdf_scan was updated.

    • The keywords property was updated, with the {'rules_cert_id': {}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__update__': {'FIPS 140-2': {'__update__': {'count': 1}}}, '__delete__': ['FIPS180-4', 'FIPS198-1']}, 'RFC[ ]*[0-9]+?': {'__delete__': ['RFC3394']}}}, 'rules_block_cipher_modes': {'__insert__': {'CCM': {'CCM': {'count': 1}}}, '__update__': {'GCM': {'__update__': {'GCM': {'__update__': {'count': 1}}}}}}, 'rules_crypto_libs': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': {'__update__': {'count': 1}}}}, 'NSS': {'__update__': {'NSS': {'__update__': {'count': 1}}}}}}, 'rules_other': {'__update__': {'library': {'__update__': {'library': {'__update__': {'count': 1}}}}}}} data.

    The computed heuristics were updated.

    • The keywords property was updated, with the {'rules_cert_id': {'__delete__': ['(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{4})(?!\\d)', '(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{3})(?!\\d)', '(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{1})(?!\\d)']}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__update__': {'FIPS 140-2': {'__update__': {'count': 1}}}, '__delete__': ['FIPS180-4', 'FIPS198-1']}, 'RFC[ ]*[0-9]+?': {'__delete__': ['RFC3394']}}}, 'rules_block_cipher_modes': {'__insert__': {'CCM': {'CCM': {'count': 1}}}, '__update__': {'GCM': {'__update__': {'GCM': {'__update__': {'count': 1}}}}}}, 'rules_crypto_libs': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': {'__update__': {'count': 1}}}}, 'NSS': {'__update__': {'NSS': {'__update__': {'count': 1}}}}}}, 'rules_other': {'__update__': {'library': {'__update__': {'library': {'__update__': {'count': 1}}}}}}} data.
    • The algorithms property was updated.
  • 07.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 24.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 22.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*']} values added.
  • 20.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 19.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 18.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 17.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:*:*:*:*:*:*']} values discarded.
  • 18.04.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 11.03.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 10.03.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.
    • The following properties were deleted: ['connections'].

    The pdf_scan was updated.

    • The following properties were deleted: ['connections'].

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2441']}}, 'web_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}}}.
    • The algorithms property was updated.
    • The following properties were deleted: ['connections', 'directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 27.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2006-5170']} values added.
  • 23.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['4.0']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*', 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:*:*:*:*:*:*']}.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2005-0473', 'CVE-2006-3813', 'CVE-2008-1767', 'CVE-1999-1572', 'CVE-2004-1057', 'CVE-2008-1198', 'CVE-2006-5753', 'CVE-2008-2365', 'CVE-2005-0109', 'CVE-2005-3625', 'CVE-2005-0750', 'CVE-2005-0605', 'CVE-2005-3631', 'CVE-2005-0077', 'CVE-2005-3624', 'CVE-2005-0398', 'CVE-2005-0090', 'CVE-2006-6235', 'CVE-2007-4130', 'CVE-2006-5170', 'CVE-2007-3379', 'CVE-2005-0699', 'CVE-2005-3629', 'CVE-2006-7226', 'CVE-2005-0337', 'CVE-2005-0092', 'CVE-2005-0988', 'CVE-2005-2100', 'CVE-2004-1235', 'CVE-2007-1351', 'CVE-2005-0001', 'CVE-2005-1760', 'CVE-2005-2700', 'CVE-2005-0736', 'CVE-2007-1352', 'CVE-2005-1038', 'CVE-2002-2185', 'CVE-2005-0472', 'CVE-2005-0091', 'CVE-2005-3626', 'CVE-2005-0207', 'CVE-2005-1194', 'CVE-2007-0001', 'CVE-2007-1007']} values discarded.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [4, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [8, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*'], [11, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [12, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*'], [16, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*'], [18, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [19, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*'], [21, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [22, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*'], [23, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*'], [25, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*'], [26, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*'], [27, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [28, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:*:*:*:*:*:*'], [32, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*'], [36, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [37, 'cpe:2.3:a:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [39, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [45, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [46, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*']] values inserted.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[2, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [4, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*'], [6, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*'], [7, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [11, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*'], [12, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*'], [13, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [14, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:*:*:*:*:*:*'], [16, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*'], [18, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [19, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*'], [22, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [23, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:ws:*:*:*:*:*'], [25, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [26, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*'], [27, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:desktop:*:*:*:*:*'], [28, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*'], [31, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [36, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*'], [37, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*'], [38, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [39, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*'], [40, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*'], [41, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*'], [42, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [45, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*'], [46, 'cpe:2.3:a:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*']] values inserted.
