Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Oracle Linux 7 GnuTLS Cryptographic Module
Oracle Linux 7 GnuTLS Cryptographic Module
cert_id 3757 3169
dgst 7328f9713cf2421a 7ac7a7fb16bdf38f
heuristics/algorithms RSA#C1018, HMAC#C1018, SHS#C1018, SHS#C1019, KTS#C1018, CVL#C1018, AES#C1018, AES#C1001, Triple-DES#C1018, DSA#C1018, ECDSA#C1018, AES#C1019, DRBG#C1018, AES#C929 AES#5043, CVL#1592, ECDSA#1297, HMAC#3360, KTS#2601, AES#5080, CVL#2114, SHS#4634, KTS#3860, DRBG#2437, Triple-DES#2601, KTS#3360, AES#5862, AES#5858, SHS#4105, CVL#2113, CVL#1593, HMAC#3860, AES#5864, AES#5863, AES#5042, SHS#4635, SHS#4134, DSA#1324, ECDSA#1566, DRBG#1859, RSA#3083, Triple-DES#2863, RSA#2727, KTS#2863, AES#5038, DSA#1480
pdf_data/keywords/fips_cert_id
  • Cert:
    • # 1018: 1
  • Cert:
    • #2601: 1
    • #3360: 2
    • #5038: 2
    • #5042: 1
    • #5043: 2
    • #5080: 2
    • #5858: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES- 256: 1
    • AES-256: 2
    • HMAC-SHA-256: 6
    • HMAC-SHA1: 2
    • HMAC-SHA224: 2
    • HMAC-SHA256: 2
    • HMAC-SHA384: 2
    • HMAC-SHA512: 2
    • PKCS#1: 4
    • PKCS#11: 4
    • SHA ( 224: 1
    • SHA 256: 1
    • SHA( 1: 3
    • SHA( 224: 4
    • SHA( 256: 4
    • SHA( 384: 6
    • SHA-1: 5
    • SHA-1, 224: 3
    • SHA-224: 6
    • SHA-256: 6
    • SHA-3: 2
    • SHA-384: 3
    • SHA-512: 3
  • Certlike:
    • AES #5042: 1
    • AES- 256: 1
    • AES-256: 2
    • HMAC Cert. #3360: 4
    • HMAC-SHA-256: 6
    • HMAC-SHA1: 2
    • HMAC-SHA224: 2
    • HMAC-SHA256: 2
    • HMAC-SHA384: 2
    • HMAC-SHA512: 2
    • PKCS#1: 4
    • PKCS#11: 4
    • SHA ( 224: 1
    • SHA 256: 1
    • SHA( 1: 3
    • SHA( 224: 4
    • SHA( 256: 4
    • SHA( 384: 6
    • SHA-1: 5
    • SHA-1, 224: 3
    • SHA-224: 6
    • SHA-256: 6
    • SHA-3: 2
    • SHA-384: 3
    • SHA-512: 3
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 27
      • AES-: 1
      • AES-256: 2
    • CAST:
      • CAST-128: 2
    • RC:
      • RC2: 2
      • RC4: 2
    • Serpent:
      • Serpent: 2
    • Twofish:
      • Twofish: 2
  • DES:
    • 3DES:
      • TDEA: 1
      • Triple-DES: 7
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • HMAC: 27
      • HMAC-SHA-256: 3
  • miscellaneous:
    • Blowfish:
      • Blowfish: 2
    • Camellia:
      • Camellia: 2
  • AES_competition:
    • AES:
      • AES: 28
      • AES-: 1
      • AES-256: 2
    • CAST:
      • CAST-128: 2
    • RC:
      • RC2: 2
      • RC4: 2
    • Serpent:
      • Serpent: 2
    • Twofish:
      • Twofish: 2
  • DES:
    • 3DES:
      • TDEA: 1
      • Triple-DES: 10
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • HMAC: 25
      • HMAC-SHA-256: 3
  • miscellaneous:
    • Blowfish:
      • Blowfish: 2
    • Camellia:
      • Camellia: 2
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 21
  • FF:
    • DH:
      • DH: 1
      • DHE: 1
      • Diffie-Hellman: 33
    • DSA:
      • DSA: 30
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 21
  • FF:
    • DH:
      • DH: 1
      • DHE: 1
      • Diffie-Hellman: 33
    • DSA:
      • DSA: 26
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • TLS:
    • DTLS:
      • DTLS: 3
    • TLS:
      • TLS: 76
