cert_id |
4780 |
4846 |
dgst |
259748e36ea45836 |
e4819f21c5e21c3a |
heuristics/algorithms |
AES-ECBA3478, KDA HKDF Sp800-56Cr1A3477, SHA3-256A3480, RSA SigGen (FIPS186-4)A3478, TLS v1.2 KDF RFC7627A3478, SHA2-512A3552, KAS-FFC-SSC Sp800-56Ar3A3478, Counter DRBGA3478, ECDSA SigGen (FIPS186-4)A3478, Safe Primes Key GenerationA3478, ECDSA SigVer (FIPS186-4)A3478, HMAC-SHA2-384A3552, AES-CFB8A3481, ECDSA KeyVer (FIPS186-4)A3478, SHA2-384A3552, SHA3-224A3480, SHA3-384A3480, RSA KeyGen (FIPS186-4)A3478, HMAC-SHA2-256A3552, KAS-ECC-SSC Sp800-56Ar3A3478, HMAC-SHA2-224A3552, SHA2-224A3552, PBKDFA3478, AES-CMACA3550, RSA SigVer (FIPS186-4)A3478, SHA3-512A3480, AES-GCMA3551, HMAC-SHA2-512A3552, SHA-1A3552, SHA2-256A3552, AES-XTS Testing Revision 2.0A3479, AES-CCMA3550, HMAC-SHA-1A3552, AES-CBCA3551, ECDSA KeyGen (FIPS186-4)A3478, AES-GMACA3478 |
PBKDFA4833, AES-CCMA4827, AES-CMACA4833, AES-ECBA4842, SHA3-256A4835, AES-GMACA4833, AES-CBCA4833, Counter DRBGA4833, AES-GCMA4833, KAS-FFC-SSC Sp800-56Ar3A4833, HMAC-SHA2-384A4833, SHA3-224A4835, ECDSA SigGen (FIPS186-4)A4833, SHA2-256A4833, Safe Primes Key GenerationA4833, SHA2-512A4833, SHA-1A4833, ECDSA KeyGen (FIPS186-4)A4833, AES-CFB8A4836, SHA2-384A4833, SHA3-512A4835, SHA3-384A4835, KDA HKDF Sp800-56Cr1A4832, RSA SigVer (FIPS186-4)A4833, SHA2-224A4833, RSA KeyGen (FIPS186-4)A4833, ECDSA SigVer (FIPS186-4)A4833, HMAC-SHA-1A4833, ECDSA KeyVer (FIPS186-4)A4833, KAS-ECC-SSC Sp800-56Ar3A4833, AES-XTS Testing Revision 2.0A4834, RSA SigGen (FIPS186-4)A4833, TLS v1.2 KDF RFC7627A4833, HMAC-SHA2-256A4833, HMAC-SHA2-512A4833, HMAC-SHA2-224A4833 |
heuristics/cpe_matches |
cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:9.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:9.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
9 |
9 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
CVE-2023-40660, CVE-2022-3707, CVE-2023-3301, CVE-2023-0361, CVE-2023-38473, CVE-2022-1355, CVE-2023-41175, CVE-2023-5217, CVE-2023-27561, CVE-2023-46848, CVE-2024-50074, CVE-2023-2019, CVE-2024-8443, CVE-2023-3576, CVE-2024-0232, CVE-2023-3019, CVE-2022-2639, CVE-2023-38559, CVE-2023-1183, CVE-2023-51767, CVE-2023-2156, CVE-2024-0646, CVE-2023-4387, CVE-2022-25309, CVE-2023-40546, CVE-2022-40982, CVE-2021-3839, CVE-2023-2491, CVE-2022-1789, CVE-2022-4743, CVE-2023-4147, CVE-2023-5156, CVE-2023-3161, CVE-2023-28327, CVE-2022-1587, CVE-2023-33952, CVE-2023-39198, CVE-2023-2953, CVE-2024-5742, CVE-2023-43789, CVE-1999-0894, CVE-2022-4283, CVE-2023-50781, CVE-2023-5981, CVE-2023-32373, CVE-2023-5633, CVE-2023-2295, CVE-2024-0409, CVE-2023-5178, CVE-2023-6622, CVE-2023-6356, CVE-2023-0778, CVE-2024-0641, CVE-2023-1095, CVE-2024-3567, CVE-2022-1652, CVE-2023-1513, CVE-2022-1708, CVE-2023-4527, CVE-2023-3640, CVE-2023-40745, CVE-2023-33951, CVE-2023-5869, CVE-2023-48795, CVE-2023-6176, CVE-