  • 09.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2007-2834']} values discarded.
  • 05.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*'], [1, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [2, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*'], [3, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*'], [4, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [7, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [8, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*'], [11, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*'], [13, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*'], [14, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:ws:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [16, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*'], [19, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [21, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [22, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*'], [23, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*'], [26, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*'], [27, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [30, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*'], [31, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [32, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*'], [38, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*'], [40, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*'], [42, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [46, 'cpe:2.3:a:red_hat:enterprise_linux:4:*:*:*:*:*:*:*']] values inserted.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The module_type property was set to Software.
    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:a:red_hat:enterprise_linux:4:*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [2, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*'], [3, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*'], [7, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [8, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*'], [13, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*'], [14, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*'], [19, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:as:*:*:*:*:*'], [21, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*'], [23, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [26, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*'], [28, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [30, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*'], [31, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:*:*:*:*:*:*'], [32, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [36, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*'], [37, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*'], [38, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*'], [39, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*'], [40, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [41, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [42, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*'], [45, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*'], [46, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*']] values inserted.
  • 31.01.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*'], [1, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*'], [3, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [4, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*'], [6, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [7, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*'], [8, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [10, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [13, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [14, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*'], [16, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*'], [18, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [22, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*'], [25, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:*:*:*:*:*:*'], [27, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*'], [28, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*'], [30, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [32, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [36, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [39, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*'], [40, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [42, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [45, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [46, 'cpe:2.3:a:red_hat:enterprise_linux:4:*:*:*:*:*:*:*']] values inserted.
  • 30.01.2022 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2721,
  "dgst": "5b00a7bb92c1cb19",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#679",
