This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Red Hat Enterprise Linux OpenSSL Cryptographic Module |
Red Hat Enterprise Linux OpenSSL Cryptographic Module |
|
---|---|---|
cert_id | 3538 | 3016 |
dgst | 112b89e61925b93e | dee71b933e851f00 |
heuristics/algorithms | DSA#C302, AES#C328, HMAC#C303, HMAC#C304, ECDSA#C297, SHS#C327, DRBG#C327, HMAC#C321, HMAC#C302, HMAC#C316, SHS#C328, AES#C329, DRBG#C304, CVL#C297, KTS#C321, Triple-DES#C329, HMAC#C297, DRBG#C303, HMAC#C328, KTS#C327, DRBG#C321, RSA#C336, AES#C321, SHS#C329, AES#C297, ECDSA#C329, SHS#C304, SHS#C302, DSA#C297, SHS#C297, SHS#C316, CVL#C316, CVL#C321, Triple-DES#C297, ECDSA#C302, Triple-DES#C336, KTS#C316, KTS#C329, CVL#C336, AES#C316, DRBG#C302, HMAC#C336, ECDSA#C336, SHS#C321, HMAC#C327, CVL#C302, DRBG#C336, DRBG#C297, RSA#C302, Triple-DES#C302, DSA#C329, AES#C336, KTS#C302, KTS#C328, RSA#C329, DRBG#C329, DRBG#C328, AES#C327, RSA#C297, SHS#C336, KTS#C303, CVL#C329, DRBG#C316, AES#C302, SHS#C303, AES#C304, KTS#C304, HMAC#C329, KTS#C336, AES#C303, KTS#C297, DSA#C336 | SHA#3824, AES#5212, DRBG#1579, SHA#4207, DSA#1347, CVL#1321, RSA#2544, CVL#1298, DRBG#1981, HMAC#3445, ECDSA#1151, ECDSA#1148, SHA#3807, DRBG#1593, SHA#4201, DRBG#1567, HMAC#3109, SHA#4195, AES#4664, AES#4699, DSA#1238, HMAC#3451, CVL#1687, CVL#1691, HMAC#3091, DRBG#1596, CVL#1692, SHA#3823, HMAC#3453, SHA#4194, CVL#1320, RSA#2789, SHA#4193, ECDSA#1150, AES#4698, AES#5203, DSA#1349, CVL#1689, CVL#1318, DRBG#1975, SHA#3844, AES#5209, SHA#4202, AES#4666, Triple-DES#2641, DRBG#1979, Triple-DES#2471, ECDSA#1350, SHA#3821, CVL#1694, DRBG#1984, HMAC#3446, CVL#1338, CVL#1693, AES#5205, CVL#1319, RSA#2787, DRBG#1578, RSA#2792, Triple-DES#2483, HMAC#3090, AES#4644, HMAC#3449, SHA#3847, DSA#1346, AES#4667, AES#4697, SHA#4200, CVL#1312, AES#5207, CVL#1701, RSA#2547, SHA#3845, SHA#4199, DRBG#1595, HMAC#3112, DRBG#1976, HMAC#3447, DSA#1235, HMAC#3107, HMAC#3452, AES#4700, SHA#3842, ECDSA#1144, DRBG#1980, HMAC#3110, Triple-DES#2639, DRBG#1982, DRBG#1993, DRBG#1977, SHA#3846, DRBG#1598, CVL#1690, HMAC#3454, DRBG#1983, DRBG#1576, RSA#2786, HMAC#3459, CVL#1313, CVL#1688, HMAC#3450, AES#4695, HMAC#3108, AES#5208, DSA#1350, CVL#1299, ECDSA#1348, Triple-DES#2638, SHA#4197, AES#4696, Triple-DES#2642, Triple-DES#2481, DRBG#1594, Triple-DES#2484, CVL#1339, ECDSA#1353, DRBG#1597, CVL#1700, HMAC#3088, AES#5227, AES#5211, ECDSA#1347, RSA#2546, DSA#1228, HMAC#3111, AES#5204, SHA#4198, AES#5210, HMAC#3076, DSA#1237, SHA#3843, RSA#2535 |
