This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Red Hat Enterprise Linux OpenSSL Cryptographic Module |
Red Hat Enterprise Linux OpenSSL Cryptographic Module |
|
---|---|---|
cert_id | 3538 | 3016 |
dgst | 112b89e61925b93e | dee71b933e851f00 |
heuristics/algorithms | AES#C303, DSA#C297, SHS#C336, AES#C327, CVL#C329, ECDSA#C297, KTS#C336, HMAC#C304, Triple-DES#C336, Triple-DES#C302, SHS#C316, CVL#C297, DSA#C329, AES#C316, HMAC#C303, DRBG#C321, HMAC#C297, DRBG#C303, DRBG#C328, AES#C329, KTS#C302, KTS#C329, AES#C328, HMAC#C329, SHS#C327, Triple-DES#C329, SHS#C304, KTS#C304, HMAC#C336, DRBG#C329, SHS#C321, DRBG#C304, AES#C336, SHS#C302, SHS#C297, CVL#C316, AES#C297, DRBG#C336, KTS#C316, KTS#C297, AES#C302, KTS#C321, KTS#C327, DRBG#C316, AES#C304, HMAC#C327, RSA#C297, DSA#C336, KTS#C303, HMAC#C316, KTS#C328, ECDSA#C336, CVL#C321, DRBG#C297, SHS#C303, ECDSA#C329, HMAC#C302, DRBG#C327, CVL#C302, Triple-DES#C297, SHS#C329, DRBG#C302, HMAC#C321, AES#C321, HMAC#C328, CVL#C336, RSA#C302, SHS#C328, DSA#C302, RSA#C336, ECDSA#C302, RSA#C329 | HMAC#3445, SHA#3843, SHA#3824, AES#4696, SHA#4201, DRBG#1981, RSA#2535, DRBG#1593, CVL#1339, RSA#2544, AES#5212, HMAC#3453, HMAC#3110, RSA#2546, DRBG#1980, DRBG#1567, CVL#1298, CVL#1690, SHA#4207, DRBG#1983, CVL#1319, DSA#1346, HMAC#3447, Triple-DES#2471, DRBG#1597, DSA#1235, RSA#2792, HMAC#3088, HMAC#3107, CVL#1321, HMAC#3090, DSA#1237, HMAC#3449, DRBG#1594, HMAC#3112, CVL#1318, SHA#3821, SHA#4197, CVL#1299, DSA#1349, SHA#4198, AES#4664, AES#5207, DRBG#1596, DRBG#1598, AES#4695, Triple-DES#2483, ECDSA#1353, SHA#4199, AES#4644, Triple-DES#2639, AES#5205, CVL#1700, CVL#1320, DRBG#1595, CVL#1312, HMAC#3111, SHA#4195, HMAC#3450, RSA#2789, AES#5227, HMAC#3452, Triple-DES#2641, HMAC#3451, HMAC#3091, SHA#4193, CVL#1693, AES#4697, RSA#2787, ECDSA#1151, AES#4699, AES#5209, DRBG#1976, AES#4667, CVL#1694, HMAC#3454, Triple-DES#2484, ECDSA#1350, AES#4698, DSA#1347, CVL#1313, DRBG#1993, RSA#2547, HMAC#3109, CVL#1689, SHA#4200, SHA#3846, SHA#3844, DRBG#1977, HMAC#3459, DRBG#1982, SHA#3845, SHA#4194, ECDSA#1150, SHA#3823, DRBG#1578, SHA#3807, ECDSA#1144, HMAC#3076, AES#4700, ECDSA#1148, Triple-DES#2638, SHA#3842, AES#5208, CVL#1701, DRBG#1975, DSA#1350, RSA#2786, DSA#1238, HMAC#3108, SHA#3847, DRBG#1576, DRBG#1984, CVL#1692, DRBG#1579, AES#5210, HMAC#3446, CVL#1687, DSA#1228, ECDSA#1348, AES#4666, Triple-DES#2481, CVL#1338, CVL#1691, ECDSA#1347, AES#5211, AES#5204, DRBG#1979, Triple-DES#2642, CVL#1688, SHA#4202, AES#5203 |
