Apple CoreCrypto Module v9.0 for ARM

Certificate #3433

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 11.04.2019 , 11.03.2021
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS Mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Physical Security: N/A
Description The Apple CoreCrypto Module v9.0 for ARM is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest.
Tested configurations
  • iOS 12 running on iPad Air 2 with Apple A8X CPU with PAA
  • iOS 12 running on iPad Air 2 with Apple A8X CPU without PAA
  • iOS 12 running on iPad Pro with Apple A10X Fusion CPU with PAA
  • iOS 12 running on iPad Pro with Apple A10X Fusion CPU without PAA
  • iOS 12 running on iPad Pro with Apple A12X Bionic CPU with PAA
  • iOS 12 running on iPad Pro with Apple A12X Bionic CPU without PAA
  • iOS 12 running on iPad Pro with Apple A9X CPU with PAA
  • iOS 12 running on iPad Pro with Apple A9X CPU without PAA
  • iOS 12 running on iPhone 5S with Apple A7 CPU with PAA
  • iOS 12 running on iPhone 5S with Apple A7 CPU without PAA
  • iOS 12 running on iPhone 6 (iPhone 6 and iPhone 6 Plus) with Apple A8 CPU with PAA
  • iOS 12 running on iPhone 6 (iPhone 6 and iPhone 6 Plus) with Apple A8 CPU without PAA
  • iOS 12 running on iPhone 6S (iPhone 6S and iPhone 6S Plus) with Apple A9 CPU with PAA
  • iOS 12 running on iPhone 6S (iPhone 6S and iPhone 6S Plus) with Apple A9 CPU without PAA
  • iOS 12 running on iPhone 7 (iPhone 7 and iPhone 7 Plus) with Apple A10 Fusion CPU with PAA
  • iOS 12 running on iPhone 7 (iPhone 7 and iPhone 7 Plus) with Apple A10 Fusion CPU without PAA
  • iOS 12 running on iPhone 8 (iPhone 8, iPhone 8 Plus and iPhone X) with Apple A11 Bionic CPU with PAA
  • iOS 12 running on iPhone 8 (iPhone 8, iPhone 8 Plus and iPhone X) with Apple A11 Bionic CPU without PAA
  • iOS 12 running on iPhone XS (iPhone XR, iPhone XS and iPhone XS Max) with Apple A12 Bionic CPU with PAA
  • iOS 12 running on iPhone XS (iPhone XR, iPhone XS and iPhone XS Max) with Apple A12 Bionic CPU without PAA
  • tvOS 12 running on Apple TV 4K with Apple A10X Fusion CPU with PAA
  • tvOS 12 running on Apple TV 4K with Apple A10X Fusion CPU without PAA
  • TxFW 16P374 running on Apple iMac Pro with Apple T2 with PAA
  • TxFW 16P374 running on Apple iMac Pro with Apple T2 without PAA
  • TxFW 16P374 running on Apple MacBook Pro with Apple T2 with PAA
  • TxFW 16P374 running on Apple MacBook Pro with Apple T2 without PAA (single-user mode)
  • watchOS 5 running on Apple Watch Series 1 with Apple S1P CPU with PAA
  • watchOS 5 running on Apple Watch Series 1 with Apple S1P CPU without PAA
  • watchOS 5 running on Apple Watch Series 3 with Apple S3 CPU with PAA
  • watchOS 5 running on Apple Watch Series 3 with Apple S3 CPU without PAA
  • watchOS 5 running on Apple Watch Series 4 with Apple S4 CPU with PAA
  • watchOS 5 running on Apple Watch Series 4 with Apple S4 CPU without PAA
Vendor Apple Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-128, AES-256, CAST5, RC4, RC2, DES, Triple-DES, Blowfish, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, SHA-384, SHA-512, SHA-224, SHA-256, SHA-2, MD4, MD5, RIPEMD, PBKDF
Schemes
MAC, Key Agreement, Key agreement
Protocols
TLS
Randomness
DRBG, RNG
Elliptic Curves
P-224, P-256, P-384, P-521, Curve P-192, curve P-192, P-192, Ed25519
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Security level
level 1, Level 2

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS 198, FIPS186-4, SP 800-90A, SP 800-90, SP 800-38, SP 800-67, SP 800-132, SP 800-56A, SP 800-38D, NIST SP 800-90A, SP 800-133, PKCS#1, RFC6637, RFC 5288

