OmniSwitch AOS Cryptographic Module

Certificate #4381

Webpage information ?

Status active
Validation dates 28.11.2022
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in the Security Policy Section 3.1. When operated in FIPS mode. No assurance of the minimum strength of generated keys
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description The OmniSwitch AOS Cryptographic Module provides cryptographic functionality to Alcatel-Lucent Enterprise software applications present on the Alcatel-Lucent Enterprise OmniSwitch series of routers.
Tested configurations
  • Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465-P6 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465-P12 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465-P28 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465T-12 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465T-P12 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-24X4 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-24Z8 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-24Z24 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-48X4 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P24X4 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P24Z8 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P24Z24 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P48X4 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P48Z16 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-PXZ24 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-X10 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860-24 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860-48 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860-P24 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860-P48 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-24 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-48 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-P24 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-P24Z8 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-P48 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-U28 with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6865-P16X with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6865-U12X with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6865-U28X with an ARM Cortex-A9 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-C32 with an Intel Atom C2538 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-Q32 with an NXP QorIQ P2040 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-T20 with an NXP QorIQ P2040 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-T40 with an NXP QorIQ P2040 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-V72 with an Intel Atom C2538 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-X20 with an NXP MPC8572 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-X40 with an NXP MPC8572 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-X72 with an NXP QorIQ P2040 Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 9907 with an Intel Atom C2518 (single-user mode)
Vendor Alcatel Lucent Enterprise USA Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, AES-256, CAST, RC2, RC4, DES, TDES, Triple-DES, IDEA, Blowfish, Camellia, SEED, HMAC, HMAC-SHA-224, HMAC-SHA-256, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-384, SHA-512, SHA-256, SHA-224, SHA-2, MD5, RIPEMD160
Schemes
Key Agreement, Key agreement
Protocols
SSH, SSL, TLS, TLS 1.2, VPN
Randomness
DRBG, RNG, RBG
Elliptic Curves
P-256, P-521, P-224, P-384
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Trusted Execution Environments
SSC
Vendor
NXP

Security level
Level 1

Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS186-2, FIPS 186-2, SP 800-135, SP 800-90A, PKCS1, PKCS#1

File metadata

Title EWA-C SP Template
Author crobbins
Creation date D:20221117095419-08'00'
Modification date D:20221117095433-08'00'
Pages 22
Creator Acrobat PDFMaker 22 for Word
Producer Adobe PDF Library 22.3.58

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 09.02.2023 The certificate data changed.
    Certificate changed

    The cert_id was updated.

    • The new value is 4381.

    The web extraction data was updated.

    • The following values were inserted: {'validation_history': [{'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2022-11-28', 'validation_type': 'Initial', 'lab': 'UL VERIFICATION SERVICES INC'}], 'vendor_url': 'http://www.al-enterprise.com', 'certificate_pdf_url': 'https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/November 2022_051222_0640_signed.pdf', 'hw_versions': None, 'fw_versions': None}.
    • The standard property was set to FIPS 140-2.
    • The status property was set to active.
    • The level property was set to 1.
    • The embodiment property was set to Multi-Chip Stand Alone.
    • The following properties were deleted: ['date_validation', 'algorithms', 'vendor_www', 'lab', 'lab_nvlap', 'security_policy_www', 'certificate_www', 'hw_version', 'fw_version', 'product_url'].

    The PDF extraction data was updated.

    • The following values were inserted: {'policy_metadata': {'pdf_file_size_bytes': 616697, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 22, '/Author': 'crobbins', '/Company': '', '/ContentTypeId': '0x010100E86A1D3805FD6746AEDB446EE7531798', '/Created': 'D:20170502', '/CreationDate': "D:20221117095419-08'00'", '/Creator': 'Acrobat PDFMaker 22 for Word', '/LastSaved': 'D:20200422', '/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_ActionId': '7d500868-4279-4fcd-91d2-35e7c27f6944', '/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Application': 'Microsoft Azure Information Protection', '/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Enabled': 'True', '/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Extended_MSFT_Method': 'Automatic', '/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Name': 'Internal and Restricted', '/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Owner': '[email protected]', '/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_SetDate': '2021-05-26T13:58:01.4347007Z', '/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_SiteId': '258ac4e4-146a-411e-9dc8-79a9e12fd6da', '/ModDate': "D:20221117095433-08'00'", '/Producer': 'Adobe PDF Library 22.3.58', '/SourceModified': 'D:20221117174741', '/Title': 'EWA-C SP Template', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://csrc.nist.gov/groups/STM/cmvp/index.html', 'https://www.al-enterprise.com/']}}}.
    • The following properties were deleted: ['cert_id', 'algorithms', 'clean_cert_ids', 'st_metadata'].

    The computed heuristics were updated.

