Red Hat Enterprise Linux Libreswan Cryptographic Module v4.0
Certificate #2721
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, DES, TDES, TDEA, HMAC, HMAC-SHA-256, CMACAsymmetric Algorithms
RSA 2048, Diffie-Hellman, DSAHash functions
SHA-256Schemes
MACProtocols
IKEv1, IKEv2, IKELibraries
OpenSSL, NSSBlock cipher modes
GCM, CCMSecurity level
Level 1, level 1Standards
FIPS 140-2, FIPS PUB 140-2, FIPS140-2, FIPS180-4, FIPS197, FIPS198-1, SP 800-135, PKCS#1, RFC3394, RFC5649File metadata
Title | FIPS 140-2 Non-Proprietary Security Policy |
---|---|
Keywords | FIPS 140-2 |
Author | Alejandro Fabio Masino |
Creation date | D:20161219105537-06'00' |
Pages | 20 |
Creator | Writer |
Producer | LibreOffice 5.1 |
References
Outgoing IncomingHeuristics ?
CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-1999-0002 | HIGH | 10.0 | 10.0 | 12.10.1998 04:00 | ||
CVE-1999-0009 | HIGH | 10.0 | 10.0 | 08.04.1998 04:00 | ||
CVE-1999-0034 | HIGH | 7.2 | 10.0 | 29.05.1997 04:00 | ||
CVE-1999-0037 | HIGH | 7.5 | 6.4 | 21.05.1997 04:00 | ||
CVE-1999-0041 | HIGH | 7.5 | 6.4 | 13.02.1997 05:00 | ||
CVE-1999-0042 | HIGH | 10.0 | 10.0 | 07.04.1997 04:00 | ||
CVE-1999-0043 | HIGH | 10.0 | 10.0 | 04.12.1996 05:00 | ||
CVE-1999-0130 | HIGH | 7.2 | 10.0 | 16.11.1996 05:00 | ||
CVE-1999-0192 | HIGH | 10.0 | 10.0 | 18.10.1997 04:00 | ||
CVE-1999-0297 | HIGH | 7.2 | 10.0 | 12.12.1996 05:00 | ||
CVE-1999-0390 | HIGH | 7.2 | 10.0 | 04.01.1999 05:00 | ||
CVE-1999-0769 | HIGH | 7.2 | 10.0 | 25.08.1999 04:00 | ||
CVE-1999-0798 | HIGH | 10.0 | 10.0 | 04.12.1998 05:00 | ||
CVE-1999-0868 | HIGH | 7.2 | 10.0 | 20.02.1997 05:00 | ||
CVE-1999-0872 | HIGH | 7.2 | 10.0 | 25.08.1999 04:00 | ||
CVE-1999-0894 | HIGH | 10.0 | 10.0 | 04.01.2000 05:00 | ||
CVE-1999-1182 | HIGH | 7.2 | 10.0 | 17.07.1997 04:00 | ||
CVE-1999-1288 | MEDIUM | 4.6 | 6.4 | 19.11.1998 05:00 | ||
CVE-1999-1299 | HIGH | 10.0 | 10.0 | 03.02.1997 05:00 | ||
CVE-1999-1329 | HIGH | 7.2 | 10.0 | 31.12.1999 05:00 | ||
CVE-1999-1332 | LOW | 2.1 | 2.9 | 31.12.1999 05:00 | ||
CVE-1999-1333 | HIGH | 7.5 | 6.4 | 31.12.1999 05:00 | ||
CVE-1999-1335 | MEDIUM | 6.4 | 4.9 | 31.12.1999 05:00 | ||
CVE-1999-1346 | HIGH | 7.5 | 6.4 | 07.10.1999 04:00 | ||
CVE-1999-1347 | MEDIUM | 4.6 | 6.4 | 07.10.1999 04:00 | ||
CVE-1999-1348 | LOW | 2.1 | 2.9 | 30.06.1999 04:00 | ||
CVE-2000-0017 | HIGH | 10.0 | 10.0 | 21.12.1999 05:00 | ||
CVE-2000-0118 | HIGH | 7.2 | 10.0 | 09.06.1999 04:00 | ||
CVE-2000-0170 | HIGH | 7.2 | 10.0 | 26.02.2000 05:00 | ||
CVE-2000-0701 | MEDIUM | 4.6 | 6.4 | 20.10.2000 04:00 | ||
CVE-2000-1207 | HIGH | 7.2 | 10.0 | 30.09.2000 04:00 | ||
CVE-2000-1220 | HIGH | 10.0 | 10.0 | 08.01.2000 05:00 | ||
CVE-2001-0690 | HIGH | 7.5 | 6.4 | 20.09.2001 04:00 | ||
CVE-2001-0886 | MEDIUM | 4.6 | 6.4 | 21.12.2001 05:00 | ||
CVE-2001-0889 | HIGH | 7.5 | 6.4 | 19.12.2001 05:00 | ||
CVE-2005-0087 | MEDIUM | 4.6 | 6.4 | 27.04.2005 04:00 | ||
CVE-2005-2492 | LOW | 3.6 | 4.9 | 14.09.2005 19:03 | ||
CVE-2006-5170 | HIGH | 7.5 | 6.4 | 10.10.2006 04:06 | ||
CVE-2007-2030 | MEDIUM | 4.9 | 6.9 | 16.04.2007 20:19 | ||
CVE-2007-3103 | MEDIUM | 6.2 | 10.0 | 15.07.2007 22:30 | ||