File metadata

Title FIPS 140-2 Non-Proprietary Security Policy
Keywords FIPS 140-2, FSM
Author Renaudt Nunez
Creation date D:20190405101234-05'00'
Modification date D:20190405101234-05'00'
Pages 32
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3433,
  "dgst": "2adcda788844f02e",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#C95",
        "DRBG#2430",
        "Triple-DES#C242",
        "AES#5717",
        "AES#5712",
        "RSA#C101",
        "DSA#C242",
        "AES#5727",
        "AES#C25",
        "ECDSA#C239",
        "HMAC#C96",
        "SHS#4636",
        "AES#5838",
        "DRBG#2433",
        "SHS#C242",
        "SHS#C96",
        "SHS#C148",
        "SHS#4575",
        "AES#C148",
        "ECDSA#C245",
        "AES#5836",
        "AES#C16",
        "CVL#C239",
        "AES#5879",
        "DRBG#C107",
        "AES#C99",
        "AES#C145",
        "DSA#C239",
        "DRBG#C95",
        "RSA#3084",
        "SHS#C95",
        "AES#5881",
        "CVL#C242",
        "CVL#C100",
        "RSA#C243",
        "AES#C10",
        "AES#5707",
        "CVL#C101",
        "HMAC#C242",
        "DSA#1481",
        "DRBG#2322",
        "AES#5713",
        "HMAC#3804",
        "AES#C243",
        "HMAC#3800",
        "HMAC#C243",
        "DSA#C99",
        "RSA#C98",
        "AES#5709",
        "SHS#C102",
        "SHS#C100",
        "AES#5725",
        "AES#5702",
        "SHS#4572",
        "DRBG#C247",
        "SHS#C99",
        "DRBG#2326",
        "Triple-DES#C107",
        "AES#C11",
        "RSA#C245",
        "SHS#C239",
        "AES#C146",
        "HMAC#C148",
        "Triple-DES#C245",
        "DRBG#2314",
        "AES#C27",
        "RSA#C148",
        "DRBG#C243",
        "CVL#C97",
        "AES#C30",
        "DRBG#C245",
        "SHS#C245",
        "AES#5880",
        "DRBG#C239",
        "DRBG#2333",
        "Triple-DES#C96",
        "HMAC#3857",
        "Triple-DES#C101",
        "DRBG#C242",
        "ECDSA#C96",
        "ECDSA#C148",
        "RSA#C95",
        "AES#5701",
        "SHS#4631",
        "AES#5737",
        "AES#C95",
        "AES#C247",
        "CVL#C102",
        "SHS#4577",
        "AES#C105",
        "DRBG#C106",
        "AES#5740",
        "AES#5736",
        "HMAC#3798",
        "ECDSA#C99",
        "CVL#2180",
        "AES#5708",
        "CVL#C243",
        "HMAC#C239",
        "CVL#C99",
        "AES#5739",
        "AES#5886",
        "SHS#4573",
        "CVL#C107",
        "DRBG#C240",
        "AES#5711",
        "DRBG#2324",
        "DRBG#2335",
        "DRBG#2316",
        "DRBG#C145",
        "ECDSA#1567",
        "DRBG#C246",
        "DRBG#C99",
        "DRBG#2445",
        "SHS#C101",
        "DRBG#2331",
        "AES#C98",
        "HMAC#C101",
        "DSA#C97",
        "Triple-DES#C243",
        "AES#5724",
        "ECDSA#C243",
        "AES#5845",
        "AES#5719",
        "AES#C107",
        "HMAC#C107",
        "RSA#C239",
        "Triple-DES#C239",
        "AES#5732",
        "DSA#C148",
        "AES#5840",
        "DRBG#C148",
        "DRBG#2332",
        "ECDSA#C242",
        "Triple-DES#C98",
        "AES#C13",
        "DRBG#2443",
        "ECDSA#C102",
        "Triple-DES#C102",
        "CVL#2115",
        "CVL#C148",
        "AES#5844",
        "DRBG#C29",
        "SHS#C13",
        "AES#C97",
        "AES#C241",
        "AES#5733",
        "DRBG#2449",
        "SHS#C243",
        "DRBG#2315",
        "SHS#C98",