heuristics/direct_transitive_cves | CVE-2019-9636, CVE-2001-1002, CVE-2018-11763, CVE-2011-2767, CVE-2000-1207, CVE-2001-0128, CVE-2003-0364, CVE-2018-14618, CVE-2000-1214, CVE-2001-0869, CVE-1999-0297, CVE-2002-0083, CVE-2003-0188, CVE-1999-0798, CVE-2001-0441, CVE-2016-9675, CVE-2016-3616, CVE-2017-15715, CVE-2001-0946, CVE-2003-0247, CVE-2001-0139, CVE-2004-1333, CVE-2003-0041, CVE-2004-1026, CVE-2002-0080, CVE-2004-1613, CVE-2018-16396, CVE-2018-8777, CVE-2018-18311, CVE-2001-0859, CVE-2018-1079, CVE-2001-0119, CVE-2001-0116, CVE-2018-18314, CVE-2016-3699, CVE-2003-0370, CVE-2001-0473, CVE-2002-1509, CVE-2004-0904, CVE-2004-0112, CVE-2004-0905, CVE-2017-15134, CVE-2004-1025, CVE-2015-5229, CVE-2002-0044, CVE-2001-0120, CVE-2005-0750, CVE-2002-0836, CVE-2001-0143, CVE-1999-1288, CVE-2018-1000199, CVE-1999-0037, CVE-2002-1160, CVE-2000-0917, CVE-2018-12374, CVE-2017-5645, CVE-2018-1301, CVE-2018-16866, CVE-2001-0142, CVE-2018-1283, CVE-2001-0233, CVE-2000-0963, CVE-2001-1374, CVE-2001-0690, CVE-2018-12373, CVE-2001-0736, CVE-2001-0140, CVE-2016-7091, CVE-2002-1232, CVE-2018-10184, CVE-2019-14816, CVE-2018-1124, CVE-2000-0017, CVE-2001-0852, CVE-2018-8778, CVE-2002-0045, CVE-2018-18313, CVE-2015-7833, CVE-2001-1013, CVE-2004-0079, CVE-2018-1002200, CVE-2003-0194, CVE-2003-0464, CVE-2001-0197, CVE-2018-20615, CVE-2003-0248, CVE-2003-0354, CVE-2018-18312, CVE-2018-17456, CVE-2003-0434, CVE-2017-1000253, CVE-2018-16850, CVE-2004-1335, CVE-2001-0977, CVE-2001-1030, CVE-2000-1208, CVE-2018-3760, CVE-2001-0439, CVE-2021-3672, CVE-1999-0894, CVE-2002-1155, CVE-2001-0872, CVE-2001-0635, CVE-2001-0889, CVE-2001-0787, CVE-2018-14645, CVE-2000-1095, CVE-2019-12384, CVE-2017-15710, CVE-2007-3103, CVE-2000-0816, CVE-2003-0461, CVE-2018-6914, CVE-2001-1383, CVE-2002-0638, CVE-2018-12372, CVE-2004-0081, CVE-2018-16395, CVE-2001-0886, CVE-2001-0138, CVE-2001-0641, CVE-2001-1375, CVE-2002-0002, CVE-2004-0903, CVE-2001-0117, CVE-2018-1111, CVE-2000-0701, CVE-2001-0118, CVE-2015-7837, CVE-2000-1213, CVE-2004-1334, CVE-2004-0902 | {} |
heuristics/indirect_transitive_cves | CVE-2019-9636, CVE-2001-1002, CVE-2018-11763, CVE-2011-2767, CVE-2000-1207, CVE-2001-0128, CVE-2003-0364, CVE-2018-14618, CVE-2000-1214, CVE-2001-0869, CVE-1999-0297, CVE-2002-0083, CVE-2003-0188, CVE-1999-0798, CVE-2001-0441, CVE-2016-9675, CVE-2016-3616, CVE-2017-15715, CVE-2001-0946, CVE-2003-0247, CVE-2001-0139, CVE-2004-1333, CVE-2003-0041, CVE-2004-1026, CVE-2002-0080, CVE-2004-1613, CVE-2018-16396, CVE-2018-8777, CVE-2018-18311, CVE-2001-0859, CVE-2018-1079, CVE-2001-0119, CVE-2001-0116, CVE-2018-18314, CVE-2016-3699, CVE-2003-0370, CVE-2001-0473, CVE-2002-1509, CVE-2004-0904, CVE-2004-0112, CVE-2004-0905