      • TLS 1.0: 1
      • TLS 1.2: 1
  • IKE:
    • IKE: 1
  • TLS:
    • DTLS:
      • DTLS: 3
    • TLS:
      • TLS: 72
      • TLS 1.0: 1
      • TLS 1.2: 1
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 20
    • PRNG: 1
  • RNG:
    • RNG: 2
  • PRNG:
    • DRBG: 18
    • PRNG: 1
  • RNG:
    • RNG: 2
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 7
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 11
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 10
pdf_data/keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 6
    • P-521: 12
  • NIST:
    • P-256: 16
    • P-384: 6
    • P-521: 10
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140: 3
    • FIPS 140-2: 26
    • FIPS 186-2: 2
    • FIPS 186-4: 5
    • FIPS PUB 140-2: 10
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
    • FIPS186-4: 2
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-133: 1
    • NIST SP 800-135: 1
    • NIST SP 800-52: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-67: 1
    • NIST SP 800-90A: 2
    • SP 800-131A: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS#1: 2
    • PKCS#11: 2
  • RFC:
    • RFC 5246: 1
    • RFC 5288: 1
    • RFC4347: 1
    • RFC4357: 1
    • RFC5246: 2
    • RFC5764: 1
  • X509:
    • X.509: 1
  • FIPS:
    • FIPS 140: 3
    • FIPS 140-2: 25
    • FIPS 186-2: 2
    • FIPS 186-4: 5
    • FIPS PUB 140-2: 10
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
    • FIPS186-4: 2
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-135: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-67: 1
    • NIST SP 800-90A: 2
    • SP 800-133: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS#1: 2
    • PKCS#11: 2
  • RFC:
    • RFC4347: 1
    • RFC4357: 1
    • RFC5246: 2
    • RFC5288: 1
    • RFC5764: 1
  • X509:
    • X.509: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode. When installed, initialized and configured as specified in Section 10 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2020_040121_1006_signed.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/AprilConsolidated2018.pdf
web_data/sw_versions R7-4.0.0 R7-2.0.0
web_data/tested_conf Oracle Linux 7.6 64 bit running on an Oracle X7-2 Server with AMD® EPYC® 7551 without PAA (single user mode), Oracle Linux 7.6 64 bit running on Oracle Server X7-2 with a Intel(R) Xeon(R) Silver 4114 with PAA, Oracle Linux 7.6 64 bit running on Oracle Server X7-2 with a Intel(R) Xeon(R) Silver 4114 without PAA Oracle Linux 7.6 64 bit running on an Oracle X7-2 Server with AMD® EPYC® 7551 with PAA, Oracle Linux 7.3 64 bit running on Oracle Server X6-2 with PAA, Oracle Linux 7.3 64 bit running on Oracle Server X6-2 without PAA, Oracle Linux 7.3 64 bit running on Oracle Server X7-2 with PAA, Oracle Linux 7.3 64 bit running on Oracle Server X7-2 without PAA (single-user mode)
web_data/validation_history
  • date: 07.12.2020
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial

  • date: 15.01.2021
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Update
  • date: 11.04.2018
  • lab: ATSEC INFORMATION SECURITY CORP
  • validation_type: Initial

  • date: 31.10.2018
  • lab: ATSEC INFORMATION SECURITY CORP
  • validation_type: Update