cert_id |
4780 |
4846 |
dgst |
259748e36ea45836 |
e4819f21c5e21c3a |
heuristics/algorithms |
KAS-ECC-SSC Sp800-56Ar3A3478, SHA3-384A3480, TLS v1.2 KDF RFC7627A3478, AES-XTS Testing Revision 2.0A3479, AES-CCMA3550, SHA2-384A3552, ECDSA SigVer (FIPS186-4)A3478, HMAC-SHA2-384A3552, KAS-FFC-SSC Sp800-56Ar3A3478, SHA3-512A3480, RSA SigVer (FIPS186-4)A3478, Safe Primes Key GenerationA3478, AES-GMACA3478, HMAC-SHA2-256A3552, SHA2-224A3552, AES-CBCA3551, ECDSA KeyGen (FIPS186-4)A3478, SHA2-256A3552, PBKDFA3478, AES-GCMA3551, SHA2-512A3552, SHA-1A3552, AES-ECBA3478, SHA3-224A3480, RSA SigGen (FIPS186-4)A3478, AES-CMACA3550, ECDSA KeyVer (FIPS186-4)A3478, HMAC-SHA-1A3552, Counter DRBGA3478, RSA KeyGen (FIPS186-4)A3478, HMAC-SHA2-512A3552, AES-CFB8A3481, ECDSA SigGen (FIPS186-4)A3478, SHA3-256A3480, HMAC-SHA2-224A3552, KDA HKDF Sp800-56Cr1A3477 |
TLS v1.2 KDF RFC7627A4833, SHA3-224A4835, AES-CFB8A4836, Safe Primes Key GenerationA4833, ECDSA SigVer (FIPS186-4)A4833, ECDSA KeyGen (FIPS186-4)A4833, AES-CMACA4833, HMAC-SHA2-384A4833, SHA2-384A4833, KDA HKDF Sp800-56Cr1A4832, HMAC-SHA2-256A4833, KAS-FFC-SSC Sp800-56Ar3A4833, SHA3-512A4835, SHA3-384A4835, SHA2-512A4833, HMAC-SHA2-224A4833, HMAC-SHA-1A4833, HMAC-SHA2-512A4833, AES-GMACA4833, ECDSA SigGen (FIPS186-4)A4833, SHA2-256A4833, AES-CBCA4833, AES-XTS Testing Revision 2.0A4834, SHA-1A4833, PBKDFA4833, AES-ECBA4842, RSA KeyGen (FIPS186-4)A4833, KAS-ECC-SSC Sp800-56Ar3A4833, AES-CCMA4827, SHA2-224A4833, AES-GCMA4833, RSA SigGen (FIPS186-4)A4833, ECDSA KeyVer (FIPS186-4)A4833, Counter DRBGA4833, RSA SigVer (FIPS186-4)A4833, SHA3-256A4835 |
heuristics/cpe_matches |
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:9.1:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:9.1:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
9 |
9 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
CVE-2023-5156, CVE-1999-0798, CVE-2024-1048, CVE-2021-3997, CVE-2023-6710, CVE-2023-5367, CVE-2022-4283, CVE-2024-44070, CVE-2022-3424, CVE-2023-5992, CVE-2021-3864, CVE-2022-2078, CVE-2023-7216, CVE-2022-34302, CVE-2024-0409, CVE-2024-0443, CVE-2023-40551, CVE-2023-1729, CVE-2023-3972, CVE-2023-0494, CVE-2023-6531, CVE-2024-0639, CVE-2022-1355, CVE-2023-40745, CVE-2023-39417, CVE-2023-38470, CVE-2023-6536, CVE-2023-0778, CVE-2023-48795, CVE-2023-42756, CVE-1999-1288, CVE-2022-1247, CVE-2000-0701, CVE-2023-43789, CVE-2022-2639, CVE-2023-3812, CVE-2022-2963, CVE-2023-5871, CVE-2023-3576, CVE-2023-43787, CVE-2023-4527, CVE-2023-43785, CVE-2023-50387, CVE-2023-4535, CVE-2023-5088, CVE-2022-0168, CVE-2021-3695, CVE-2022-0934, CVE-2024-3056, CVE-2022-4132, CVE-2023-41175, CVE-2022-3500, CVE-2003-0464, CVE-2024-0408, CVE-2020-14394, CVE-2022-0987, CVE-2022-1184, CVE-2024-0217, CVE-2023-6121, CVE-2023-2454, CVE-1999-0037, CVE-2022-2393, CVE-2023-4569, CVE-2