CVE-2007-5079 | MEDIUM | 6.0 | 6.4 | 25.09.2007 01:17 | ||
CVE-2007-5494 | MEDIUM | 4.9 | 6.9 | 30.11.2007 02:46 | ||
CVE-2007-6285 | MEDIUM | 6.2 | 10.0 | 20.12.2007 22:46 | ||
CVE-2009-0846 | HIGH | 10.0 | 10.0 | 09.04.2009 00:30 | ||
CVE-2009-1837 | HIGH | 7.5 | 5.9 | 12.06.2009 21:30 | ||
CVE-2009-2416 | MEDIUM | 6.5 | 3.6 | 11.08.2009 18:30 | ||
CVE-2009-4067 | MEDIUM | 6.8 | 5.9 | 11.02.2020 19:15 | ||
CVE-2010-0013 | HIGH | 7.5 | 3.6 | 09.01.2010 18:30 | ||
CVE-2010-4251 | HIGH | 7.5 | 3.6 | 26.05.2011 16:55 | ||
CVE-2010-4805 | HIGH | 7.5 | 3.6 | 26.05.2011 16:55 | ||
CVE-2011-1145 | HIGH | 7.8 | 5.9 | 14.11.2019 02:15 | ||
CVE-2011-2525 | HIGH | 7.8 | 5.9 | 02.02.2012 04:09 | ||
CVE-2011-2699 | HIGH | 7.5 | 3.6 | 24.05.2012 23:55 | ||
CVE-2011-2717 | CRITICAL | 9.8 | 5.9 | 27.11.2019 21:15 | ||
CVE-2011-2897 | CRITICAL | 9.8 | 5.9 | 12.11.2019 14:15 | ||
CVE-2011-3188 | CRITICAL | 9.1 | 5.2 | 24.05.2012 23:55 | ||
CVE-2011-3191 | HIGH | 8.8 | 5.9 | 24.05.2012 23:55 | ||
CVE-2011-3363 | MEDIUM | 6.5 | 3.6 | 24.05.2012 23:55 | ||
CVE-2011-3585 | MEDIUM | 4.7 | 3.6 | 31.12.2019 20:15 | ||
CVE-2011-4967 | HIGH | 7.5 | 3.6 | 19.11.2019 16:15 | ||
CVE-2012-1097 | HIGH | 7.8 | 5.9 | 17.05.2012 11:00 | ||
CVE-2014-6271 | CRITICAL | 9.8 | 5.9 | 24.09.2014 18:48 | ||
CVE-2014-7169 | CRITICAL | 9.8 | 5.9 | 25.09.2014 01:55 | ||
CVE-2015-1819 | MEDIUM | 5.0 | 2.9 | 14.08.2015 18:59 | ||
CVE-2015-2877 | LOW | 3.3 | 1.4 | 03.03.2017 11:59 | ||
CVE-2016-4983 | LOW | 3.3 | 1.4 | 05.11.2019 22:15 | ||
CVE-2016-7091 | MEDIUM | 4.4 | 3.6 | 22.12.2016 21:59 |
References ?
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2011-2897', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-1999-0009', 'CVE-1999-0041', 'CVE-1999-0002', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2011-4967', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-1999-0034']}
values added. - The direct_transitive_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2011-2897', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-1999-0009', 'CVE-1999-0041', 'CVE-1999-0002', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2011-4967', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-1999-0034']}
values added. - The indirect_transitive_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2011-2897', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-1999-0009', 'CVE-1999-0041', 'CVE-1999-0002', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2011-4967', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-1999-0034']}
values added.
- The related_cves property was updated, with the
-
01.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2009-1837', 'CVE-2009-2416', 'CVE-2009-0846', 'CVE-2014-6271', 'CVE-2014-7169', 'CVE-2010-0013']}
values added. - The direct_transitive_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2009-1837', 'CVE-2009-2416', 'CVE-2009-0846', 'CVE-2014-6271', 'CVE-2014-7169', 'CVE-2010-0013']}
values added. - The indirect_transitive_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2009-1837', 'CVE-2009-2416', 'CVE-2009-0846', 'CVE-2014-6271', 'CVE-2014-7169', 'CVE-2010-0013']}
values added.