    • The following values were inserted: {'policy_prunned_references': {'_type': 'Set', 'elements': []}, 'module_prunned_references': {'_type': 'Set', 'elements': []}, 'policy_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'module_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The algorithms property was set to {'_type': 'Set', 'elements': ['HMAC#C1692', 'DRBG#C1694', 'RSA#C1698', 'HMAC#C1699', 'AES#C1698', 'HMAC#C1695', 'ECDSA#C1695', 'DRBG#C1693', 'CVL#C1692', 'HMAC#C1694', 'DRBG#C1695', 'CVL#C1697', 'CVL#C1699', 'CVL#C1694', 'DRBG#C1698', 'HMAC#C1698', 'AES#C1693', 'DRBG#C1692', 'SHS#C1699', 'RSA#C1695', 'DRBG#C1697', 'CVL#C1698', 'ECDSA#C1693', 'SHS#C1693', 'RSA#C1694', 'AES#C1699', 'ECDSA#C1699', 'SHS#C1692', 'SHS#C1694', 'RSA#C1692', 'RSA#C1696', 'AES#C1697', 'HMAC#C1693', 'ECDSA#C1696', 'RSA#C1699', 'DRBG#C1696', 'CVL#C1696', 'SHS#C1697', 'RSA#C1697', 'HMAC#C1696', 'ECDSA#C1694', 'AES#C1692', 'CVL#C1693', 'SHS#C1695', 'DRBG#C1699', 'AES#C1696', 'RSA#C1693', 'KAS-SSC#A1774', 'HMAC#C1697', 'ECDSA#C1698', 'SHS#C1696', 'SHS#C1698', 'AES#C1695', 'ECDSA#C1697', 'CVL#C1695', 'ECDSA#C1692', 'AES#C1694']}.
    • The following properties were deleted: ['keywords', 'unmatched_algs', 'clean_cert_ids', 'st_references', 'web_references'].

    The state was updated.