000-1207, CVE-2024-6237, CVE-2023-6004, CVE-2023-1513, CVE-2024-0193, CVE-2023-52356, CVE-2022-2153, CVE-2024-45615, CVE-2023-38201, CVE-2023-3772, CVE-2022-1586, CVE-2023-40549, CVE-2023-2283, CVE-2022-0171, CVE-2023-1289, CVE-2024-7006, CVE-2024-0646, CVE-2023-4133, CVE-2023-1652, CVE-2023-2156, CVE-2022-1354, CVE-2001-0889, CVE-2024-0641, CVE-2023-51765, CVE-2023-3640, CVE-2023-6679, CVE-2023-2602, CVE-2024-23301, CVE-2022-1949, CVE-2022-1789, CVE-2022-1652, CVE-2007-3103, CVE-2024-8443, CVE-2023-5380, CVE-2023-6535, CVE-2023-5824, CVE-2022-3715, CVE-2023-1206, CVE-2023-34967, CVE-2023-50782, CVE-2003-0364, CVE-2023-52355, CVE-2023-46846, CVE-2023-6240, CVE-2021-4158, CVE-2023-4194, CVE-2022-1852, CVE-2002-1155, CVE-2022-3821, CVE-2024-3567, CVE-2000-0017, CVE-2023-3138, CVE-2022-1198, CVE-2003-0442, CVE-2023-27561, CVE-2023-50781, CVE-2003-0461, CVE-2023-3019, CVE-2023-34966, CVE-2024-1151, CVE-2022-0480, CVE-1999-0894, CVE-2023-4155, CVE-2001-0690, CVE-2023-43786, CVE-2023-46847, CVE-2023-6622, CVE-2022-4743, CVE-2023-46848, CVE-2023-5215, CVE-2022-1462, CVE-2024-6239, CVE-2023-33203, CVE-2023-39191, CVE-2022-2990, CVE-2022-1587, CVE-2022-34303, CVE-2023-6610, CVE-2023-40661, CVE-2023-6606, CVE-2022-3560, CVE-2024-45620, CVE-2024-1454, CVE-2021-3839, CVE-2023-52160, CVE-2023-4641, CVE-2023-3899, CVE-2023-2455, CVE-2023-32573, CVE-2022-2509, CVE-2022-25309, CVE-2021-35937, CVE-2023-2203, CVE-2023-1095, CVE-2023-4911, CVE-2023-1192, CVE-2023-40547, CVE-2022-1998, CVE-2023-3301, CVE-2023-1672, CVE-2022-2127, CVE-2023-4147, CVE-2024-0914, CVE-2023-3269, CVE-2023-1981, CVE-2023-5869, CVE-2023-2491, CVE-2023-32373, CVE-2022-2132, CVE-2024-0564, CVE-2021-4217, CVE-2023-42669, CVE-2023-38200, CVE-2023-6546, CVE-2024-0229, CVE-2023-6681, CVE-2023-6176, CVE-2022-1016, CVE-2023-2295, CVE-2024-45617, CVE-2021-35938, CVE-2022-2625, CVE-2023-5178, CVE-2023-3212, CVE-2024-5742, CVE-2021-3696, CVE-2023-6918, CVE-2023-1667, CVE-2022-4285, CVE-2016-7091, CVE-2024-0775, CVE-2023-3567, CVE-2023-2977, CVE-2021-3697, CVE-2023-5870, CVE-2022-1263, CVE-2021-4204, CVE-2023-39189, CVE-2023-38469, CVE-2023-5633, CVE-2024-0553, CVE-2023-4010, CVE-2024-6387, CVE-2023-2194, CVE-2024-0232, CVE-2022-1708, CVE-2023-40550, CVE-2023-2603, CVE-2023-1183, CVE-2022-1706, CVE-2023-2680, CVE-2023-3750, CVE-2024-8354, CVE-2023-4004, CVE-2023-3255, CVE-2023-2513, CVE-2023-34968, CVE-2022-34301, CVE-2022-2873, CVE-2023-0664, CVE-2023-42754, CVE-2023-4387, CVE-2023-38559, CVE-2022-40982, CVE-2023-3354, CVE-2023-51764, CVE-2024-3049, CVE-2023-1073, CVE-2022-2989, CVE-2022-3787, CVE-2003-0434, CVE-2023-3161, CVE-2023-39193, CVE-2023-39198, CVE-2023-4806, CVE-1999-0297, CVE-2022-2850, CVE-2023-6683, CVE-2023-38473, CVE-2023-6356, CVE-2023-33952, CVE-2023-28327, CVE-2023-3773, CVE-2022-1158, CVE-2022-2964, CVE-2023