        "AES#5718",
        "DRBG#2327",
        "AES#C96",
        "HMAC#3861",
        "AES#5710",
        "SHS#4576",
        "DSA#C102",
        "AES#C100",
        "AES#5728",
        "Triple-DES#2866",
        "RSA#C102",
        "AES#5714",
        "AES#5716",
        "AES#5734",
        "DRBG#2434",
        "AES#C12",
        "AES#5722",
        "AES#5843",
        "DRBG#2328",
        "AES#C242",
        "DSA#C243",
        "DRBG#2321",
        "DRBG#2317",
        "AES#C28",
        "DRBG#C100",
        "ECDSA#C95",
        "DSA#C98",
        "SHS#4632",
        "DRBG#C16",
        "DRBG#2429",
        "SHS#4571",
        "DRBG#2432",
        "DSA#C101",
        "SHS#4578",
        "DRBG#2330",
        "ECDSA#C97",
        "HMAC#C13",
        "AES#5730",
        "HMAC#C30",
        "AES#C106",
        "HMAC#C100",
        "RSA#C97",
        "AES#5715",
        "DRBG#C241",
        "DRBG#C102",
        "HMAC#C97",
        "AES#C29",
        "ECDSA#C98",
        "HMAC#3801",
        "HMAC#3803",
        "AES#5842",
        "Triple-DES#C99",
        "DRBG#2312",
        "DRBG#C30",
        "DRBG#2334",
        "DRBG#2325",
        "CVL#C96",
        "AES#5731",
        "DRBG#C97",
        "AES#C246",
        "HMAC#C102",
        "DRBG#2431",
        "RSA#C99",
        "AES#C101",
        "Triple-DES#C97",
        "DRBG#2319",
        "AES#5720",
        "DRBG#2320",
        "DRBG#2318",
        "DRBG#C13",
        "DRBG#2329",
        "Triple-DES#C95",
        "RSA#C107",
        "AES#5723",
        "Triple-DES#C100",
        "ECDSA#C101",
        "AES#5721",
        "AES#5839",
        "DSA#C100",
        "HMAC#C16",
        "AES#5726",
        "AES#C15",
        "AES#C14",
        "HMAC#C99",
        "AES#5882",
        "AES#C102",
        "AES#5738",
        "DRBG#C101",
        "AES#C240",
        "DSA#C96",
        "Triple-DES#C148",
        "AES#5704",
        "HMAC#3805",
        "SHS#C16",
        "AES#5705",
        "AES#C245",
        "DRBG#2444",
        "RSA#C96",
        "HMAC#C245",
        "HMAC#C98",
        "DRBG#C98",
        "RSA#C242",
        "AES#C239",
        "AES#5703",
        "SHS#4574",
        "SHS#C97",
        "HMAC#C95",
        "DSA#C95",
        "AES#5706",
        "CVL#C245",
        "HMAC#3802",
        "RSA#C100",
        "SHS#C30",
        "DRBG#2323",
        "HMAC#3863",
        "HMAC#C29",
        "AES#5841",
        "DRBG#C96",
        "AES#5837",
        "SHS#C107",
        "AES#C26",
        "AES#5735",
        "SHS#C29",
        "DRBG#C146",
        "DRBG#2313",
        "DSA#C107",
        "HMAC#3799",
        "SHS#4638",
        "ECDSA#C107",
        "CVL#C98",
        "HMAC#3856",
        "AES#5729",
        "DRBG#C105",
        "DSA#C245",
        "ECDSA#C100"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDSA": {
            "ECDSA": 17
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 15
          },
          "DSA": {
            "DSA": 3
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 9
        },
        "CCM": {
          "CCM": 5
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 10
        },
        "ECB": {
          "ECB": 10
        },
        "GCM": {
          "GCM": 8
        },
        "OFB": {
          "OFB": 5
        },
        "XTS": {
          "XTS": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5,
          "Key agreement": 3
        },
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Edwards": {
          "Ed25519": 4
        },
        "NIST": {