        "CVL#680",
        "CVL#681"
      ]
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*",
        "cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-1999-0390",
        "CVE-1999-0894",
        "CVE-2011-4967",
        "CVE-2009-4067",
        "CVE-2015-1819",
        "CVE-2011-2897",
        "CVE-1999-1329",
        "CVE-2011-2699",
        "CVE-2014-7169",
        "CVE-2011-2717",
        "CVE-1999-0192",
        "CVE-2016-4983",
        "CVE-1999-1335",
        "CVE-1999-1182",
        "CVE-2011-3188",
        "CVE-1999-0868",
        "CVE-1999-1299",
        "CVE-2001-0886",
        "CVE-1999-1347",
        "CVE-2001-0889",
        "CVE-1999-0769",
        "CVE-2009-1837",
        "CVE-1999-0041",
        "CVE-1999-0043",
        "CVE-2009-0846",
        "CVE-2015-2877",
        "CVE-2000-0701",
        "CVE-1999-1348",
        "CVE-1999-1346",
        "CVE-2007-3103",
        "CVE-1999-0034",
        "CVE-1999-0297",
        "CVE-2011-3585",
        "CVE-1999-0042",
        "CVE-2005-2492",
        "CVE-2010-4251",
        "CVE-2014-6271",
        "CVE-2007-5494",
        "CVE-2010-0013",
        "CVE-2006-5170",
        "CVE-1999-0130",
        "CVE-2000-0017",
        "CVE-1999-0037",
        "CVE-1999-1332",
        "CVE-2010-4805",
        "CVE-2011-3191",
        "CVE-1999-0002",
        "CVE-2000-1207",
        "CVE-1999-1333",
        "CVE-1999-0798",
        "CVE-2000-0170",
        "CVE-2011-2525",
        "CVE-2011-3363",
        "CVE-1999-0009",
        "CVE-2016-7091",
        "CVE-2001-0690",
        "CVE-1999-0872",
        "CVE-2005-0087",
        "CVE-2007-5079",
        "CVE-2000-1220",
        "CVE-2000-0118",
        "CVE-2007-2030",
        "CVE-2012-1097",
        "CVE-1999-1288",
        "CVE-2007-6285",
        "CVE-2009-2416",
        "CVE-2011-1145"
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-1999-0390",
        "CVE-1999-0894",
        "CVE-2011-4967",
        "CVE-2009-4067",
        "CVE-2015-1819",
        "CVE-2011-2897",
        "CVE-1999-1329",
        "CVE-2011-2699",
        "CVE-2014-7169",
        "CVE-2011-2717",
        "CVE-1999-0192",
        "CVE-2016-4983",
        "CVE-1999-1335",
        "CVE-1999-1182",
        "CVE-2011-3188",
        "CVE-1999-0868",
        "CVE-1999-1299",
        "CVE-2001-0886",
        "CVE-1999-1347",
        "CVE-2001-0889",
        "CVE-1999-0769",
        "CVE-2009-1837",
        "CVE-1999-0041",
        "CVE-1999-0043",
        "CVE-2009-0846",
        "CVE-2015-2877",
        "CVE-2000-0701",
        "CVE-1999-1348",
        "CVE-1999-1346",
        "CVE-2007-3103",
        "CVE-1999-0034",
        "CVE-1999-0297",
        "CVE-2011-3585",
        "CVE-1999-0042",
        "CVE-2005-2492",
        "CVE-2010-4251",
        "CVE-2014-6271",
        "CVE-2007-5494",
        "CVE-2010-0013",
        "CVE-2006-5170",
        "CVE-1999-0130",
        "CVE-2000-0017",
        "CVE-1999-0037",
        "CVE-1999-1332",
        "CVE-2010-4805",
        "CVE-2011-3191",
        "CVE-1999-0002",
        "CVE-2000-1207",
        "CVE-1999-1333",
        "CVE-1999-0798",
        "CVE-2000-0170",
        "CVE-2011-2525",
        "CVE-2011-3363",
        "CVE-1999-0009",
        "CVE-2016-7091",
        "CVE-2001-0690",
        "CVE-1999-0872",
        "CVE-2005-0087",
        "CVE-2007-5079",
        "CVE-2000-1220",
        "CVE-2000-0118",
        "CVE-2007-2030",
        "CVE-2012-1097",
        "CVE-1999-1288",
        "CVE-2007-6285",
        "CVE-2009-2416",
        "CVE-2011-1145"
      ]
    },
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2742",
          "2798"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "2711",
          "2441"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2742",
          "2798"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "2711",
          "2441"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "2441",
        "2711"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2742",
          "2798"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "2441",
          "2711"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2742",
          "2798"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1403",
          "1399",
          "1398",
          "1405",
          "2711",
          "1409",
          "1401",
          "1402",
          "1400",
          "1397",
          "1404",
          "2441",
          "1406"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "2711",
        "2441"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-1999-0390",
        "CVE-1999-0894",
        "CVE-2011-4967",
        "CVE-2009-4067",
        "CVE-2015-1819",
        "CVE-2011-2897",
        "CVE-1999-1329",
        "CVE-2011-2699",
        "CVE-2014-7169",
        "CVE-2011-2717",
        "CVE-1999-0192",
        "CVE-2016-4983",