2024-6239, CVE-2023-38470, CVE-2022-34302, CVE-2022-1998, CVE-2023-39193, CVE-2023-2700, CVE-2022-3715, CVE-2023-39417, CVE-2023-38201, CVE-2023-6121, CVE-2023-39189, CVE-2023-52356, CVE-2024-3049, CVE-2023-4194, CVE-2023-40550, CVE-2023-43787, CVE-2024-0443, CVE-2024-0553, CVE-2021-3997, CVE-2024-0775, CVE-2023-4693, CVE-2023-4641, CVE-2023-43788, CVE-2022-24809, CVE-2023-2513, CVE-2024-0607, CVE-2024-0408, CVE-2023-39418, CVE-2023-2603, CVE-2023-6004, CVE-2024-44070, CVE-2023-5367, CVE-2002-1155, CVE-2023-2203, CVE-2023-44488, CVE-2023-2454, CVE-2023-4273, CVE-2023-5824, CVE-2022-25308, CVE-2023-1073, CVE-2021-35937, CVE-2023-4155, CVE-2024-6387, CVE-2023-38471, CVE-2023-52160, CVE-2023-6536, CVE-2022-1247, CVE-2022-1949, CVE-2023-43786, CVE-2024-0562, CVE-2022-2153, CVE-2003-0464, CVE-2023-43785, CVE-2023-1380, CVE-2024-8354, CVE-2023-40547, CVE-2022-4132, CVE-2022-2850, CVE-2022-0934, CVE-2024-0193, CVE-2022-2078, CVE-2007-3103, CVE-2023-6693, CVE-2024-0564, CVE-2024-6505, CVE-2024-23301, CVE-2000-0017, CVE-2023-3972, CVE-2023-3269, CVE-2022-24806, CVE-2023-3899, CVE-2023-4911, CVE-2023-34966, CVE-2023-40549, CVE-2023-50782, CVE-2021-3695, CVE-2023-5455, CVE-2023-3354, CVE-2023-4010, CVE-2022-2625, CVE-2023-42753, CVE-2000-1207, CVE-2023-4004, CVE-2024-45617, CVE-2023-7192, CVE-2023-38472, CVE-2023-3812, CVE-2023-6918, CVE-2023-5380, CVE-2023-5157, CVE-2022-3500, CVE-2023-3567, CVE-2024-0217, CVE-2023-3618, CVE-2023-42756, CVE-2022-1586, CVE-2003-0434, CVE-2023-3773, CVE-2023-2194, CVE-2023-2977, CVE-2024-3056, CVE-2023-5992, CVE-2023-40661, CVE-2023-3347, CVE-2023-6681, CVE-2024-0639, CVE-2022-34303, CVE-2023-4535, CVE-2023-42754, CVE-2023-6531, CVE-2023-4569, CVE-2022-2963, CVE-2024-7006, CVE-2021-3697, CVE-2024-0914, CVE-2003-0364, CVE-2023-4806, CVE-2023-4692, CVE-2022-24808, CVE-2023-6683, CVE-2022-0987, CVE-2022-2509, CVE-2023-5088, CVE-2024-9676, CVE-2003-0442, CVE-2022-3560, CVE-2022-3821, CVE-2022-1263, CVE-2023-3164, CVE-2023-32573, CVE-2023-6610, CVE-2000-0701, CVE-2023-1206, CVE-2024-49394, CVE-2023-52355, CVE-2024-0841, CVE-2023-6915, CVE-2022-1462, CVE-2023-0179, CVE-2023-44487, CVE-2023-42669, CVE-2024-9341, CVE-2023-39194, CVE-2023-5868, CVE-2023-5215, CVE-2021-3864, CVE-2022-1198, CVE-2021-3696, CVE-2023-46847, CVE-2003-0461, CVE-2024-49395, CVE-2023-40551, CVE-2022-2132, CVE-2021-4204, CVE-2022-2393, CVE-2022-24807, CVE-2023-0664, CVE-2023-2731, CVE-2023-5090, CVE-2024-6237, CVE-2023-33203, CVE-2020-14394, CVE-2023-38469, CVE-2023-4459, CVE-2023-2602, CVE-2022-1184, CVE-2023-51764, CVE-2001-0690, CVE-2023-4133, CVE-2023-4813, CVE-2022-2127, CVE-2016-7091, CVE-2022-2989, CVE-2023-4001, CVE-2022-2964, CVE-2023-1729, CVE-2022-2990, CVE-2023-39191, CVE-2023-3138, CVE-2023-1981, CVE-2024-1048, CVE-2023-32233, CVE-2024-45618, CVE-2022-4900, CVE-2022-4285, CVE-1999-0798, CVE-2023-3255, CVE-2023-5557, CVE-2024-49393, CVE-2024-1488, CVE-2022-3787, CVE-2023-6710, CVE-2023-2283, CVE-2023-1672, CVE-2022-2873, CVE-2022-25310, CVE-2001-0889, CVE-2024-0690, CVE-2023-7216, CVE-2022-1706, CVE-2024-45619, CVE-2022-4904, CVE-2021-35938, CVE-2023-6679, CVE-2022-0480, CVE-2022-24805, CVE-2022-0171, CVE-2023-3212, CVE-2022-1016, CVE-2023-1667, CVE-1999-0037, CVE-2023-1192, CVE-2021-4158, CVE-2022-3424, CVE-2022-34301, CVE-2023-0494, CVE-2023-2455, CVE-2023-5871, CVE-2023-2680, CVE-2024-45616, CVE-2023-6606, CVE-2022-2211, CVE-2023-1289, CVE-2023-6535, CVE-2024-1454, CVE-2023-38200, CVE-2023-46846, CVE-2024-0229, CVE-2023-51765, CVE-2024-1151, CVE-2022-1354, CVE-2022-0168, CVE-2024-45620, CVE-2021-4217, CVE-2023-50387, CVE-2024-45615, CVE-1999-0297, CVE-2023-3750, CVE-2023-6240, CVE-2023-34967, CVE-2024-9675, CVE-1999-1288, CVE-2023-1652, CVE-2022-1158, CVE-2022-1852, CVE-2023-3772, CVE-2023-34968, CVE-2023-5870, CVE-2023-6546 |
CVE-2023-40660, CVE-2022-3707, CVE-2023-3301, CVE-2023-0361, CVE-2023-38473, CVE-2022-1355, CVE-2023-41175, CVE-2023-5217, CVE-2023-27561, CVE-2023-46848, CVE-2024-50074, CVE-2023-2019, CVE-2024-8443, CVE-2023-3576, CVE-2024-0232, CVE-2023-3019, CVE-2022-2639, CVE-2023-38559, CVE-2023-1183, CVE-2023-51767, CVE-2023-2156, CVE-2024-0646, CVE-2023-4387, CVE-2022-25309, CVE-2023-40546, CVE-2022-40982, CVE-2021-3839, CVE-2023-2491, CVE-2022-1789, CVE-2022-4743, CVE-2023-4147, CVE-2023-5156, CVE-2023-3161, CVE-2023-28327, CVE-2022-1587, CVE-2023-33952, CVE-2023-39198, CVE-2023-2953, CVE-2024-5742, CVE-2023-43789, CVE-1999-0894, CVE-2022-4283, CVE-2023-50781, CVE-2023-5981, CVE-2023-32373, CVE-2023-5633, CVE-2023-2295, CVE-2024-0409, CVE-2023-5178, CVE-2023-6622, CVE-2023-6356, CVE-2023-0778, CVE-2024-0641, CVE-2023-1095, CVE-2024-3567, CVE-2022-1652, CVE-2023-1513, CVE-2022-1708, CVE-2023-4527, CVE-2023-3640, CVE-2023-40745, CVE-2023-33951, CVE-2023-5869, CVE-2023-48795, CVE-2023-6176, CVE-2024-6239, CVE-2023-38470, CVE-2022-34302, CVE-2022-1998, CVE-2023-39193, CVE-2023-2700, CVE-2022-3715, CVE-2023-39417, CVE-2023-38201, CVE-2023-6121, CVE-2023-39189, CVE-2023-52356, CVE-2024-3049, CVE-2023-4194, CVE-2023-40550, CVE-2023-43787, CVE-2024-0443, CVE-2024-0553, CVE-2021-3997, CVE-2024-0775, CVE-2023-4693, CVE-2023-4641, CVE-2023-43788, CVE-2022-24809, CVE-2023-2513, CVE-2024-0607, CVE-2024-0408, CVE-2023-39418, CVE-2023-2603, CVE-2023-6004, CVE-2024-44070, CVE-2023-5367, CVE-2002-1155, CVE-2023-2203, CVE-2023-44488, CVE-2023-2454, CVE-2023-4273, CVE-2023-5824, CVE-2022-25308, CVE-2023-1073, CVE-2021-35937, CVE-2023-4155, CVE-2024-6387, CVE-2023-38471, CVE-2023-52160, CVE-2023-6536, CVE-2022-1247, CVE-2022-1949, CVE-2023-43786, CVE-2024-0562, CVE-2022-2153, CVE-2003-0464, CVE-2023-43785, CVE-2023-1380, CVE-2024-8354, CVE-2023-40547, CVE-2022-4132, CVE-2022-2850, CVE-2022-0934, CVE-2024-