{"_type": "sec_certs.sample.fips.FIPSCertificate", "dgst": "4eee1c20e6a1b184", "cert_id": 5058, "web_data": {"_type": "sec_certs.sample.fips.FIPSCertificate.WebData", "module_name": "HP Endpoint Security Controller Cryptographic Library", "validation_history": [{"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry", "date": "2025-09-16", "validation_type": "Initial", "lab": "atsec information security corporation"}], "vendor_url": "http://www.hp.com", "vendor": "HP Inc.", "certificate_pdf_url": null, "module_type": "Hardware", "standard": "FIPS 140-3", "status": "active", "level": 1, "caveat": "None", "exceptions": ["Software/Firmware security: N/A", "Non-invasive security: N/A", "Mitigation of other attacks: N/A"], "embodiment": "Single Chip", "description": "The HP Endpoint Security Controller is a platform root of trust embedded into many HP commercial PC\u2019s, which implements the necessary cryptographic security services to enable HP firmware to provide hardware- enforced security and resilience capabilities to the broader computing platform, including but not limited to those described in NIST SP 800-193.", "tested_conf": null, "hw_versions": null, "fw_versions": null, "sw_versions": null, "mentioned_certs": {}, "historical_reason": null, "date_sunset": "2030-04-22", "revoked_reason": null, "revoked_link": null}, "pdf_data": {"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData", "keywords": {"fips_cert_id": {"Cert": {"#5008": 1}}, "fips_security_level": {"Level": {"Level 1": 3, "level 1": 1}}, "fips_certlike": {"Certlike": {"SHA2-512": 8, "SHA2-256": 11, "SHA2-384": 5, "SHA-512": 1, "SHA2- 256": 1, "- PKCS 1": 2, "PKCS#1": 6, "PKCS 1": 2}}, "vendor": {}, "eval_facility": {"atsec": {"atsec": 43}}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 39, "AES-": 3}, "CAST": {"CAST": 30}}, "constructions": {"MAC": {"HMAC": 15, "CMAC": 6}}}, "asymmetric_crypto": {"RSA": {"RSA-PSS": 2}, "ECC": {"ECDH": {"ECDH": 19}, "ECDSA": {"ECDSA": 73}, "ECC": {"ECC": 5}}, "FF": {"DH": {"Diffie-Hellman": 2}}}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA2": {"SHA-512": 1}}}, "crypto_scheme": {"MAC": {"MAC": 9}, "KA": {"Key Agreement": 1}}, "crypto_protocol": {}, "randomness": {"TRNG": {"TRNG": 1}, "PRNG": {"DRBG": 27}, "RNG": {"RBG": 2}}, "cipher_mode": {"ECB": {"ECB": 1}, "CBC": {"CBC": 1}, "CTR": {"CTR": 1}, "CFB": {"CFB": 1}, "OFB": {"OFB": 1}, "GCM": {"GCM": 2}, "CCM": {"CCM": 2}}, "ecc_curve": {"NIST": {"P-256": 18, "P-384": 22, "P-521": 20}}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "device_model": {}, "tee_name": {"AMD": {"PSP": 4}, "IBM": {"SSC": 7}}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS 140-3": 47, "FIPS PUB 140-3": 2, "FIPS186-4": 24, "FIPS 186-4": 7, "FIPS 198-1": 3, "FIPS 180-4": 3, "FIPS 186-5": 2, "FIPS140-3": 1, "FIPS180-4": 1, "FIPS186-5": 1, "FIPS197": 1, "FIPS198-1": 1}, "NIST": {"SP 800-38A": 5, "SP 800-38C": 1, "SP 800-38B": 1, "SP 800-38D": 2, "SP 800-90A": 1, "SP 800-56A": 1, "SP 800-56B": 1, "NIST SP 800-140F": 1}, "PKCS": {"PKCS 1": 2, "PKCS#1": 3}, "RFC": {"RFC3394": 1, "RFC5649": 1}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "policy_metadata": {"pdf_file_size_bytes": 493773, "pdf_is_encrypted": false, "pdf_number_of_pages": 41, "/Creator": "Microsoft\u00ae Word for Microsoft 365", "/CreationDate": "D:20250915170347-05'00'", "/ModDate": "D:20250915170347-05'00'", "/Producer": "Microsoft\u00ae Word for Microsoft 365", "pdf_hyperlinks": {"_type": "Set", "elements": ["http://www.ietf.org/rfc/rfc3394.txt", "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf", "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf", "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf", "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf", "https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/5008", "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf", "http://www.ietf.org/rfc/rfc3447.txt", "http://www.ietf.org/rfc/rfc5649.txt", "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf", "http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf", "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf", "http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf", "http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf", "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Br1.pdf", "http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf", "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf", "https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf", "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90B.pdf", "http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf", "https://doi.org/10.6028/NIST.FIPS.140-3"]}}}, "heuristics": {"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics", "algorithms": {"_type": "Set", "elements": []}, "extracted_versions": {"_type": "Set", "elements": ["-"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "policy_prunned_references": {"_type": "Set", "elements": ["5008"]}, "module_prunned_references": {"_type": "Set", "elements": []}, "policy_processed_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": {"_type": "Set", "elements": ["5008"]}, "indirectly_referencing": {"_type": "Set", "elements": ["5008"]}}, "module_processed_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "direct_transitive_cves": null, "indirect_transitive_cves": null}, "state": {"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState", "module_download_ok": true, "policy_download_ok": true, "policy_convert_ok": true, "module_extract_ok": true, "policy_extract_ok": true, "policy_pdf_hash": "d491e5c01b12167ef3c433c65cc41dd9d857e5aa4f5c70b748710052009a07bd", "policy_txt_hash": "3db35bd752cc4b898a8b77699df30898b517bf71b56ed49ca7d0337ef438f76b", "policy_json_hash": null}}