- The related_cves property was updated, with the
-
18.05.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889']}
values added. - The direct_transitive_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889']}
values added. - The indirect_transitive_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889']}
values added.
- The related_cves property was updated, with the
-
19.03.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1333', 'CVE-1999-1335', 'CVE-1999-1332', 'CVE-2001-0889']}
values discarded. - The direct_transitive_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1333', 'CVE-1999-1335', 'CVE-1999-1332', 'CVE-2001-0889']}
values discarded. - The indirect_transitive_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-1999-1346', 'CVE-1999-0297', 'CVE-1999-1329', 'CVE-2000-0701', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-2000-0017', 'CVE-2016-7091', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-1999-0037', 'CVE-1999-1333', 'CVE-1999-1335', 'CVE-1999-1332', 'CVE-2001-0889']}
values discarded.
- The related_cves property was updated, with the
-
09.02.2023 The certificate data changed.
Certificate changed
The cert_id was updated.
- The new value is
2721
.
The web extraction data was updated.
- The following values were inserted:
{'validation_history': [{'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2016-08-29', 'validation_type': 'Initial', 'lab': 'ATSEC INFORMATION SECURITY CORP'}, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2016-12-20', 'validation_type': 'Update', 'lab': 'ATSEC INFORMATION SECURITY CORP'}], 'vendor_url': 'http://www.redhat.com', 'certificate_pdf_url': 'https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertAug2016.pdf', 'hw_versions': None, 'fw_versions': None}
. - The standard property was set to
FIPS 140-2
. - The status property was set to
historical
. - The level property was set to
1
. - The embodiment property was set to
Multi-Chip Stand Alone
. - The mentioned_certs property was updated, with the
{'2711': 1, '2441': 1}
data. - The following properties were deleted:
['date_validation', 'algorithms', 'vendor_www', 'lab', 'lab_nvlap', 'security_policy_www', 'certificate_www', 'hw_version', 'fw_version', 'product_url']
.
The PDF extraction data was updated.
- The following values were inserted:
{'policy_metadata': {'pdf_file_size_bytes': 173906, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/Title': 'FIPS 140-2 Non-Proprietary Security Policy', '/Author': 'Alejandro Fabio Masino', '/Keywords': 'FIPS 140-2', '/Creator': 'Writer', '/Producer': 'LibreOffice 5.1', '/CreationDate': "D:20161219105537-06'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.atsec.com/']}}}
. - The following properties were deleted:
['cert_id', 'algorithms', 'clean_cert_ids', 'st_metadata']
.
The computed heuristics were updated.
- The following values were inserted:
{'policy_prunned_references': {'_type': 'Set', 'elements': ['2711', '2441']}, 'module_prunned_references': {'_type': 'Set', 'elements': ['2711', '2441']}, 'policy_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '1399', '1403', '1405', '1409', '1402', '1404', '1401', '1398', '1397', '1406', '1400', '2441']}}, 'module_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}}, 'direct_transitive_cves': {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2005-0087', 'CVE-2009-4067', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-2011-3363', 'CVE-2011-3191', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-2007-6285', 'CVE-2011-3188', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-2011-2525', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2005-2492', 'CVE-2011-2897', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-2000-0701', 'CVE-1999-0009', 'CVE-1999-0002', 'CVE-1999-0041', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2006-5170', 'CVE-2007-2030', 'CVE-2011-4967', 'CVE-2016-7091', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2011-2699', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-2010-4805', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-2015-2877', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2010-4251', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2012-1097', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-2007-5494', 'CVE-1999-0034']}, 'indirect_transitive_cves': {'_type': 'Set', 'elements': ['CVE-1999-0798', 'CVE-2000-0170', 'CVE-2005-0087', 'CVE-2009-4067', 'CVE-2007-3103', 'CVE-1999-1348', 'CVE-2011-3363', 'CVE-2011-3191', 'CVE-1999-1299', 'CVE-1999-1346', 'CVE-2007-6285', 'CVE-2011-3188', 'CVE-1999-0043', 'CVE-1999-0297', 'CVE-2011-2525', 'CVE-1999-0130', 'CVE-1999-1329', 'CVE-2005-2492', 'CVE-2011-2897', 'CVE-1999-1347', 'CVE-1999-1288', 'CVE-1999-0872', 'CVE-2000-0701', 'CVE-1999-0009', 'CVE-1999-0002', 'CVE-1999-0041', 'CVE-1999-0192', 'CVE-2000-0017', 'CVE-2006-5170', 'CVE-2007-2030', 'CVE-2011-4967', 'CVE-2016-7091', 'CVE-2011-3585', 'CVE-2011-1145', 'CVE-1999-0868', 'CVE-1999-0769', 'CVE-1999-0894', 'CVE-2015-1819', 'CVE-2011-2699', 'CVE-2001-0690', 'CVE-2000-1207', 'CVE-2010-4805', 'CVE-1999-0037', 'CVE-2016-4983', 'CVE-2015-2877', 'CVE-1999-1182', 'CVE-1999-0042', 'CVE-2010-4251', 'CVE-2001-0886', 'CVE-2007-5079', 'CVE-1999-0390', 'CVE-2011-2717', 'CVE-2012-1097', 'CVE-2000-0118', 'CVE-2000-1220', 'CVE-1999-1332', 'CVE-1999-1335', 'CVE-1999-1333', 'CVE-2001-0889', 'CVE-2007-5494', 'CVE-1999-0034']}}
. - The algorithms property was set to
{'_type': 'Set', 'elements': ['CVL#680', 'CVL#681', 'CVL#679']}
. - The following properties were deleted:
['keywords', 'unmatched_algs', 'clean_cert_ids', 'st_references', 'web_references']
.