-51767, CVE-2022-2211, CVE-2022-25308, CVE-2023-4001, CVE-2023-40660, CVE-2022-25310, CVE-2023-3164, CVE-2023-4692, CVE-2023-4813, CVE-2023-39418, CVE-2024-6505, CVE-2023-4459, CVE-2024-0562, CVE-2023-2019, CVE-2023-44487, CVE-2023-4273, CVE-2023-39194, CVE-2024-45619, CVE-2023-5557, CVE-2023-6915, CVE-2023-42753, CVE-2023-5868, CVE-2023-5157, CVE-2023-5455, CVE-2022-4904, CVE-2023-0179, CVE-2024-45616, CVE-2023-32233, CVE-2023-2731, CVE-2023-0361, CVE-2023-2953, CVE-2023-2700, CVE-2023-5090, CVE-2024-45618, CVE-2023-38471, CVE-2023-3347, CVE-2023-1380, CVE-2023-6693, CVE-2023-7192, CVE-2023-44488, CVE-2023-5981, CVE-2024-0607, CVE-2024-50074, CVE-2024-0841, CVE-2023-3618, CVE-2023-4693, CVE-2023-38472, CVE-2022-3707, CVE-2023-43788, CVE-2023-40546, CVE-2024-0690, CVE-2023-33951 |
CVE-2023-5156, CVE-1999-0798, CVE-2024-1048, CVE-2021-3997, CVE-2023-6710, CVE-2023-5367, CVE-2022-4283, CVE-2024-44070, CVE-2022-3424, CVE-2023-5992, CVE-2021-3864, CVE-2022-2078, CVE-2023-7216, CVE-2022-34302, CVE-2024-0409, CVE-2024-0443, CVE-2023-40551, CVE-2023-1729, CVE-2023-3972, CVE-2023-0494, CVE-2023-6531, CVE-2024-0639, CVE-2022-1355, CVE-2023-40745, CVE-2023-39417, CVE-2023-38470, CVE-2023-6536, CVE-2023-0778, CVE-2023-48795, CVE-2023-42756, CVE-1999-1288, CVE-2022-1247, CVE-2000-0701, CVE-2023-43789, CVE-2022-2639, CVE-2023-3812, CVE-2022-2963, CVE-2023-5871, CVE-2023-3576, CVE-2023-43787, CVE-2023-4527, CVE-2023-43785, CVE-2023-50387, CVE-2023-4535, CVE-2023-5088, CVE-2022-0168, CVE-2021-3695, CVE-2022-0934, CVE-2024-3056, CVE-2022-4132, CVE-2023-41175, CVE-2022-3500, CVE-2003-0464, CVE-2024-0408, CVE-2020-14394, CVE-2022-0987, CVE-2022-1184, CVE-2024-0217, CVE-2023-6121, CVE-2023-2454, CVE-1999-0037, CVE-2022-2393, CVE-2023-4569, CVE-2000-1207, CVE-2024-6237, CVE-2023-6004, CVE-2023-1513, CVE-2024-0193, CVE-2023-52356, CVE-2022-2153, CVE-2024-45615, CVE-2023-38201, CVE-2023-3772, CVE-2022-1586, CVE-2023-40549, CVE-2023-2283, CVE-2022-0171, CVE-2023-1289, CVE-2024-7006, CVE-2024-0646, CVE-2023-4133, CVE-2023-1652, CVE-2023-2156, CVE-2022-1354, CVE-2001-0889, CVE-2024-0641, CVE-2023-51765, CVE-2023-3640, CVE-2023-6679, CVE-2023-2602, CVE-2024-23301, CVE-2022-1949, CVE-2022-1789, CVE-2022-1652, CVE-2007-3103, CVE-2024-8443, CVE-2023-5380, CVE-2023-6535, CVE-2023-5824, CVE-2022-3715, CVE-2023-1206, CVE-2023-34967, CVE-2023-50782, CVE-2003-0364, CVE-2023-52355, CVE-2023-46846, CVE-2023-6240, CVE-2021-4158, CVE-2023-4194, CVE-2022-1852, CVE-2002-1155, CVE-2022-3821, CVE-2024-3567, CVE-2000-0017, CVE-2023-3138, CVE-2022-1198, CVE-2003-0442, CVE-2023-27561, CVE-2023-50781, CVE-2003-0461, CVE-2023-3019, CVE-2023-34966, CVE-2024-1151, CVE-2022-0480, CVE-1999-0894, CVE-2023-4155, CVE-2001-0690, CVE-2023-43786, CVE-2023-46847, CVE-2023-6622, CVE-2022-4743, CVE-2023-46848, CVE-2023-5215, CVE-