0193, CVE-2022-2078, CVE-2007-3103, CVE-2023-6693, CVE-2024-0564, CVE-2024-6505, CVE-2024-23301, CVE-2000-0017, CVE-2023-3972, CVE-2023-3269, CVE-2022-24806, CVE-2023-3899, CVE-2023-4911, CVE-2023-34966, CVE-2023-40549, CVE-2023-50782, CVE-2021-3695, CVE-2023-5455, CVE-2023-3354, CVE-2023-4010, CVE-2022-2625, CVE-2023-42753, CVE-2000-1207, CVE-2023-4004, CVE-2024-45617, CVE-2023-7192, CVE-2023-38472, CVE-2023-3812, CVE-2023-6918, CVE-2023-5380, CVE-2023-5157, CVE-2022-3500, CVE-2023-3567, CVE-2024-0217, CVE-2023-3618, CVE-2023-42756, CVE-2022-1586, CVE-2003-0434, CVE-2023-3773, CVE-2023-2194, CVE-2023-2977, CVE-2024-3056, CVE-2023-5992, CVE-2023-40661, CVE-2023-3347, CVE-2023-6681, CVE-2024-0639, CVE-2022-34303, CVE-2023-4535, CVE-2023-42754, CVE-2023-6531, CVE-2023-4569, CVE-2022-2963, CVE-2024-7006, CVE-2021-3697, CVE-2024-0914, CVE-2003-0364, CVE-2023-4806, CVE-2023-4692, CVE-2022-24808, CVE-2023-6683, CVE-2022-0987, CVE-2022-2509, CVE-2023-5088, CVE-2024-9676, CVE-2003-0442, CVE-2022-3560, CVE-2022-3821, CVE-2022-1263, CVE-2023-3164, CVE-2023-32573, CVE-2023-6610, CVE-2000-0701, CVE-2023-1206, CVE-2024-49394, CVE-2023-52355, CVE-2024-0841, CVE-2023-6915, CVE-2022-1462, CVE-2023-0179, CVE-2023-44487, CVE-2023-42669, CVE-2024-9341, CVE-2023-39194, CVE-2023-5868, CVE-2023-5215, CVE-2021-3864, CVE-2022-1198, CVE-2021-3696, CVE-2023-46847, CVE-2003-0461, CVE-2024-49395, CVE-2023-40551, CVE-2022-2132, CVE-2021-4204, CVE-2022-2393, CVE-2022-24807, CVE-2023-0664, CVE-2023-2731, CVE-2023-5090, CVE-2024-6237, CVE-2023-33203, CVE-2020-14394, CVE-2023-38469, CVE-2023-4459, CVE-2023-2602, CVE-2022-1184, CVE-2023-51764, CVE-2001-0690, CVE-2023-4133, CVE-2023-4813, CVE-2022-2127, CVE-2016-7091, CVE-2022-2989, CVE-2023-4001, CVE-2022-2964, CVE-2023-1729, CVE-2022-2990, CVE-2023-39191, CVE-2023-3138, CVE-2023-1981, CVE-2024-1048, CVE-2023-32233, CVE-2024-45618, CVE-2022-4900, CVE-2022-4285, CVE-1999-0798, CVE-2023-3255, CVE-2023-5557, CVE-2024-49393, CVE-2024-1488, CVE-2022-3787, CVE-2023-6710, CVE-2023-2283, CVE-2023-1672, CVE-2022-2873, CVE-2022-25310, CVE-2001-0889, CVE-2024-0690, CVE-2023-7216, CVE-2022-1706, CVE-2024-45619, CVE-2022-4904, CVE-2021-35938, CVE-2023-6679, CVE-2022-0480, CVE-2022-24805, CVE-2022-0171, CVE-2023-3212, CVE-2022-1016, CVE-2023-1667, CVE-1999-0037, CVE-2023-1192, CVE-2021-4158, CVE-2022-3424, CVE-2022-34301, CVE-2023-0494, CVE-2023-2455, CVE-2023-5871, CVE-2023-2680, CVE-2024-45616, CVE-2023-6606, CVE-2022-2211, CVE-2023-1289, CVE-2023-6535, CVE-2024-1454, CVE-2023-38200, CVE-2023-46846, CVE-2024-0229, CVE-2023-51765, CVE-2024-1151, CVE-2022-1354, CVE-2022-0168, CVE-2024-45620, CVE-2021-4217, CVE-2023-50387, CVE-2024-45615, CVE-1999-0297, CVE-2023-3750, CVE-2023-6240, CVE-2023-34967, CVE-2024-9675, CVE-1999-1288, CVE-2023-1652, CVE-2022-1158, CVE-2022-1852, CVE-2023-3772, CVE-2023-34968, CVE-2023-5870, CVE-2023-6546 |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-256: 2