    • The following values were inserted: {'module_download_ok': True, 'policy_download_ok': True, 'policy_convert_garbage': False, 'policy_convert_ok': True, 'module_extract_ok': True, 'policy_extract_ok': True, 'policy_pdf_hash': 'ed680a338344f05f44fded754c7d0dbfaeed60c956099b85e74723e67502b505', 'policy_txt_hash': '22700bd3d0df3f2c2fe90615f1335bb1d37667ce17e9bd8b2aa617de1c1cb5f9'}.
    • The following properties were deleted: ['sp_path', 'html_path', 'tables_done', 'file_status', 'txt_state'].
  • 07.12.2022 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The certificate_www property was set to https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/November 2022_051222_0640_signed.pdf.
  • 29.11.2022 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4381,
  "dgst": "48e019050cd54d27",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC#C1698",
        "AES#C1698",
        "ECDSA#C1699",
        "HMAC#C1694",
        "CVL#C1696",
        "HMAC#C1697",
        "SHS#C1695",
        "RSA#C1697",
        "AES#C1697",
        "CVL#C1694",
        "HMAC#C1696",
        "SHS#C1694",
        "HMAC#C1695",
        "HMAC#C1693",
        "DRBG#C1699",
        "ECDSA#C1693",
        "DRBG#C1697",
        "RSA#C1693",
        "AES#C1694",
        "CVL#C1693",
        "DRBG#C1693",
        "SHS#C1697",
        "ECDSA#C1692",
        "DRBG#C1694",
        "AES#C1696",
        "RSA#C1699",
        "DRBG#C1698",
        "CVL#C1698",
        "ECDSA#C1694",
        "ECDSA#C1698",
        "CVL#C1695",
        "RSA#C1692",
        "SHS#C1699",
        "AES#C1693",
        "SHS#C1693",
        "DRBG#C1692",
        "AES#C1695",
        "HMAC#C1692",
        "SHS#C1696",
        "AES#C1699",
        "RSA#C1694",
        "ECDSA#C1696",
        "ECDSA#C1695",
        "SHS#C1692",
        "KAS-SSC#A1774",
        "SHS#C1698",
        "RSA#C1696",
        "CVL#C1697",
        "CVL#C1699",
        "CVL#C1692",
        "DRBG#C1695",
        "RSA#C1698",
        "AES#C1692",
        "DRBG#C1696",
        "RSA#C1695",
        "HMAC#C1699",
        "ECDSA#C1697"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 10
          }
        },
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CCM": {
          "CCM": 1
        },
        "CFB": {
          "CFB": 4
        },
        "CTR": {
          "CTR": 3
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 3
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 4
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 12,
            "TLS 1.2": 2
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 4,
          "Key agreement": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 4,
          "P-256": 6,
          "P-384": 2,
          "P-521": 4
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128/192/256": 1,
          "AES 192": 1,
          "AES-256": 1,
          "HMAC SHA-1": 1,
          "HMAC SHA-256": 1,
          "HMAC SHA-384": 1,
          "HMAC SHA-512": 1,
          "HMAC- SHA-1": 1,
          "HMAC- SHA-256": 1,
          "HMAC- SHA-512": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-1-96": 2,
          "HMAC-SHA-224": 2,
          "HMAC-SHA-256": 2,
          "HMAC-SHA1": 2,
          "PKCS#1": 2,
          "PKCS1": 2,
          "SHA- 256": 2,
          "SHA-1": 8,
          "SHA-2": 1,
          "SHA-224": 1,
          "SHA-256": 5,
          "SHA-384": 5,
          "SHA-512": 5,
          "SHS3": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "RIPEMD": {
          "RIPEMD160": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 1,
            "SHA-256": 5,
            "SHA-384": 5,
            "SHA-512": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 20
        },
        "RNG": {
          "RBG": 1,
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 12,
          "FIPS 180-4": 1,
          "FIPS 186-2": 1,
          "FIPS 186-4": 3,
          "FIPS 197": 1,
          "FIPS 198-1": 1,
          "FIPS186-2": 1
        },
        "NIST": {
          "SP 800-135": 2,
          "SP 800-90A": 4
        },
        "PKCS": {
          "PKCS#1": 1,
          "PKCS1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11,
            "AES-256": 1
          },
          "CAST": {
            "CAST": 1
          },
          "RC": {
            "RC2": 1,
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 12,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-256": 1
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 1
          },
          "Camellia": {
            "Camellia": 1
          },
          "IDEA": {
            "IDEA": 1
          },
          "SEED": {
            "SEED": 1
          }
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "crobbins",
      "/Company": "",
      "/ContentTypeId": "0x010100E86A1D3805FD6746AEDB446EE7531798",
      "/Created": "D:20170502",
      "/CreationDate": "D:20221117095419-08\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 22 for Word",
      "/LastSaved": "D:20200422",
      "/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_ActionId": "7d500868-4279-4fcd-91d2-35e7c27f6944",
      "/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Application": "Microsoft Azure Information Protection",
      "/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Enabled": "True",
      "/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Extended_MSFT_Method": "Automatic",
      "/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Name": "Internal and Restricted",
      "/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_Owner": "[email protected]",
      "/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_SetDate": "2021-05-26T13:58:01.4347007Z",
      "/MSIP_Label_b9a70571-31c6-4603-80c1-ef2fb871a62a_SiteId": "258ac4e4-146a-411e-9dc8-79a9e12fd6da",
      "/ModDate": "D:20221117095433-08\u002700\u0027",
      "/Producer": "Adobe PDF Library 22.3.58",
      "/SourceModified": "D:20221117174741",
      "/Title": "EWA-C SP Template",
      "pdf_file_size_bytes": 616697,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/STM/cmvp/index.html",
          "https://www.al-enterprise.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "ed680a338344f05f44fded754c7d0dbfaeed60c956099b85e74723e67502b505",
    "policy_txt_hash": "22700bd3d0df3f2c2fe90615f1335bb1d37667ce17e9bd8b2aa617de1c1cb5f9"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in the Security Policy Section 3.1. When operated in FIPS mode. No assurance of the minimum strength of generated keys",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/November 2022_051222_0640_signed.pdf",
    "date_sunset": "2026-09-21",
    "description": "The OmniSwitch AOS Cryptographic Module provides cryptographic functionality to Alcatel-Lucent Enterprise software applications present on the Alcatel-Lucent Enterprise OmniSwitch series of routers.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "OmniSwitch AOS Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "8.6.R11",
    "tested_conf": [
      "Alcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465-P6 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465-P12 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465-P28 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465T-12 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6465T-P12 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-24X4 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-24Z8 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-24Z24 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-48X4 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P24X4 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P24Z8 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P24Z24 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P48X4 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-P48Z16 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-PXZ24 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6560-X10 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860-24 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860-48 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860-P24 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860-P48 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-24 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-48 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-P24 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-P24Z8 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-P48 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6860E-U28 with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6865-P16X with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6865-U12X with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6865-U28X with an ARM Cortex-A9\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-C32 with an Intel Atom C2538\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-Q32 with an NXP QorIQ P2040\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-T20 with an NXP QorIQ P2040\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-T40 with an NXP QorIQ P2040\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-V72 with an Intel Atom C2538\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-X20 with an NXP MPC8572\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-X40 with an NXP MPC8572\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 6900-X72 with an NXP QorIQ P2040\nAlcatel-Lucent Operating System (AOS) 8.6.R11 running on an OmniSwitch 9907 with an Intel Atom C2518 (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-11-28",
        "lab": "UL VERIFICATION SERVICES INC",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Alcatel Lucent Enterprise USA Inc.",
    "vendor_url": "http://www.al-enterprise.com"
  }
}