        "CVE-1999-1335",
        "CVE-1999-1182",
        "CVE-2011-3188",
        "CVE-1999-0868",
        "CVE-1999-1299",
        "CVE-2001-0886",
        "CVE-1999-1347",
        "CVE-2001-0889",
        "CVE-1999-0769",
        "CVE-2009-1837",
        "CVE-1999-0041",
        "CVE-1999-0043",
        "CVE-2009-0846",
        "CVE-2015-2877",
        "CVE-2000-0701",
        "CVE-1999-1348",
        "CVE-1999-1346",
        "CVE-2007-3103",
        "CVE-1999-0034",
        "CVE-1999-0297",
        "CVE-2011-3585",
        "CVE-1999-0042",
        "CVE-2005-2492",
        "CVE-2010-4251",
        "CVE-2014-6271",
        "CVE-2007-5494",
        "CVE-2010-0013",
        "CVE-2006-5170",
        "CVE-1999-0130",
        "CVE-2000-0017",
        "CVE-1999-0037",
        "CVE-1999-1332",
        "CVE-2010-4805",
        "CVE-2011-3191",
        "CVE-1999-0002",
        "CVE-2000-1207",
        "CVE-1999-1333",
        "CVE-1999-0798",
        "CVE-2000-0170",
        "CVE-2011-2525",
        "CVE-2011-3363",
        "CVE-1999-0009",
        "CVE-2016-7091",
        "CVE-2001-0690",
        "CVE-1999-0872",
        "CVE-2005-0087",
        "CVE-2007-5079",
        "CVE-2000-1220",
        "CVE-2000-0118",
        "CVE-2007-2030",
        "CVE-2012-1097",
        "CVE-1999-1288",
        "CVE-2007-6285",
        "CVE-2009-2416",
        "CVE-2011-1145"
      ]
    },
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CCM": {
          "CCM": 2
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "NSS": {
          "NSS": 12
        },
        "OpenSSL": {
          "OpenSSL": 9
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 29,
          "IKEv1": 2,
          "IKEv2": 2
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 22
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#2441": 1,
          "#2711": 1,
          "#679": 1,
          "#680": 1,
          "#681": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128, 192": 2,
          "DES 168": 2,
          "HMAC SHA- 256": 1,
          "HMAC SHA-256": 5,
          "HMAC- SHA-256": 1,
          "HMAC-SHA-256": 4,
          "PKCS#1": 2,
          "RSA 2048": 1,
          "SHA- 256": 1,
          "SHA-256": 6
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 4,
          "level 1": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 32,
          "FIPS PUB 140-2": 1,
          "FIPS140-2": 1,
          "FIPS180-4": 1,
          "FIPS197": 1,
          "FIPS198-1": 1
        },
        "NIST": {
          "SP 800-135": 4
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC3394": 1,
          "RFC5649": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 1
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 10,
            "HMAC-SHA-256": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Alejandro Fabio Masino",
      "/CreationDate": "D:20161219105537-06\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "FIPS 140-2",
      "/Producer": "LibreOffice 5.1",
      "/Title": "FIPS 140-2 Non-Proprietary Security Policy",
      "pdf_file_size_bytes": 173906,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.atsec.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "51ef058076692a3dc7d051e70e9613598442d38ea9d4d709a7d3a2a7288e4b50",
    "policy_txt_hash": "27581efa0595a0daa6a71f55903b725e8e8c3619ed767c51a7b924e0ddcc32d3"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "With module Red Hat Enterprise Linux NSS Cryptographic Module v4.0 validated to FIPS 140-2 under Cert. #2711 operating in FIPS mode and Red Hat Enterprise Linux 7.1 OpenSSL Module validated to FIPS 140-2 under Cert. #2441 operating in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertAug2016.pdf",
    "date_sunset": null,
    "description": "Red Hat Enterprise Linux Libreswan Cryptographic Module v4.0 is a software only cryptographic module that provides the IKE protocol version 1 and version 2 key agreement services required for IPSec.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "2441": 1,
      "2711": 1
    },
    "module_name": "Red Hat Enterprise Linux Libreswan Cryptographic Module v4.0",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "4.0",
    "tested_conf": [
      "Red Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 with PAA",
      "Red Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 without PAA",
      "Red Hat Enterprise Linux 7.1 running on IBM Power8 Little Endian 8286-41A",
      "Red Hat Enterprise Linux 7.1 running on IBM z13 (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2016-08-29",
        "lab": "ATSEC INFORMATION SECURITY CORP",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2016-12-20",
        "lab": "ATSEC INFORMATION SECURITY CORP",
        "validation_type": "Update"
      }
    ],
    "vendor": "Red Hat\u00ae, Inc.",
    "vendor_url": "http://www.redhat.com"
  }
}