- HMAC- SHA-512: 1
- HMAC-SHA- 224: 2
- HMAC-SHA-1: 4
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 4
- HMAC-SHA-512: 2
- PKCS#1: 5
- RSA PKCS#1: 1
- SHA- 384: 3
- SHA- 512: 3
- SHA-1: 5
- SHA-224: 7
- SHA-256: 17
- SHA-3: 3
- SHA-384: 8
- SHA-512: 4
- SHA-512 2048: 4
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
- Certlike:
- AES-256: 2
- HMAC- SHA-512: 1
- HMAC-SHA- 224: 2
- HMAC-SHA-1: 4
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 4
- HMAC-SHA-512: 2
- PKCS#1: 5
- RSA PKCS#1: 1
- SHA- 384: 3
- SHA- 512: 3
- SHA-1: 5
- SHA-224: 7
- SHA-256: 17
- SHA-3: 3
- SHA-384: 8
- SHA-512: 4
- SHA-512 2048: 4
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 58
- AES-: 8
- AES-256: 2
- CAST:
- RC:
- Serpent:
- Twofish:
- DES:
- constructions:
- MAC:
- CMAC: 6
- HMAC: 29
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
- djb:
- miscellaneous:
|
- AES_competition:
- AES:
- AES: 58
- AES-: 7
- AES-256: 2
- CAST:
- RC:
- Serpent:
- Twofish:
- DES:
- constructions:
- MAC:
- CMAC: 6
- HMAC: 29
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
- djb:
- miscellaneous:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 7
- SHA-256: 17
- SHA-384: 8
- SHA-512: 8
- SHA3:
- SHA-3: 3
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 7
- SHA-256: 17
- SHA-384: 8
- SHA-512: 8
- SHA3:
- SHA-3: 3
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
pdf_data/keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 4
- KEX:
- MAC:
|
- KA:
- Key Agreement: 1
- Key agreement: 4
- KEX:
- MAC:
|
pdf_data/keywords/crypto_protocol |
- IKE:
- TLS:
- TLS:
- TLS: 86
- TLS 1.3: 1
- TLS v1.2: 12
- TLS v1.3: 1
- TLSv1.2: 1
- TLSv1.3: 2
|
- IKE:
- TLS:
- TLS:
- TLS: 86
- TLS 1.3: 1
- TLS v1.2: 12
- TLS v1.3: 1
- TLSv1.2: 1
- TLSv1.3: 2
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- XTS:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-256: 18
- P-384: 14
- P-521: 16
|
- NIST:
- P-256: 18
- P-384: 14
- P-521: 16
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_CCM: 1
- TLS_DHE_RSA_WITH_AES_128_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CCM: 1
- TLS_DHE_RSA_WITH_AES_256_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_AES_256_CBC_SHA: 1
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_CCM: 1
- TLS_DHE_RSA_WITH_AES_128_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CCM: 1
- TLS_DHE_RSA_WITH_AES_256_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_AES_256_CBC_SHA: 1
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-3: 52
- FIPS 186-4: 4
- FIPS PUB 140-3: 2
- FIPS140-3: 1
- FIPS180-4: 2
- FIPS186-4: 9
- FIPS197: 4
- FIPS198-1: 3
- FIPS202: 2
- ISO:
- NIST:
- SP 800-132: 2
- SP 800-140B: 1
- SP 800-90B: 1
- PKCS:
- RFC:
- RFC3268: 4
- RFC3526: 4
- RFC4279: 2