          "Curve P-192": 3,
          "P-192": 7,
          "P-224": 8,
          "P-256": 12,
          "P-384": 12,
          "P-521": 8,
          "curve P-192": 4
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 2
        }
      },
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES-128": 5,
          "AES-256": 4,
          "DSA 5": 1,
          "HMAC- SHA-384": 1,
          "HMAC- SHA-512": 1,
          "HMAC-SHA-1": 10,
          "HMAC-SHA-224": 10,
          "HMAC-SHA-256": 10,
          "HMAC-SHA-256 3798": 2,
          "HMAC-SHA-256 3863": 2,
          "HMAC-SHA-384": 4,
          "HMAC-SHA-512": 6,
          "HMAC-SHA1": 2,
          "PAA1": 1,
          "PKCS#1": 20,
          "RSA PKCS#1": 4,
          "SHA-1": 3,
          "SHA-2": 1,
          "SHA-224": 3,
          "SHA-256": 3,
          "SHA-384": 2,
          "SHA-512": 2,
          "SHA1": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 1,
          "level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 3
          }
        },
        "PBKDF": {
          "PBKDF": 4
        },
        "RIPEMD": {
          "RIPEMD": 2
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 3,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 4,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 12
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 23,
          "FIPS 180-4": 2,
          "FIPS 186-4": 4,
          "FIPS 197": 2,
          "FIPS 198": 2,
          "FIPS PUB 140-2": 1,
          "FIPS186-4": 2
        },
        "NIST": {
          "NIST SP 800-90A": 1,
          "SP 800-132": 2,
          "SP 800-133": 1,
          "SP 800-38": 4,
          "SP 800-38D": 1,
          "SP 800-56A": 2,
          "SP 800-67": 1,
          "SP 800-90": 1,
          "SP 800-90A": 5
        },
        "PKCS": {
          "PKCS#1": 12
        },
        "RFC": {
          "RFC 5288": 1,
          "RFC6637": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 12,
            "AES-128": 5,
            "AES-256": 4
          },
          "CAST": {
            "CAST5": 3
          },
          "RC": {
            "RC2": 3,
            "RC4": 3
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 12
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 10,
            "HMAC-SHA-224": 3,
            "HMAC-SHA-256": 5,
            "HMAC-SHA-384": 4,
            "HMAC-SHA-512": 5
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 3
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Renaudt Nunez",
      "/CreationDate": "D:20190405101234-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/Keywords": "FIPS 140-2, FSM",
      "/ModDate": "D:20190405101234-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Title": "FIPS 140-2 Non-Proprietary Security Policy",
      "pdf_file_size_bytes": 863305,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program",
          "https://support.apple.com/en-us/HT202739",
          "http://developer.apple.com/library/ios/#documentation/Miscellaneous/Conceptual/iPhoneOSTechOverview/Introduction/Introduction.html",
          "http://developer.apple.com/library/ios/#documentation/Security/Conceptual/Security_Overview/Introduction/Introduction.html",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-%20program/standards",
          "https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-%20Validation-Program/documents/fips140-2/FIPS1402IG.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 32
