This page was not yet optimized for use on mobile
devices.
Mojo Access Point
Certificate #3419
Webpage information
Security policy
Symmetric Algorithms
AES, HMAC, HMAC-SHA-384, CMACAsymmetric Algorithms
RSA 2048, ECDHE, ECDH, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA-2, MD5Protocols
SSH, TLS 1.2, TLSRandomness
DRBGElliptic Curves
P-256, secp256r1Block cipher modes
CBC, CCMVendor
QualcommSecurity level
Level 2Standards
FIPS 140-2, FIPS 197, FIPS 180-4, FIPS 198, FIPS 186-4, SP 800-108, SP 800-38F, SP 800-38C, SP 800-38B, SP 800-135, SP 800-56A, SP 800-133, PKCS#1File metadata
| Pages | 32 |
|---|---|
| Producer | Skia/PDF m72 |
References
Incoming- 4931 - active - FortiClient Crypto Library
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3419,
"dgst": "022c90883c3960fa",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"DRBG#1936",
"RSA#2774",
"AES#5412",
"AES#5158",
"AES#5449",
"KBKDF#174",
"HMAC#3419",
"KBKDF#219",
"CVL#1672",
"KTS#5473",
"SHS#4165",
"AES#5473",
"KBKDF#220",
"CVL#1673"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"8.2.1"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"4931"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"4931"
]
},
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 3,
"ECDHE": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 3
}
},
"RSA": {
"RSA 2048": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 36
},
"TLS": {
"TLS": {
"TLS": 30,
"TLS 1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 6,
"secp256r1": 1
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1672": 2,
"#1673": 1,
"#174": 1,
"#1936": 1,
"#219": 1,
"#220": 1,
"#2774": 1,
"#3419": 3,
"#4165": 3,
"#5158": 2,
"#5412": 1,
"#5449": 1,
"#5473": 1
}
},
"fips_certlike": {
"Certlike": {
"AES #5158": 2,
"AES #5412": 1,
"AES #5449": 1,
"AES #5473": 1,
"AES 128": 1,
"AES-CTR 256": 1,
"CVL #1672": 2,
"CVL #1673": 1,
"DRBG #1936": 1,
"HMAC #3419": 2,
"HMAC-SHA- 1": 12,
"HMAC-SHA- 256": 2,
"HMAC-SHA- 384": 2,
"HMAC-SHA-1": 18,
"HMAC-SHA-384": 2,
"HMAC-SHA1": 2,
"PKCS#1": 2,
"RSA #2774": 1,
"RSA 2048": 4,
"SHA-1": 3,
"SHA-2": 1,
"SHA-256": 3,
"SHS #4165": 1
}
},
"fips_security_level": {
"Level": {
"Level 2": 2
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-2": 1,
"SHA-256": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 11
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 7,
"FIPS 180-4": 3,
"FIPS 186-4": 2,
"FIPS 197": 1,
"FIPS 198": 2
},
"NIST": {
"SP 800-108": 10,
"SP 800-133": 1,
"SP 800-135": 2,
"SP 800-38B": 1,
"SP 800-38C": 1,
"SP 800-38F": 3,
"SP 800-56A": 1
},
"PKCS": {
"PKCS#1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 18
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 4,
"HMAC-SHA-384": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Qualcomm": {
"Qualcomm": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Producer": "Skia/PDF m72",
"pdf_file_size_bytes": 396541,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/projects/cryptographic-module-validation-program",
"http://csrc.nist.gov/cryptval/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "27467f6f4485156822c328a34c359e7316c00684a4a8a53ef91940481584d30b",
"policy_txt_hash": "6bb4197be413eba09bef8397b4f999aec5fe7c43165493e38bfcd5174fe336ed"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode and the tamper evident seals installed as indicated in the security policy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPSConsolidatedMarch2019.pdf",
"date_sunset": null,
"description": "The module performs wireless access point (AP) function. It facilitates client devices to access network resources over secure wireless links conforming to IEEE 802.11 protocol, also referred to as WiFi.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "8.2.1",
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": "C-120 and C-130 with Tamper Evident Seal Kit: C-TPL-A",
"level": 2,
"mentioned_certs": {},
"module_name": "Mojo Access Point",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-03-27",
"lab": "CYGNACOM SOLUTIONS INC",
"validation_type": "Initial"
}
],
"vendor": "Mojo Networks, Inc.",
"vendor_url": "http://www.arista.com"
}
}