- RFC4492: 8
- RFC5246: 4
- RFC5288: 5
- RFC5289: 16
- RFC6655: 4
- RFC7627: 10
- RFC7919: 4
- RFC8446: 6
|
- FIPS:
- FIPS 140-3: 52
- FIPS 186-4: 4
- FIPS PUB 140-3: 2
- FIPS140-3: 1
- FIPS180-4: 2
- FIPS186-4: 9
- FIPS197: 4
- FIPS198-1: 3
- FIPS202: 2
- ISO:
- NIST:
- SP 800-132: 2
- SP 800-140B: 1
- SP 800-90B: 1
- PKCS:
- RFC:
- RFC3268: 4
- RFC3526: 4
- RFC4279: 2
- RFC4492: 8
- RFC5246: 4
- RFC5288: 5
- RFC5289: 16
- RFC6655: 4
- RFC7627: 10
- RFC7919: 4
- RFC8446: 6
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /CreationDate: D:20240812003859Z00'00'
- /ModDate: D:20240812003859Z00'00'
- /Producer: macOS Version 12.6.5 (Build 21G531) Quartz PDFContext
- pdf_file_size_bytes: 891514
- pdf_hyperlinks: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening#switching-the-system-to-fips-mode_using-the-system-wide-cryptographic-policies, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf, https://doi.org/10.6028/NIST.SP.800-133r2, https://doi.org/10.6028/NIST.SP.800-56Ar3, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf, https://www.ietf.org/rfc/rfc8446.txt, http://www.ietf.org/rfc/rfc3447.txt, https://www.ietf.org/rfc/rfc7919.txt, https://www.ietf.org/rfc/rfc7627.txt, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, https://doi.org/10.6028/NIST.SP.800-90B, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening#proc_installing-the-system-with-fips-mode-enabled_assembly_installing-the-system-in-fips-mode, https://www.ietf.org/rfc/rfc3526.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://dx.doi.org/10.6028/NIST.SP.800-90Ar1, https://doi.org/10.6028/NIST.SP.800-56Cr2, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf, http://www.atsec.com/, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
- /CreationDate: D:20241017200857Z00'00'
- /ModDate: D:20241017200857Z00'00'
- /Producer: macOS Version 14.4 (Build 23E214) Quartz PDFContext
- pdf_file_size_bytes: 845921
- pdf_hyperlinks: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening#switching-the-system-to-fips-mode_using-the-system-wide-cryptographic-policies, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf, https://doi.org/10.6028/NIST.SP.800-133r2, https://doi.org/10.6028/NIST.SP.800-56Ar3, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf, https://www.ietf.org/rfc/rfc8446.txt, http://www.ietf.org/rfc/rfc3447.txt, https://www.ietf.org/rfc/rfc7919.txt, https://www.ietf.org/rfc/rfc7627.txt, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, https://doi.org/10.6028/NIST.SP.800-90B, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening#proc_installing-the-system-with-fips-mode-enabled_assembly_installing-the-system-in-fips-mode, https://www.ietf.org/rfc/rfc3526.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://dx.doi.org/10.6028/NIST.SP.800-90Ar1, https://doi.org/10.6028/NIST.SP.800-56Cr2, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf, http://www.atsec.com/, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
