Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
McAfee Firewall Enterprise 1100F, 2150F and 4150F
McAfee Firewall Enterprise 1100F, 2150F and 4150F
cert_id 2236 2161
dgst 740c59b88403e9ba f2bdda2192b2a979
heuristics/algorithms CVL#168, AES#2713, Triple-DES#1628, HMAC#1692, ECDSA#474, SHS#2278, Triple-DES#1185, HMAC#1690, ECDSA#472, HMAC#1086, RSA#1407, CVL#171, DRBG#448, SHS#1612, Triple-DES#1630, AES#2711, RSA#1409, DRBG#450, SHS#2276, AES#1833, RNG#964, DSA#828, DSA#830 RNG#1148, DSA#722, Triple-DES#1451, Triple-DES#1185, HMAC#1420, RSA#1189, HMAC#1086, HMAC#1418, RNG#1146, RSA#1187, Triple-DES#1453, SHS#1612, SHS#1988, SHS#1990, AES#2305, DSA#724, AES#1833, RNG#964, AES#2303
heuristics/extracted_versions 8.3.2 8.3.1
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 13
    • #1086: 1
    • #1185: 1
    • #1407: 3
    • #1612: 1
    • #1628: 1
    • #168: 3
    • #1690: 1
    • #171: 1
    • #1833: 1
    • #2: 6
    • #2276: 1
    • #2711: 1
    • #3: 4
    • #4: 2
    • #448: 1
    • #472: 1
    • #5: 2
    • #828: 5
    • #964: 1
  • Cert:
    • #1: 12
    • #2: 6
    • #3: 4
    • #4: 2
    • #5: 2
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES- 256: 7
    • AES-128: 7
    • AES-256: 3
    • CVL24: 1
    • DES23: 1
    • DRBG20: 1
    • DSA 17: 1
    • DSA15: 1
    • HMAC SHA-1: 4
    • HMAC SHA-256: 1
    • HMAC-SHA1: 2
    • HMAC18: 2
    • PKCS #1: 3
    • PKCS14: 2
    • RSA PKCS #1: 3
    • RSA13: 1
    • SHA-1: 10
    • SHA-256: 5
    • SHA-384: 4
    • SHA-512: 2
    • SHA-512 #1690: 1
    • SHA-512 #2276: 1
  • Certlike:
    • AES- 256: 7
    • AES-128: 7
    • AES-256: 3
    • DES18: 1
    • HMAC SHA-1: 4
    • HMAC SHA-256: 1
    • HMAC-SHA1: 2
    • HMAC15: 2
    • PKCS #1: 3
    • RSA PKCS #1: 3
    • RSA12: 1
    • SHA-1: 8
    • SHA-256: 5
    • SHA-384: 4
    • SHA-512: 2
    • SHA-512 1418: 1
    • SHA-512 1988: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 19
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 11
pdf_data/keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 10
    • SHA2:
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 4
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 4
pdf_data/keywords/crypto_scheme
  • KA:
    • Key Agreement: 24
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 24
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 1
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKE: 17
  • IPsec:
    • IPsec: 16
  • SSH:
    • SSH: 15
  • TLS:
    • DTLS:
      • DTLS: 10
    • SSL:
      • SSL: 11
    • TLS:
      • TLS: 64
      • TLS 1.0: 1
  • VPN:
    • VPN: 7
  • IKE:
    • IKE: 16
  • IPsec:
    • IPsec: 16
  • SSH:
    • SSH: 15
  • TLS:
    • DTLS:
      • DTLS: 10
    • SSL:
      • SSL: 11
    • TLS:
      • TLS: 63
      • TLS 1.0: 1
  • VPN:
    • VPN: 7
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 16
  • RNG:
    • RNG: 5
  • PRNG:
    • PRNG: 15
  • RNG:
    • RNG: 4
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
  • OFB:
    • OFB: 3
  • CBC:
    • CBC: 5
  • CFB:
    • CFB: 2
  • ECB:
    • ECB: 4
  • OFB:
    • OFB: 3
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 20
  • NIST:
    • SP 800-90: 1
  • PKCS:
    • PKCS #1: 3
    • PKCS14: 1
  • FIPS:
    • FIPS 140-2: 20
  • PKCS:
    • PKCS #1: 3
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode and when installed, initialized and configured as specified in the Security Policy Section Secure Operation. The module generates cryptographic keys whose strengths are modified by available entropy When operated in FIPS mode and when installed, initialized and configured as specified in the Security Policy Section 3.1. The module generates cryptographic keys whose strengths are modified by available entropy
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0045.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0041.pdf
web_data/fw_versions 8, ., 3, ., 2, , w, i, t, h, , p, a, t, c, h, , n, u, m, b, e, r, , 8, ., 3, ., 2, E, 1, 4 8, ., 3, ., 1, , , , , , , , , , , , , , , , , , , , , , , , , , ,
web_data/hw_versions (, N, S, A, -, 1, 1, 0, 0, -, F, W, E, X, -, F, ,, , N, S, A, -, 2, 1, 5, 0, -, F, W, E, X, -, F, , a, n, d, , N, S, A, -, 4, 1, 5, 0, -, F, W, E, X, -, F, ), , w, i, t, h, , F, R, U, -, 6, 8, 6, -, 0, 0, 8, 9, -, 0, 0, (, N, S, A, -, 1, 1, 0, 0, -, F, W, E, X, -, F, ,, , N, S, A, -, 2, 1, 5, 0, -, F, W, E, X, -, F, ,, , a, n, d, , N, S, A, -, 4, 1, 5, 0, -, F, W, E, X, -, F, ), , w, i, t, h, , F, R, U, -, 6, 8, 6, -, 0, 0, 8, 9, -, 0, 0
web_data/validation_history
  • date: 08.09.2014
  • lab: EWA CANADA
  • validation_type: Initial
  • date: 27.05.2014
  • lab: EWA CANADA
  • validation_type: Initial