2022-1462, CVE-2024-6239, CVE-2023-33203, CVE-2023-39191, CVE-2022-2990, CVE-2022-1587, CVE-2022-34303, CVE-2023-6610, CVE-2023-40661, CVE-2023-6606, CVE-2022-3560, CVE-2024-45620, CVE-2024-1454, CVE-2021-3839, CVE-2023-52160, CVE-2023-4641, CVE-2023-3899, CVE-2023-2455, CVE-2023-32573, CVE-2022-2509, CVE-2022-25309, CVE-2021-35937, CVE-2023-2203, CVE-2023-1095, CVE-2023-4911, CVE-2023-1192, CVE-2023-40547, CVE-2022-1998, CVE-2023-3301, CVE-2023-1672, CVE-2022-2127, CVE-2023-4147, CVE-2024-0914, CVE-2023-3269, CVE-2023-1981, CVE-2023-5869, CVE-2023-2491, CVE-2023-32373, CVE-2022-2132, CVE-2024-0564, CVE-2021-4217, CVE-2023-42669, CVE-2023-38200, CVE-2023-6546, CVE-2024-0229, CVE-2023-6681, CVE-2023-6176, CVE-2022-1016, CVE-2023-2295, CVE-2024-45617, CVE-2021-35938, CVE-2022-2625, CVE-2023-5178, CVE-2023-3212, CVE-2024-5742, CVE-2021-3696, CVE-2023-6918, CVE-2023-1667, CVE-2022-4285, CVE-2016-7091, CVE-2024-0775, CVE-2023-3567, CVE-2023-2977, CVE-2021-3697, CVE-2023-5870, CVE-2022-1263, CVE-2021-4204, CVE-2023-39189, CVE-2023-38469, CVE-2023-5633, CVE-2024-0553, CVE-2023-4010, CVE-2024-6387, CVE-2023-2194, CVE-2024-0232, CVE-2022-1708, CVE-2023-40550, CVE-2023-2603, CVE-2023-1183, CVE-2022-1706, CVE-2023-2680, CVE-2023-3750, CVE-2024-8354, CVE-2023-4004, CVE-2023-3255, CVE-2023-2513, CVE-2023-34968, CVE-2022-34301, CVE-2022-2873, CVE-2023-0664, CVE-2023-42754, CVE-2023-4387, CVE-2023-38559, CVE-2022-40982, CVE-2023-3354, CVE-2023-51764, CVE-2024-3049, CVE-2023-1073, CVE-2022-2989, CVE-2022-3787, CVE-2003-0434, CVE-2023-3161, CVE-2023-39193, CVE-2023-39198, CVE-2023-4806, CVE-1999-0297, CVE-2022-2850, CVE-2023-6683, CVE-2023-38473, CVE-2023-6356, CVE-2023-33952, CVE-2023-28327, CVE-2023-3773, CVE-2022-1158, CVE-2022-2964, CVE-2023-51767, CVE-2022-2211, CVE-2022-25308, CVE-2023-4001, CVE-2023-40660, CVE-2022-25310, CVE-2023-3164, CVE-2023-4692, CVE-2023-4813, CVE-2023-39418, CVE-2024-6505, CVE-2023-4459, CVE-2024-0562, CVE-2023-2019, CVE-2023-44487, CVE-2023-4273, CVE-2023-39194, CVE-2024-45619, CVE-2023-5557, CVE-2023-6915, CVE-2023-42753, CVE-2023-5868, CVE-2023-5157, CVE-2023-5455, CVE-2022-4904, CVE-2023-0179, CVE-2024-45616, CVE-2023-32233, CVE-2023-2731, CVE-2023-0361, CVE-2023-2953, CVE-2023-2700, CVE-2023-5090, CVE-2024-45618, CVE-2023-38471, CVE-2023-3347, CVE-2023-1380, CVE-2023-6693, CVE-2023-7192, CVE-2023-44488, CVE-2023-5981, CVE-2024-0607, CVE-2024-50074, CVE-2024-0841, CVE-2023-3618, CVE-2023-4693, CVE-2023-38472, CVE-2022-3707, CVE-2023-43788, CVE-2023-40546, CVE-2024-0690, CVE-2023-33951 |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-256: 2
- HMAC- SHA-512: 1
- HMAC-SHA- 224: 2
- HMAC-SHA-1: 4
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 4
- HMAC-SHA-512: 2
- PKCS#1: 5
- RSA PKCS#1: 1
- SHA- 384: 3
- SHA- 512: 3
- SHA-1: 5
- SHA-224: 7