The state was updated.
- The following values were inserted:
{'module_download_ok': True, 'policy_download_ok': True, 'policy_convert_garbage': False, 'policy_convert_ok': True, 'module_extract_ok': True, 'policy_extract_ok': True, 'policy_pdf_hash': '51ef058076692a3dc7d051e70e9613598442d38ea9d4d709a7d3a2a7288e4b50', 'policy_txt_hash': '27581efa0595a0daa6a71f55903b725e8e8c3619ed767c51a7b924e0ddcc32d3'}
. - The following properties were deleted:
['sp_path', 'html_path', 'tables_done', 'file_status', 'txt_state']
.
- The new value is
-
07.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The clean_cert_ids property was updated, with the
{'#2711': 1}
values inserted. - The st_references property was updated, with the
{'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['2711']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['701', '982', '315', '970', '969', '625', '632', '963', '964', '961', '965', '656', '52', '958', '967', '753', '66', '274', '959', '312', '224', '64', '560', '962', '327', '739', '572', '342', '305', '756', '979', '309', '51', '340', '971', '978', '2711', '354', '957', '960', '980', '435', '1003', '966', '76', '399', '320', '412']}}}
data.
- The clean_cert_ids property was updated, with the
-
05.11.2022 The certificate data changed.
Certificate changed
The web extraction data was updated.
- The algorithms property was set to
{'_type': 'Set', 'elements': []}
.
The computed heuristics were updated.
- The algorithms property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#680', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#679', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#681', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}]}
values discarded.
- The algorithms property was set to
-
01.11.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The clean_cert_ids property was updated.
- The st_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['2711']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['2711']}}}
data.
-
29.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The clean_cert_ids property was updated, with the
{'#2711': 1}
values inserted. - The st_references property was updated, with the
{'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['2711']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['2711']}}}
data.
- The clean_cert_ids property was updated, with the
-
28.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The clean_cert_ids property was updated.
- The st_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['2711']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['2711']}}}
data.
-
25.10.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The keywords property was updated, with the
{'fips_cert_id': {'__update__': {'Cert': {'__delete__': ['#1']}}}, 'fips_certlike': {'__update__': {'Certlike': {'__update__': {'SHA-256': 6}, '__delete__': ['SHA2']}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__delete__': ['AES-']}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 4}, '__delete__': ['DEA']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC': 10}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 6}, '__delete__': ['SHA-2', 'SHA2']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 1}}}, '__delete__': ['KA']}, 'crypto_protocol': {'__delete__': ['TLS']}, 'ecc_curve': {}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 9}}, 'NSS': {'__update__': {'NSS': 12}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'NIST': {'SP 800-135': 4}, 'RFC': {'RFC3394': 1, 'RFC5649': 1}}}}
data. - The algorithms property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#679', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 168', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 10', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 6', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '3500', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 8', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '8', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 11', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 6', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '86', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2600', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '390', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 7', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 140', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#681', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 8286', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '41', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A 2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A\n3072', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '380', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 128', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '135', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '13', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 112', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#680', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 192', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 3', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 7', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}]}
.
The computed heuristics were updated.
- The algorithms property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#679', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 168', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 10', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 6', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '3500', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 8', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '8', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 11', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 6', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '86', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2600', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '390', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 7', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 140', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#681', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 8286', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '41', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A 2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A\n3072', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '380', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 128', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '135', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '13', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 112', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#680', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 192', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 3', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 7', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}]}
values added. - The clean_cert_ids property was updated, with the
{'#2711': 1}
values inserted. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}}
data. - The web_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['2742', '2798']}, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}}
data.
The state was updated.
- The tables_done property was set to
True
.
