This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Ubuntu 20.04 OpenSSL Cryptographic Module |
Ubuntu 20.04 OpenSSL Cryptographic Module |
|
---|---|---|
cert_id | 4292 | 3966 |
dgst | bcdc35b056897c27 | e41bb15d9efcd5aa |
heuristics/algorithms | CVL#A1545, Triple-DES#A1519, DRBG#A1529, CVL#A1547, Triple-DES#A1520, CVL#A1532, Triple-DES#A1533, AES#A1531, KTS-RSA#A1544, Triple-DES#A1526, SHS#A1546, AES#A1527, ECDSA#A1524, RSA#A1532, DSA#A1545, AES#A1521, AES#A1535, RSA#A1546, SHS#A1547, ECDSA#A1525, AES#A1549, SHA-3#A1525, ECDSA#A1547, KAS-SSC#A1550, KTS#A1546, HMAC#A1523, AES#A1533, KTS-RSA#A1532, CVL#A1546, AES#A1539, ECDSA#A1523, AES#A1537, PBKDF#A1547, DRBG#A1530, KAS#A1544, DSA#A1546, KAS-SSC#A1547, AES#A1530, CVL#A1519, PBKDF#A1534, RSA#A1547, KAS-SSC#A1544, PBKDF#A1524, KTS#A1544, KTS-RSA#A1545, PBKDF#A1546, AES#A1541, ECDSA#A1544, RSA#A1545, KTS#A1532, HMAC#A1532, AES#A1543, PBKDF#A1523, KTS#A1526, AES#A1522, DSA#A1547, SHA-3#A1523, RSA#A1544, PBKDF#A1545, KAS-SSC#A1546, ECDSA#A1545, SHA-3#A1534, AES#A1538, ECDSA#A1534, AES#A1519, CVL#A1522, DRBG#A1528, SHS#A1532, KTS#A1545, CVL#A1544, PBKDF#A1525, SHA-3#A1524, HMAC#A1546, CVL#A1520, SHS#A1544, DSA#A1544, KTS#A1547, PBKDF#A1544, Triple-DES#A1522, ECDSA#A1532, DRBG#A1527, HMAC#A1525, KTS-RSA#A1546, AES#A1540, HMAC#A1547, KAS#A1546, Triple-DES#A1521, AES#A1542, ECDSA#A1546, AES#A1528, AES#A1529, DSA#A1532, KTS-RSA#A1547, HMAC#A1545, KAS#A1545, HMAC#A1544, AES#A1548, KAS-SSC#A1532, CVL#A1533, HMAC#A1524, AES#A1520, KAS-SSC#A1545, PBKDF#A1532, HMAC#A1534, CVL#A1521, KAS#A1532, SHS#A1545, KAS#A1547, KDA#A1516, KAS#A1550, AES#A1536 | CVL#A531, DRBG#A522, ECDSA#A529, DRBG#A523, HMAC#A532, HMAC#A516, CVL#A520, Triple-DES#A518, SHA-3#A517, PBKDF#A517, ECDSA#A517, AES#A528, DSA#A530, AES#A527, CVL#A530, AES#A523, KAS#A531, KTS#A525, PBKDF#A532, AES#A526, DSA#A529, KTS#A531, RSA#A531, SHS#A532, PBKDF#A515, CVL#A529, SHS#A531, DRBG#A524, KAS#A530, KTS#A530, KTS#A517, DSA#A531, CVL#A519, AES#A535, AES#A534, HMAC#A515, Triple-DES#A521, AES#A519, HMAC#A517, SHA-3#A516, SHS#A529, CVL#A521, KAS-SSC#A531, RSA#A530, SHS#A530, AES#A524, ECDSA#A516, AES#A537, KAS-SSC#A529, PBKDF#A531, AES#A533, KTS#A529, Triple-DES#A520, KTS#A516, Triple-DES#A525, KAS-SSC#A539, KAS#A532, SHA-3#A515, ECDSA#A530, RSA#A529, PBKDF#A529, AES#A520, CVL#A518, AES#A521, AES#A522, AES#A536, Triple-DES#A519, KAS#A539, ECDSA#A531, ECDSA#A515, HMAC#A531, PBKDF#A530, AES#A518, KAS-SSC#A532, KAS-SSC#A530, HMAC#A530, CVL#A532, RSA#A532, DSA#A532, AES#A538, KTS#A515, PBKDF#A516, HMAC#A529, KAS#A529, KTS#A532, ECDSA#A532 |
heuristics/module_processed_references/directly_referenced_by | {} | 4046 |
heuristics/module_processed_references/indirectly_referenced_by | {} | 4046 |
heuristics/policy_processed_references/directly_referenced_by | 4928 | 4046 |
heuristics/policy_processed_references/indirectly_referenced_by | 4928 | 4046 |
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/caveat | When operated in FIPS mode | When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2022_031022_0652_signed.pdf | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/July 2021_020821_0740_signed.pdf |
web_data/date_sunset | 21.09.2026 | 05.07.2026 |
web_data/sw_versions | 3.1 | 3.0 |
web_data/tested_conf | Supermicro SYS-1019P-WTR with Intel Xeon Gold 6226 CPU without PAA, Ubuntu 20.04 LTS 64-bit running on IBM z15 with z15 with PAI, Ubuntu 20.04 LTS 64-bit running on IBM z15 with z15 without PAI (single-user mode), Ubuntu 20.04 LTS 64-bit running on Supermicro SYS-1019P-WTR with Intel Xeon Gold 6226 CPU with PAA | Ubuntu 20.04 LTS 64-bit running on Supermicro SYS-1019P-WTR with Intel Xeon Gold 6226 CPU with PAA, Ubuntu 20.04 LTS 64-bit running on Supermicro SYS-1019P-WTR with Intel Xeon Gold 6226 CPU without PAA (single-user mode), , |
web_data/validation_history |
|
|