- SHA-256: 17
- SHA-3: 3
- SHA-384: 8
- SHA-512: 4
- SHA-512 2048: 4
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
- Certlike:
- AES-256: 2
- HMAC- SHA-512: 1
- HMAC-SHA- 224: 2
- HMAC-SHA-1: 4
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 4
- HMAC-SHA-512: 2
- PKCS#1: 5
- RSA PKCS#1: 1
- SHA- 384: 3
- SHA- 512: 3
- SHA-1: 5
- SHA-224: 7
- SHA-256: 17
- SHA-3: 3
- SHA-384: 8
- SHA-512: 4
- SHA-512 2048: 4
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 58
- AES-: 8
- AES-256: 2
- CAST:
- RC:
- Serpent:
- Twofish:
- DES:
- constructions:
- MAC:
- CMAC: 6
- HMAC: 29
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
- djb:
- miscellaneous:
|
- AES_competition:
- AES:
- AES: 58
- AES-: 7
- AES-256: 2
- CAST:
- RC:
- Serpent:
- Twofish:
- DES:
- constructions:
- MAC:
- CMAC: 6
- HMAC: 29
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
- djb:
- miscellaneous:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 7
- SHA-256: 17
- SHA-384: 8
- SHA-512: 8
- SHA3:
- SHA-3: 3
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 7
- SHA-256: 17
- SHA-384: 8
- SHA-512: 8
- SHA3:
- SHA-3: 3
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
pdf_data/keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 4
- KEX:
- MAC:
|
- KA:
- Key Agreement: 1
- Key agreement: 4
- KEX:
- MAC:
|
pdf_data/keywords/crypto_protocol |
- IKE:
- TLS:
- TLS:
- TLS: 86
- TLS 1.3: 1
- TLS v1.2: 12
- TLS v1.3: 1
- TLSv1.2: 1
- TLSv1.3: 2
|
- IKE:
- TLS:
- TLS:
- TLS: 86
- TLS 1.3: 1
- TLS v1.2: 12
- TLS v1.3: 1
- TLSv1.2: 1
- TLSv1.3: 2
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- XTS:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-256: 18
- P-384: 14
- P-521: 16
|
- NIST:
- P-256: 18
- P-384: 14
- P-521: 16
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_CCM: 1
- TLS_DHE_RSA_WITH_AES_128_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CCM: 1
- TLS_DHE_RSA_WITH_AES_256_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_AES_256_CBC_SHA: 1
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_CCM: 1
- TLS_DHE_RSA_WITH_AES_128_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CCM: 1
- TLS_DHE_RSA_WITH_AES_256_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_AES_256_CBC_SHA: 1
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-3: 52
- FIPS 186-4: 4
- FIPS PUB 140-3: 2
- FIPS140-3: 1
- FIPS180-4: 2
- FIPS186-4: 9
- FIPS197: 4
- FIPS198-1: 3
- FIPS202: 2
- ISO:
- NIST:
- SP 800-132: 2
- SP 800-140B: 1
- SP 800-90B: 1
- PKCS:
- RFC:
- RFC3268: 4
- RFC3526: 4
- RFC4279: 2
- RFC4492: 8
- RFC5246: 4
- RFC5288: 5
- RFC5289: 16
- RFC6655: 4
- RFC7627: 10
- RFC7919: 4
- RFC8446: 6
|
- FIPS:
- FIPS 140-3: 52
- FIPS 186-4: 4
- FIPS PUB 140-3: 2
- FIPS140-3: 1
- FIPS180-4: 2
- FIPS186-4: 9
- FIPS197: 4
- FIPS198-1: 3
- FIPS202: 2
- ISO:
- NIST:
- SP 800-132: 2