- The keywords property was updated, with the
-
10.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*']}
values discarded. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2008-1951', 'CVE-2010-0729', 'CVE-2012-2124', 'CVE-2005-4890', 'CVE-2014-0224']}
values discarded.
- The cpe_matches property was updated, with the
-
08.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*']}
values discarded. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The web_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The cpe_matches property was updated, with the
-
31.07.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2011-0536', 'CVE-2011-1011']}
values discarded.
- The related_cves property was updated, with the
-
17.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.fips.FIPSCertificate
.
The computed heuristics were updated.
- The following values were inserted:
{'clean_cert_ids': {'#2441': 1}}
. - The _type property was set to
sec_certs.sample.fips.FIPSCertificate.Heuristics
. - The keywords property was set to
{}
. - The algorithms property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#680', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#679', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#681', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}]}
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The web_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data.
The state was updated.
- The _type property was set to
sec_certs.sample.fips.FIPSCertificate.InternalState
. - The following properties were deleted:
['fragment_path']
.
- The new value is
-
23.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
21.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
14.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The pdf_scan was updated.
- The keywords property was updated, with the
{'rules_cert_id': {}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__update__': {'FIPS 140-2': {'__update__': {'count': 1}}}, '__delete__': ['FIPS180-4', 'FIPS198-1']}, 'RFC[ ]*[0-9]+?': {'__delete__': ['RFC3394']}}}, 'rules_block_cipher_modes': {'__insert__': {'CCM': {'CCM': {'count': 1}}}, '__update__': {'GCM': {'__update__': {'GCM': {'__update__': {'count': 1}}}}}}, 'rules_crypto_libs': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': {'__update__': {'count': 1}}}}, 'NSS': {'__update__': {'NSS': {'__update__': {'count': 1}}}}}}, 'rules_other': {'__update__': {'library': {'__update__': {'library': {'__update__': {'count': 1}}}}}}}
data.
The computed heuristics were updated.
- The keywords property was updated, with the
{'rules_cert_id': {'__delete__': ['(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{4})(?!\\d)', '(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{3})(?!\\d)', '(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{1})(?!\\d)']}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__update__': {'FIPS 140-2': {'__update__': {'count': 1}}}, '__delete__': ['FIPS180-4', 'FIPS198-1']}, 'RFC[ ]*[0-9]+?': {'__delete__': ['RFC3394']}}}, 'rules_block_cipher_modes': {'__insert__': {'CCM': {'CCM': {'count': 1}}}, '__update__': {'GCM': {'__update__': {'GCM': {'__update__': {'count': 1}}}}}}, 'rules_crypto_libs': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': {'__update__': {'count': 1}}}}, 'NSS': {'__update__': {'NSS': {'__update__': {'count': 1}}}}}}, 'rules_other': {'__update__': {'library': {'__update__': {'library': {'__update__': {'count': 1}}}}}}}
data. - The algorithms property was updated.
-
07.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
24.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
22.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*']}
values added.
-
20.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
19.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
18.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
17.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
13.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:*:*:*:*:*:*']}
values discarded.
-
18.04.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
11.03.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
10.03.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
08.03.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
- The following properties were deleted:
['connections']
.
The pdf_scan was updated.
- The following properties were deleted:
['connections']
.
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2441']}}, 'web_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['2711', '2441']}}}
. - The algorithms property was updated.
- The following properties were deleted:
['connections', 'directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
-
27.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2006-5170']}
values added.
- The related_cves property was updated, with the
-
23.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
18.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['4.0']}
. - The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update5:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*', 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update3:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:4:update2:*:*:*:*:*:*']}
. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2005-0473', 'CVE-2006-3813', 'CVE-2008-1767', 'CVE-1999-1572', 'CVE-2004-1057', 'CVE-2008-1198', 'CVE-2006-5753', 'CVE-2008-2365', 'CVE-2005-0109', 'CVE-2005-3625', 'CVE-2005-0750', 'CVE-2005-0605', 'CVE-2005-3631', 'CVE-2005-0077', 'CVE-2005-3624', 'CVE-2005-0398', 'CVE-2005-0090', 'CVE-2006-6235', 'CVE-2007-4130', 'CVE-2006-5170', 'CVE-2007-3379', 'CVE-2005-0699', 'CVE-2005-3629', 'CVE-2006-7226', 'CVE-2005-0337', 'CVE-2005-0092', 'CVE-2005-0988', 'CVE-2005-2100', 'CVE-2004-1235', 'CVE-2007-1351', 'CVE-2005-0001', 'CVE-2005-1760', 'CVE-2005-2700', 'CVE-2005-0736', 'CVE-2007-1352', 'CVE-2005-1038', 'CVE-2002-2185', 'CVE-2005-0472', 'CVE-2005-0091', 'CVE-2005-3626', 'CVE-2005-0207', 'CVE-2005-1194', 'CVE-2007-0001', 'CVE-2007-1007']}
values discarded.