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "15accfb25170ec6919f920194b9fe734fd142b3429673067417e5f4bc75c1123",
    "policy_txt_hash": "d844c17f31061cc9c4c6938e70fdee2c2bb54778efa30578f17be57b44c87688"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS Mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/AprilConsolidated.pdf",
    "date_sunset": null,
    "description": "The Apple CoreCrypto Module v9.0 for ARM is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Apple CoreCrypto Module v9.0 for ARM",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "9.0",
    "tested_conf": [
      "iOS 12 running on iPad Air 2 with Apple A8X CPU with PAA",
      "iOS 12 running on iPad Air 2 with Apple A8X CPU without PAA",
      "iOS 12 running on iPad Pro with Apple A10X Fusion CPU with PAA",
      "iOS 12 running on iPad Pro with Apple A10X Fusion CPU without PAA",
      "iOS 12 running on iPad Pro with Apple A12X Bionic CPU with PAA",
      "iOS 12 running on iPad Pro with Apple A12X Bionic CPU without PAA",
      "iOS 12 running on iPad Pro with Apple A9X CPU with PAA",
      "iOS 12 running on iPad Pro with Apple A9X CPU without PAA",
      "iOS 12 running on iPhone 5S with Apple A7 CPU with PAA",
      "iOS 12 running on iPhone 5S with Apple A7 CPU without PAA",
      "iOS 12 running on iPhone 6 (iPhone 6 and iPhone 6 Plus) with Apple A8 CPU with PAA",
      "iOS 12 running on iPhone 6 (iPhone 6 and iPhone 6 Plus) with Apple A8 CPU without PAA",
      "iOS 12 running on iPhone 6S (iPhone 6S and iPhone 6S Plus) with Apple A9 CPU with PAA",
      "iOS 12 running on iPhone 6S (iPhone 6S and iPhone 6S Plus) with Apple A9 CPU without PAA",
      "iOS 12 running on iPhone 7 (iPhone 7 and iPhone 7 Plus) with Apple A10 Fusion CPU with PAA",
      "iOS 12 running on iPhone 7 (iPhone 7 and iPhone 7 Plus) with Apple A10 Fusion CPU without PAA",
      "iOS 12 running on iPhone 8 (iPhone 8, iPhone 8 Plus and iPhone X) with Apple A11 Bionic CPU with PAA",
      "iOS 12 running on iPhone 8 (iPhone 8, iPhone 8 Plus and iPhone X) with Apple A11 Bionic CPU without PAA",
      "iOS 12 running on iPhone XS (iPhone XR, iPhone XS and iPhone XS Max) with Apple A12 Bionic CPU with PAA",
      "iOS 12 running on iPhone XS (iPhone XR, iPhone XS and iPhone XS Max) with Apple A12 Bionic CPU without PAA",
      "tvOS 12 running on Apple TV 4K with Apple A10X Fusion CPU with PAA",
      "tvOS 12 running on Apple TV 4K with Apple A10X Fusion CPU without PAA",
      "TxFW 16P374 running on Apple iMac Pro with Apple T2 with PAA",
      "TxFW 16P374 running on Apple iMac Pro with Apple T2 without PAA",
      "TxFW 16P374 running on Apple MacBook Pro with Apple T2 with PAA",
      "TxFW 16P374 running on Apple MacBook Pro with Apple T2 without PAA (single-user mode)",
      "watchOS 5 running on Apple Watch Series 1 with Apple S1P CPU with PAA",
      "watchOS 5 running on Apple Watch Series 1 with Apple S1P CPU without PAA",
      "watchOS 5 running on Apple Watch Series 3 with Apple S3 CPU with PAA",
      "watchOS 5 running on Apple Watch Series 3 with Apple S3 CPU without PAA",
      "watchOS 5 running on Apple Watch Series 4 with Apple S4 CPU with PAA",
      "watchOS 5 running on Apple Watch Series 4 with Apple S4 CPU without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-04-11",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-03-11",
        "lab": "atsec information security corporation",
        "validation_type": "Update"
      }
    ],
    "vendor": "Apple Inc.",
    "vendor_url": "http://www.apple.com"
  }
}