- SP 800-140B: 1
- SP 800-90B: 1
- PKCS:
- RFC:
- RFC3268: 4
- RFC3526: 4
- RFC4279: 2
- RFC4492: 8
- RFC5246: 4
- RFC5288: 5
- RFC5289: 16
- RFC6655: 4
- RFC7627: 10
- RFC7919: 4
- RFC8446: 6
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /CreationDate: D:20240812003859Z00'00'
- /ModDate: D:20240812003859Z00'00'
- /Producer: macOS Version 12.6.5 (Build 21G531) Quartz PDFContext
- pdf_file_size_bytes: 891514
- pdf_hyperlinks: http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://www.ietf.org/rfc/rfc3447.txt, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf, https://www.ietf.org/rfc/rfc7919.txt, https://doi.org/10.6028/NIST.SP.800-90B, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf, https://doi.org/10.6028/NIST.SP.800-133r2, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening#proc_installing-the-system-with-fips-mode-enabled_assembly_installing-the-system-in-fips-mode, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://www.ietf.org/rfc/rfc7627.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf, https://doi.org/10.6028/NIST.SP.800-56Cr2, http://www.atsec.com/, https://www.ietf.org/rfc/rfc8446.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://www.ietf.org/rfc/rfc3526.txt, https://doi.org/10.6028/NIST.SP.800-56Ar3, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, http://dx.doi.org/10.6028/NIST.SP.800-90Ar1, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening#switching-the-system-to-fips-mode_using-the-system-wide-cryptographic-policies, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
- /CreationDate: D:20241017200857Z00'00'
- /ModDate: D:20241017200857Z00'00'
- /Producer: macOS Version 14.4 (Build 23E214) Quartz PDFContext
- pdf_file_size_bytes: 845921
- pdf_hyperlinks: http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://www.ietf.org/rfc/rfc3447.txt, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf, https://www.ietf.org/rfc/rfc7919.txt, https://doi.org/10.6028/NIST.SP.800-90B, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf, https://doi.org/10.6028/NIST.SP.800-133r2, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening#proc_installing-the-system-with-fips-mode-enabled_assembly_installing-the-system-in-fips-mode, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://www.ietf.org/rfc/rfc7627.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf, https://doi.org/10.6028/NIST.SP.800-56Cr2, http://www.atsec.com/, https://www.ietf.org/rfc/rfc8446.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://www.ietf.org/rfc/rfc3526.txt, https://doi.org/10.6028/NIST.SP.800-56Ar3, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, http://dx.doi.org/10.6028/NIST.SP.800-90Ar1, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening#switching-the-system-to-fips-mode_using-the-system-wide-cryptographic-policies, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