, CVE-2017-15134, CVE-2004-1025, CVE-2015-5229, CVE-2002-0044, CVE-2001-0120, CVE-2005-0750, CVE-2002-0836, CVE-2001-0143, CVE-1999-1288, CVE-2018-1000199, CVE-1999-0037, CVE-2002-1160, CVE-2000-0917, CVE-2018-12374, CVE-2017-5645, CVE-2018-1301, CVE-2018-16866, CVE-2001-0142, CVE-2018-1283, CVE-2001-0233, CVE-2000-0963, CVE-2001-1374, CVE-2001-0690, CVE-2018-12373, CVE-2001-0736, CVE-2001-0140, CVE-2016-7091, CVE-2002-1232, CVE-2018-10184, CVE-2019-14816, CVE-2018-1124, CVE-2000-0017, CVE-2001-0852, CVE-2018-8778, CVE-2002-0045, CVE-2018-18313, CVE-2015-7833, CVE-2001-1013, CVE-2004-0079, CVE-2018-1002200, CVE-2003-0194, CVE-2003-0464, CVE-2001-0197, CVE-2018-20615, CVE-2003-0248, CVE-2003-0354, CVE-2018-18312, CVE-2018-17456, CVE-2003-0434, CVE-2017-1000253, CVE-2018-16850, CVE-2004-1335, CVE-2001-0977, CVE-2001-1030, CVE-2000-1208, CVE-2018-3760, CVE-2001-0439, CVE-2021-3672, CVE-1999-0894, CVE-2002-1155, CVE-2001-0872, CVE-2001-0635, CVE-2001-0889, CVE-2001-0787, CVE-2018-14645, CVE-2000-1095, CVE-2019-12384, CVE-2017-15710, CVE-2007-3103, CVE-2000-0816, CVE-2003-0461, CVE-2018-6914, CVE-2001-1383, CVE-2002-0638, CVE-2018-12372, CVE-2004-0081, CVE-2018-16395, CVE-2001-0886, CVE-2001-0138, CVE-2001-0641, CVE-2001-1375, CVE-2002-0002, CVE-2004-0903, CVE-2001-0117, CVE-2018-1111, CVE-2000-0701, CVE-2001-0118, CVE-2015-7837, CVE-2000-1213, CVE-2004-1334, CVE-2004-0902 | {} |
heuristics/module_processed_references/directly_referenced_by | 3563 | 3293, 3083, 3067, 3063 |
heuristics/module_processed_references/indirectly_referenced_by | 3563 | 3293, 3083, 3067, 3063 |
heuristics/policy_processed_references/directly_referenced_by | 3563 | 3293, 3083, 3067, 3063 |
heuristics/policy_processed_references/indirectly_referenced_by | 3563 | 3293, 3083, 3067, 3063 |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/SeptConsolidated.pdf | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertSept2017.pdf |
web_data/sw_versions | 7.0 | 5.0[1] , 6.0[2] |
web_data/tested_conf | Red Hat Enterprise Linux 7 running on Dell PowerEdge R630 with an Intel(R) Xeon(R) E5 with PAA, Red Hat Enterprise Linux 7 running on Dell PowerEdge R630 with an Intel(R) Xeon(R) E5 without PAA (single-user mode), None, None | Red Hat Enterprise Linux 7.4 running on Dell PowerEdge R630 with PAA[1], Red Hat Enterprise Linux 7.4 running on Dell PowerEdge R630 without PAA[1] (single-user mode), Red Hat Enterprise Linux 7.5 running on Dell PowerEdge R630 with PAA[2], Red Hat Enterprise Linux 7.5 running on Dell PowerEdge R630 without PAA[2] (single-user mode) |
web_data/validation_history |
|
|