-
12.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The cpe_matches property was updated, with the
[[1, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [4, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [8, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*'], [11, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [12, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*'], [16, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*'], [18, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [19, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*'], [21, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [22, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*'], [23, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*'], [25, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*'], [26, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*'], [27, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [28, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:*:*:*:*:*:*'], [32, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*'], [36, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [37, 'cpe:2.3:a:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [39, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [45, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [46, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*']]
values inserted.
-
11.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[2, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [4, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*'], [6, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*'], [7, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [11, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*'], [12, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*'], [13, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [14, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:*:*:*:*:*:*'], [16, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*'], [18, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [19, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*'], [22, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [23, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:ws:*:*:*:*:*'], [25, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [26, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*'], [27, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:desktop:*:*:*:*:*'], [28, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*'], [31, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [36, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*'], [37, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*'], [38, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [39, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*'], [40, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*'], [41, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*'], [42, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [45, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*'], [46, 'cpe:2.3:a:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
09.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2007-2834']}
values discarded.
- The related_cves property was updated, with the
-
05.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[1, 'cpe:2.3:a:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
03.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*'], [1, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [2, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*'], [3, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*'], [4, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [7, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [8, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*'], [11, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*'], [13, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*'], [14, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:ws:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [16, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*'], [19, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [21, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [22, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*'], [23, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*'], [26, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*'], [27, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [30, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*'], [31, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [32, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*'], [38, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*'], [40, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*'], [42, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [46, 'cpe:2.3:a:red_hat:enterprise_linux:4:*:*:*:*:*:*:*']]
values inserted.
-
02.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The module_type property was set to
Software
. - The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:a:red_hat:enterprise_linux:4:*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [2, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:ws:*:*:*:*:*'], [3, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*'], [7, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [8, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*'], [13, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*'], [14, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:desktop:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*'], [19, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:as:*:*:*:*:*'], [21, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:desktop:*:*:*:*:*'], [23, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:es:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [26, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*'], [28, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [30, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*'], [31, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:*:*:*:*:*:*'], [32, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:es:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [36, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*'], [37, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*'], [38, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*'], [39, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*'], [40, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [41, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [42, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*'], [45, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*'], [46, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*']]
values inserted.
- The module_type property was set to
-
31.01.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The cpe_matches property was updated, with the
[[0, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*'], [1, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*'], [3, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*'], [4, 'cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*'], [6, 'cpe:2.3:o:redhat:linux:4.0:*:desktop:*:*:*:*:*'], [7, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*'], [8, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*'], [9, 'cpe:2.3:o:redhat:enterprise_linux:4.0:*:linux_kernel_2.6.9:*:*:*:*:*'], [10, 'cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:ws:*:*:*:*:*'], [13, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:*:*:*:*:*:*'], [14, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:as:*:*:*:*:*'], [15, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:as:*:*:*:*:*'], [16, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*'], [17, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:es:*:*:*:*:*'], [18, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:ws:*:*:*:*:*'], [20, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:*:*:*:*:*:*'], [22, 'cpe:2.3:o:redhat:enterprise_linux:4:update2:es:*:*:*:*:*'], [24, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:as:*:*:*:*:*'], [25, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:*:*:*:*:*:*'], [27, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:es:*:*:*:*:*'], [28, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:desktop:*:*:*:*:*'], [29, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:desktop:*:*:*:*:*'], [30, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:desktop:*:*:*:*:*'], [32, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:desktop:*:*:*:*:*'], [33, 'cpe:2.3:o:redhat:enterprise_linux:4:ga:ws:*:*:*:*:*'], [34, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:es:*:*:*:*:*'], [35, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:es:*:*:*:*:*'], [36, 'cpe:2.3:o:redhat:enterprise_linux:4:update4:ws:*:*:*:*:*'], [39, 'cpe:2.3:o:redhat:enterprise_linux:4:update6:as:*:*:*:*:*'], [40, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:ws:*:*:*:*:*'], [42, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:as:*:*:*:*:*'], [43, 'cpe:2.3:o:redhat:enterprise_linux:4:update1:*:*:*:*:*:*'], [44, 'cpe:2.3:o:redhat:enterprise_linux:4:update5:*:*:*:*:*:*'], [45, 'cpe:2.3:o:redhat:enterprise_linux:4:update3:as:*:*:*:*:*'], [46, 'cpe:2.3:a:red_hat:enterprise_linux:4:*:*:*:*:*:*:*']]
values inserted.