Interim validation. When operated in approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. |
Interim validation. When operated in approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2024_010924_0336.pdf |
None |
web_data/date_sunset |
25.08.2026 |
20.10.2026 |
web_data/description |
GnuTLS is a secure communications library implementing the TLS and DTLS protocols. It provides a simple C language application programming interface to access the secure communications protocols as well as APIs to parse and write X.509, PKCS#12, and other required structures which is shipped with Red Hat Enterprise Linux 9. |
GnuTLS is a secure communications library implementing the TLS and DTLS protocols. It provides a simple C language application programming interface to access the secure communications protocols as well as APIs to parse and write X.509, PKCS#12, and other required structures which is shipped with Red Hat Enterprise Linux 9. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical security: N/A, Non-invasive security: N/A, Documentation requirements: N/A, Cryptographic module security policy: N/A |
Physical security: N/A, Non-invasive security: N/A, Documentation requirements: N/A, Cryptographic module security policy: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
None |
None |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Red Hat Enterprise Linux 9 gnutls |
Red Hat Enterprise Linux 9 gnutls |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-3 |
FIPS 140-3 |
web_data/status |
active |
active |
web_data/sw_versions |
3.7.6-66803fa128d6a6e5 |
3.7.6-074d015ce201f434 |
web_data/tested_conf |
Red Hat Enterprise Linux 9 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4216 with PAA, Red Hat Enterprise Linux 9 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4216 without PAA, Red Hat Enterprise Linux 9 running on IBM z16 3931-A01 with IBM z16 with PAI, Red Hat Enterprise Linux 9 running on IBM z16 3931-A01 with IBM z16 without PAI, Red Hat Enterprise Linux 9 with PowerVM FW1040.00 with VIOS 3.1.3.00 running on IBM 9080-HEX with IBM POWER10 with PAA, Red Hat Enterprise Linux 9 with PowerVM FW1040.00 with VIOS 3.1.3.00 running on IBM 9080-HEX with IBM POWER10 without PAA |
Red Hat Enterprise Linux 9 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4216 with PAA, Red Hat Enterprise Linux 9 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4216 without PAA, None, None, None, None |
web_data/validation_history |
- date: 26.08.2024
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
- date: 21.10.2024
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
web_data/vendor |
Red Hat, Inc. |
Red Hat, Inc. |
web_data/vendor_url |
http://www.redhat.com |
http://www.redhat.com |