heuristics/direct_transitive_cves | CVE-2021-3672, CVE-2018-16850, CVE-2015-7837, CVE-2001-0946, CVE-2001-0119, CVE-2002-1509, CVE-2004-1335, CVE-2015-5229, CVE-2003-0247, CVE-2002-1160, CVE-2017-15710, CVE-2004-0905, CVE-2001-0869, CVE-2001-0117, CVE-2001-0143, CVE-2001-0473, CVE-2018-18311, CVE-2002-0083, CVE-2004-1025, CVE-2001-0977, CVE-2017-15715, CVE-2002-0044, CVE-2018-14645, CVE-2018-12373, CVE-2001-0120, CVE-2018-8778, CVE-2002-0045, CVE-2000-0963, CVE-2018-1002200, CVE-1999-0037, CVE-2018-1301, CVE-2018-18314, CVE-2003-0370, CVE-2018-20615, CVE-2002-0080, CVE-2015-7833, CVE-2016-9675, CVE-2000-1213, CVE-2001-0116, CVE-2003-0464, CVE-2000-1208, CVE-2019-9636, CVE-2003-0188, CVE-2000-0701, CVE-2004-1026, CVE-2001-0439, CVE-2018-1000199, CVE-2018-3760, CVE-2018-12372, CVE-2018-16866, CVE-2004-0081, CVE-2001-0690, CVE-2000-0017, CVE-2001-0197, CVE-2002-1155, CVE-2003-0194, CVE-2018-11763, CVE-2001-1013, CVE-2001-0118, CVE-2018-10184, CVE-2004-0904, CVE-2001-0140, CVE-2005-0750, CVE-2018-1283, CVE-2001-0886, CVE-2018-16396, CVE-2007-3103, CVE-2002-0638, CVE-2001-1375, CVE-2018-8777, CVE-2019-12384, CVE-2016-7091, CVE-2002-0002, CVE-2004-1613, CVE-2001-1002, CVE-2000-0816, CVE-2000-1207, CVE-2017-1000253, CVE-2019-14816, CVE-2018-1124, CVE-2017-15134, CVE-2003-0461, CVE-2000-1095, CVE-1999-0894, CVE-2004-0112, CVE-2004-0902, CVE-2001-1374, CVE-2016-3616, CVE-2018-14618, CVE-2001-0889, CVE-2000-0917, CVE-2016-3699, CVE-2001-0787, CVE-2001-0859, CVE-2018-18313, CVE-2003-0364, CVE-2018-12374, CVE-2001-0441, CVE-2001-0233, CVE-2004-0903, CVE-2001-0641, CVE-2002-0836, CVE-2004-1333, CVE-2001-1030, CVE-2018-17456, CVE-2003-0354, CVE-2018-1111, CVE-2001-0852, CVE-1999-0297, CVE-2001-0128, CVE-2004-1334, CVE-2003-0248, CVE-2001-0872, CVE-2002-1232, CVE-2001-0138, CVE-2018-6914, CVE-2017-5645, CVE-2003-0041, CVE-2001-0139, CVE-2001-0736, CVE-2001-1383, CVE-1999-1288, CVE-2018-1079, CVE-2011-2767, CVE-2004-0079, CVE-2018-16395, CVE-1999-0798, CVE-2018-18312, CVE-2003-0434, CVE-2001-0635, CVE-2000-1214, CVE-2001-0142 | {} |
heuristics/indirect_transitive_cves | CVE-2021-3672, CVE-2018-16850, CVE-2015-7837, CVE-2001-0946, CVE-2001-0119, CVE-2002-1509, CVE-2004-1335, CVE-2015-5229, CVE-2003-0247, CVE-2002-1160, CVE-2017-15710, CVE-2004-0905, CVE-2001-0869, CVE-2001-0117, CVE-2001-0143, CVE-2001-0473, CVE-2018-18311, CVE-2002-0083, CVE-2004-1025, CVE-2001-0977, CVE-2017-15715, CVE-2002-0044, CVE-2018-14645, CVE-2018-12373, CVE-2001-0120, CVE-2018-8778, CVE-2002-0045, CVE-2000-0963, CVE-2018-1002200, CVE-1999-0037, CVE-2018-1301, CVE-2018-18314, CVE-2003-0370, CVE-2018-20615, CVE-2002-0080, CVE-2015-7833, CVE-2016-9675, CVE-2000-1213, CVE-2001-0116, CVE-2003-0464, CVE-2000-1208, CVE-2019-9636, CVE-2003-0188, CVE-2000-0701, CVE-2004-1026, CVE-2001-0439, CVE-2018-1000199, CVE-2018-3760, CVE-2018-12372, CVE-2018-16866, CVE-2004-0081, CVE-2001-0690, CVE-2000-0017, CVE-2001-0197, CVE-2002-1155, CVE-2003-0194, CVE-2018-11763, CVE-2001-1013, CVE-2001-0118, CVE-2018-10184, CVE-2004-0904, CVE-2001-0140, CVE-2005-0750, CVE-2018-1283, CVE-2001-0886, CVE-2018-16396, CVE-2007-3103, CVE-2002-0638, CVE-2001-1375, CVE-2018-8777, CVE-2019-12384, CVE-2016-7091, CVE-2002-0002, CVE-2004-1613, CVE-2001-1002, CVE-2000-0816, CVE-2000-1207, CVE-2017-1000253, CVE-2019-14816, CVE-2018-1124, CVE-2017-15134, CVE-2003-0461, CVE-2000-1095, CVE-1999-0894, CVE-2004-0112, CVE-2004-0902, CVE-2001-1374, CVE-2016-3616, CVE-2018-14618, CVE-2001-0889, CVE-2000-0917, CVE-2016-3699, CVE-2001-0787, CVE-2001-0859, CVE-2018-18313, CVE-2003-0364, CVE-2018-12374, CVE-2001-0441, CVE-2001-0233, CVE-2004-0903, CVE-2001-0641, CVE-2002-0836, CVE-2004-1333, CVE-2001-1030, CVE-2018-17456, CVE-2003-0354, CVE-2018-1111, CVE-2001-0852, CVE-1999-0297, CVE-2001-0128, CVE-2004-1334, CVE-2003-0248, CVE-2001-0872, CVE-2002-1232, CVE-2001-0138, CVE-2018-6914, CVE-2017-5645, CVE-2003-0041, CVE-2001-0139, CVE-2001-0736, CVE-2001-1383, CVE-1999-1288, CVE-2018-1079, CVE-2011-2767, CVE-2004-0079, CVE-2018-16395, CVE-1999-0798, CVE-2018-18312, CVE-2003-0434, CVE-2001-0635, CVE-2000-1214, CVE-2001-0142 | {} |
heuristics/module_processed_references/directly_referenced_by | 3563 | 3293, 3083, 3067, 3063 |
heuristics/module_processed_references/indirectly_referenced_by | 3563 | 3293, 3083, 3067, 3063 |
heuristics/policy_processed_references/directly_referenced_by | 3563 | 3293, 3083, 3067, 3063 |
heuristics/policy_processed_references/indirectly_referenced_by | 3563 | 3293, 3083, 3067, 3063 |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/SeptConsolidated.pdf | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertSept2017.pdf |
web_data/sw_versions | 7.0 | 5.0[1] , 6.0[2] |
web_data/tested_conf | Red Hat Enterprise Linux 7 running on Dell PowerEdge R630 with an Intel(R) Xeon(R) E5 with PAA, Red Hat Enterprise Linux 7 running on Dell PowerEdge R630 with an Intel(R) Xeon(R) E5 without PAA (single-user mode), , | Red Hat Enterprise Linux 7.4 running on Dell PowerEdge R630 with PAA[1], Red Hat Enterprise Linux 7.4 running on Dell PowerEdge R630 without PAA[1] (single-user mode), Red Hat Enterprise Linux 7.5 running on Dell PowerEdge R630 with PAA[2], Red Hat Enterprise Linux 7.5 running on Dell PowerEdge R630 without PAA[2] (single-user mode) |
web_data/validation_history |
|
|