-
30.01.2022 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 2721,
"dgst": "5b00a7bb92c1cb19",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#679",
"CVL#680",
"CVL#681"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-1999-0390",
"CVE-1999-0894",
"CVE-2011-4967",
"CVE-2009-4067",
"CVE-2015-1819",
"CVE-2011-2897",
"CVE-1999-1329",
"CVE-2011-2699",
"CVE-2014-7169",
"CVE-2011-2717",
"CVE-1999-0192",
"CVE-2016-4983",
"CVE-1999-1335",
"CVE-1999-1182",
"CVE-2011-3188",
"CVE-1999-0868",
"CVE-1999-1299",
"CVE-2001-0886",
"CVE-1999-1347",
"CVE-2001-0889",
"CVE-1999-0769",
"CVE-2009-1837",
"CVE-1999-0041",
"CVE-1999-0043",
"CVE-2009-0846",
"CVE-2015-2877",
"CVE-2000-0701",
"CVE-1999-1348",
"CVE-1999-1346",
"CVE-2007-3103",
"CVE-1999-0034",
"CVE-1999-0297",
"CVE-2011-3585",
"CVE-1999-0042",
"CVE-2005-2492",
"CVE-2010-4251",
"CVE-2014-6271",
"CVE-2007-5494",
"CVE-2010-0013",
"CVE-2006-5170",
"CVE-1999-0130",
"CVE-2000-0017",
"CVE-1999-0037",
"CVE-1999-1332",
"CVE-2010-4805",
"CVE-2011-3191",
"CVE-1999-0002",
"CVE-2000-1207",
"CVE-1999-1333",
"CVE-1999-0798",
"CVE-2000-0170",
"CVE-2011-2525",
"CVE-2011-3363",
"CVE-1999-0009",
"CVE-2016-7091",
"CVE-2001-0690",
"CVE-1999-0872",
"CVE-2005-0087",
"CVE-2007-5079",
"CVE-2000-1220",
"CVE-2000-0118",
"CVE-2007-2030",
"CVE-2012-1097",
"CVE-1999-1288",
"CVE-2007-6285",
"CVE-2009-2416",
"CVE-2011-1145"
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.0"
]
},
"indirect_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-1999-0390",
"CVE-1999-0894",
"CVE-2011-4967",
"CVE-2009-4067",
"CVE-2015-1819",
"CVE-2011-2897",
"CVE-1999-1329",
"CVE-2011-2699",
"CVE-2014-7169",
"CVE-2011-2717",
"CVE-1999-0192",
"CVE-2016-4983",
"CVE-1999-1335",
"CVE-1999-1182",
"CVE-2011-3188",
"CVE-1999-0868",
"CVE-1999-1299",
"CVE-2001-0886",
"CVE-1999-1347",
"CVE-2001-0889",
"CVE-1999-0769",
"CVE-2009-1837",
"CVE-1999-0041",
"CVE-1999-0043",
"CVE-2009-0846",
"CVE-2015-2877",
"CVE-2000-0701",
"CVE-1999-1348",
"CVE-1999-1346",
"CVE-2007-3103",
"CVE-1999-0034",
"CVE-1999-0297",
"CVE-2011-3585",
"CVE-1999-0042",
"CVE-2005-2492",
"CVE-2010-4251",
"CVE-2014-6271",
"CVE-2007-5494",
"CVE-2010-0013",
"CVE-2006-5170",
"CVE-1999-0130",
"CVE-2000-0017",
"CVE-1999-0037",
"CVE-1999-1332",
"CVE-2010-4805",
"CVE-2011-3191",
"CVE-1999-0002",
"CVE-2000-1207",
"CVE-1999-1333",
"CVE-1999-0798",
"CVE-2000-0170",
"CVE-2011-2525",
"CVE-2011-3363",
"CVE-1999-0009",
"CVE-2016-7091",
"CVE-2001-0690",
"CVE-1999-0872",
"CVE-2005-0087",
"CVE-2007-5079",
"CVE-2000-1220",
"CVE-2000-0118",
"CVE-2007-2030",
"CVE-2012-1097",
"CVE-1999-1288",
"CVE-2007-6285",
"CVE-2009-2416",
"CVE-2011-1145"
]
},
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"2742",
"2798"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"2711",
"2441"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"2742",
"2798"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"2711",
"2441"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"2441",
"2711"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"2742",
"2798"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"2441",
"2711"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"2742",
"2798"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"1403",
"1399",
"1398",
"1405",
"2711",
"1409",
"1401",
"1402",
"1400",
"1397",
"1404",
"2441",
"1406"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"2711",
"2441"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-1999-0390",
"CVE-1999-0894",
"CVE-2011-4967",
"CVE-2009-4067",
"CVE-2015-1819",
"CVE-2011-2897",
"CVE-1999-1329",
"CVE-2011-2699",
"CVE-2014-7169",
"CVE-2011-2717",
"CVE-1999-0192",
"CVE-2016-4983",
"CVE-1999-1335",
"CVE-1999-1182",
"CVE-2011-3188",
"CVE-1999-0868",
"CVE-1999-1299",
"CVE-2001-0886",
"CVE-1999-1347",
"CVE-2001-0889",
"CVE-1999-0769",
"CVE-2009-1837",
"CVE-1999-0041",
