SapphirePlus OpenSSL Cryptographic Module

Certificate #3340

Webpage information

Status historical
Historical reason 186-2 transition
Validation dates 14.12.2018
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy and operated in FIPS mode. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. No assurance of the minimum strength of generated keys.
Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description The SapphirePlus infusion system provides a targeted solution for the Hospira MedNet users in the hospital market, offering the outstanding performance, ease of use and reliability of the entire Sapphire product family, with special concern for the clinical and ambulatory environments, as well as the pre-hospital medical ground transportation. With Q Core’s advanced software version implemented, the SapphirePlus pump offers a complete integration of the Sapphire infusion pump with Hospira MedNet system, used in hospitals across the US.
Tested configurations
  • Custom Linux 2.6.35 running on SapphirePlus Infusion System with NXP-i.MX280-ARM (single user mode)
Vendor Q Core Medical Ltd.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, TDEA, TDES, HMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, DSA
Hash functions
SHA-1, SHA1, SHA-224, SHA224, SHA256, SHA384, SHA512, SHA-256, SHA-384, SHA-2
Schemes
Key Agreement, Key agreement
Randomness
DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-224, P-384, P-192, P-256, P-521, K-224, K-384, B-224, B-384, B-163, K-233, K-409, B-283, B-571
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Vendor
Microsoft, Microsoft Corporation

Standards
FIPS 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS 198-1, FIPS 198, FIPS 186-2, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38E, SP 800-56A, SP 800-56B, SP 800-57, SP 800-89, SP 800-90A, SP 800-131A, SP 800-67, PKCS#1

File metadata

Author Mark Minnoch
Creation date D:20181127084920-08'00'
Modification date D:20181127084925-08'00'
Pages 23
Creator Acrobat PDFMaker 17 for Word
Producer Adobe PDF Library 15.0

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3340,
  "dgst": "098c34d0a9154864",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "ECDSA#1521",
        "Triple-DES#2832",
        "DRBG#2276",
        "CVL#2038",
        "AES#5643",
        "DSA#1445",
        "RSA#3035",
        "HMAC#3758",
        "SHS#4525"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDSA": {
            "ECDSA": 16
          }
        },
        "FF": {
          "DH": {
            "DH": 9
          },
          "DSA": {
            "DSA": 18
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 5
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 35
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2,
          "Key agreement": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 3,
          "B-224": 1,
          "B-283": 1,
          "B-384": 1,
          "B-571": 1,
          "K-224": 1,
          "K-233": 3,
          "K-384": 1,
          "K-409": 1,
          "P-192": 6,
          "P-224": 6,
          "P-256": 4,
          "P-384": 4,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128/192/256": 2,
          "AES, 256": 1,
          "DRBG5": 1,
          "DSA (1024": 2,
          "HMAC SHA-1": 1,
          "HMAC-SHA- 1": 2,
          "HMAC-SHA-1": 24,
          "HMAC-SHA1": 4,
          "PKCS#1": 2,
          "SHA-1": 19,
          "SHA-1, 224": 23,
          "SHA-2": 3,
          "SHA-2 (224": 2,
          "SHA-224": 16,
          "SHA-256": 1,
          "SHA-384": 1,
          "SHA1": 1,
          "SHA224": 1,
          "SHA256": 4,
          "SHA384": 1,
          "SHA512": 2
        }
      },
      "fips_security_level": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 42,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-2": 5,
            "SHA-224": 16,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA224": 1,
            "SHA256": 4,
            "SHA384": 1,
            "SHA512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19
        },
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 13,
          "FIPS 180-4": 2,
          "FIPS 186-2": 5,
          "FIPS 186-4": 9,
          "FIPS 197": 2,
          "FIPS 198": 1,
          "FIPS 198-1": 1
        },
        "NIST": {
          "SP 800-131A": 2,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 2,
          "SP 800-38E": 2,
          "SP 800-56A": 4,
          "SP 800-56B": 2,
          "SP 800-57": 2,
          "SP 800-67": 1,
          "SP 800-89": 1,
          "SP 800-90A": 9
        },
        "PKCS": {
          "PKCS#1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 20
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 9
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 15,
            "HMAC": 8
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Mark Minnoch",
      "/Company": "KeyPair Consulting",
      "/CreationDate": "D:20181127084920-08\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/ModDate": "D:20181127084925-08\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/SourceModified": "D:20181127164906",
      "pdf_file_size_bytes": 304775,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.openssl.org/source/old/fips/openssl-fips-2.0.9.tar.gz",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
          "https://www.openssl.org/source/",
          "https://csrc.nist.gov/csrc/media/publications/fips/198/1/final/documents/fips-198-1_final.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf",
          "http://www.openssl.org/source/openssl-fips-ecp-2.0.16.tar.gz",
          "http://www.openssl.org/source/openssl-fips-2.0.9.tar.gz",
          "http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/?wapkw=aes-ni",
          "http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf",
          "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf",
          "http://www.openssl.org/source/old/fips/openssl-fips-ecp-2.0.9.tar.gz",
          "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-89.pdf",
          "https://csrc.nist.gov/CSRC/media/Publications/sp/800-67/rev-2/draft/documents/sp800-67r2-draft.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
          "http://www.openssl.org/source/old/fips/",
          "http://www.arm.com/products/processors/technologies/neon.php",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
          "http://www.intel.com/support/processors/sb/CS-030123.htm?wapkw=sse2",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf",
          "https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402IG.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf",
          "http://www.openssl.org/source/",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br1.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "20c232a4f00e754fb715518355c114103a1cd4d6ec2b3a5e046064f2ae78a24b",
    "policy_txt_hash": "f346577671e9a257a0afedcbc38f2fb3e7f4e84f83a15cfb868bc14e43de9870"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy and operated in FIPS mode. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. No assurance of the minimum strength of generated keys.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Dec2018Cert.pdf",
    "date_sunset": null,
    "description": "The SapphirePlus infusion system provides a targeted solution for the Hospira MedNet users in the hospital market, offering the outstanding performance, ease of use and reliability of the entire Sapphire product family, with special concern for the clinical and ambulatory environments, as well as the pre-hospital medical ground transportation. With Q Core\u2019s advanced software version implemented, the SapphirePlus pump offers a complete integration of the Sapphire infusion pump with Hospira MedNet system, used in hospitals across the US.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, Services, and Authentication: Level 2",
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "186-2 transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "SapphirePlus OpenSSL Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "2.0.9",
    "tested_conf": [
      "Custom Linux 2.6.35 running on SapphirePlus Infusion System with NXP-i.MX280-ARM (single user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-12-14",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Q Core Medical Ltd.",
    "vendor_url": "http://www.qcore.com"
  }
}