Interim validation. When operated in approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. |
Interim validation. When operated in approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2024_010924_0336.pdf |
|
web_data/date_sunset |
25.08.2026 |
20.10.2026 |
web_data/description |
GnuTLS is a secure communications library implementing the TLS and DTLS protocols. It provides a simple C language application programming interface to access the secure communications protocols as well as APIs to parse and write X.509, PKCS#12, and other required structures which is shipped with Red Hat Enterprise Linux 9. |
GnuTLS is a secure communications library implementing the TLS and DTLS protocols. It provides a simple C language application programming interface to access the secure communications protocols as well as APIs to parse and write X.509, PKCS#12, and other required structures which is shipped with Red Hat Enterprise Linux 9. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical security: N/A, Non-invasive security: N/A, Documentation requirements: N/A, Cryptographic module security policy: N/A |
Physical security: N/A, Non-invasive security: N/A, Documentation requirements: N/A, Cryptographic module security policy: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
None |
None |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Red Hat Enterprise Linux 9 gnutls |
Red Hat Enterprise Linux 9 gnutls |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-3 |
FIPS 140-3 |
web_data/status |
active |
active |
web_data/sw_versions |
3.7.6-66803fa128d6a6e5 |
3.7.6-074d015ce201f434 |
web_data/tested_conf |
Red Hat Enterprise Linux 9 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4216 with PAA, Red Hat Enterprise Linux 9 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4216 without PAA, Red Hat Enterprise Linux 9 running on IBM z16 3931-A01 with IBM z16 with PAI, Red Hat Enterprise Linux 9 running on IBM z16 3931-A01 with IBM z16 without PAI, Red Hat Enterprise Linux 9 with PowerVM FW1040.00 with VIOS 3.1.3.00 running on IBM 9080-HEX with IBM POWER10 with PAA, Red Hat Enterprise Linux 9 with PowerVM FW1040.00 with VIOS 3.1.3.00 running on IBM 9080-HEX with IBM POWER10 without PAA |
Red Hat Enterprise Linux 9 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4216 with PAA, Red Hat Enterprise Linux 9 running on Dell PowerEdge R440 with Intel® Xeon® Silver 4216 without PAA, , , , |
web_data/validation_history |
- date: 26.08.2024
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
- date: 21.10.2024
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
web_data/vendor |
Red Hat, Inc. |
Red Hat, Inc. |
web_data/vendor_url |
http://www.redhat.com |
http://www.redhat.com |