"CVE-1999-0043",
"CVE-2009-0846",
"CVE-2015-2877",
"CVE-2000-0701",
"CVE-1999-1348",
"CVE-1999-1346",
"CVE-2007-3103",
"CVE-1999-0034",
"CVE-1999-0297",
"CVE-2011-3585",
"CVE-1999-0042",
"CVE-2005-2492",
"CVE-2010-4251",
"CVE-2014-6271",
"CVE-2007-5494",
"CVE-2010-0013",
"CVE-2006-5170",
"CVE-1999-0130",
"CVE-2000-0017",
"CVE-1999-0037",
"CVE-1999-1332",
"CVE-2010-4805",
"CVE-2011-3191",
"CVE-1999-0002",
"CVE-2000-1207",
"CVE-1999-1333",
"CVE-1999-0798",
"CVE-2000-0170",
"CVE-2011-2525",
"CVE-2011-3363",
"CVE-1999-0009",
"CVE-2016-7091",
"CVE-2001-0690",
"CVE-1999-0872",
"CVE-2005-0087",
"CVE-2007-5079",
"CVE-2000-1220",
"CVE-2000-0118",
"CVE-2007-2030",
"CVE-2012-1097",
"CVE-1999-1288",
"CVE-2007-6285",
"CVE-2009-2416",
"CVE-2011-1145"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 2048": 1
}
},
"certification_process": {},
"cipher_mode": {
"CCM": {
"CCM": 2
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"NSS": {
"NSS": 12
},
"OpenSSL": {
"OpenSSL": 9
}
},
"crypto_protocol": {
"IKE": {
"IKE": 29,
"IKEv1": 2,
"IKEv2": 2
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 22
}
},
"fips_cert_id": {
"Cert": {
"#2441": 1,
"#2711": 1,
"#679": 1,
"#680": 1,
"#681": 1
}
},
"fips_certlike": {
"Certlike": {
"AES 128, 192": 2,
"DES 168": 2,
"HMAC SHA- 256": 1,
"HMAC SHA-256": 5,
"HMAC- SHA-256": 1,
"HMAC-SHA-256": 4,
"PKCS#1": 2,
"RSA 2048": 1,
"SHA- 256": 1,
"SHA-256": 6
}
},
"fips_security_level": {
"Level": {
"Level 1": 4,
"level 1": 2
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 32,
"FIPS PUB 140-2": 1,
"FIPS140-2": 1,
"FIPS180-4": 1,
"FIPS197": 1,
"FIPS198-1": 1
},
"NIST": {
"SP 800-135": 4
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC3394": 1,
"RFC5649": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 1
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 10,
"HMAC-SHA-256": 2
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Alejandro Fabio Masino",
"/CreationDate": "D:20161219105537-06\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "FIPS 140-2",
"/Producer": "LibreOffice 5.1",
"/Title": "FIPS 140-2 Non-Proprietary Security Policy",
"pdf_file_size_bytes": 173906,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.atsec.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "51ef058076692a3dc7d051e70e9613598442d38ea9d4d709a7d3a2a7288e4b50",
"policy_txt_hash": "27581efa0595a0daa6a71f55903b725e8e8c3619ed767c51a7b924e0ddcc32d3"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "With module Red Hat Enterprise Linux NSS Cryptographic Module v4.0 validated to FIPS 140-2 under Cert. #2711 operating in FIPS mode and Red Hat Enterprise Linux 7.1 OpenSSL Module validated to FIPS 140-2 under Cert. #2441 operating in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertAug2016.pdf",
"date_sunset": null,
"description": "Red Hat Enterprise Linux Libreswan Cryptographic Module v4.0 is a software only cryptographic module that provides the IKE protocol version 1 and version 2 key agreement services required for IPSec.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"2441": 1,
"2711": 1
},
"module_name": "Red Hat Enterprise Linux Libreswan Cryptographic Module v4.0",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "4.0",
"tested_conf": [
"Red Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 with PAA",
"Red Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 without PAA",
"Red Hat Enterprise Linux 7.1 running on IBM Power8 Little Endian 8286-41A",
"Red Hat Enterprise Linux 7.1 running on IBM z13 (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2016-08-29",
"lab": "ATSEC INFORMATION SECURITY CORP",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2016-12-20",
"lab": "ATSEC INFORMATION SECURITY CORP",
"validation_type": "Update"
}
],
"vendor": "Red Hat\u00ae, Inc.",
"vendor_url": "http://www.redhat.com"
}
}