OpenSSL Module

Certificate #1930

Webpage information

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 08.04.2013
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat The module generates cryptographic keys whose strengths are modified by available entropy. When installed, initialized and configured as specified in the security policy section 9.1
Description The OpenSSL Module is a software library supporting FIPS 140-2 -approved cryptographic algorithms for the purposes of protecting data in transit and at rest on the SUSE Linux platforms.
Tested configurations
  • SUSE Linux Enterprise Server 11 SP2 32-bit running on HP ProLiant DL380 with PAA
  • SUSE Linux Enterprise Server 11 SP2 32-bit running on HP ProLiant DL380 without PAA
  • SUSE Linux Enterprise Server 11 SP2 64-bit running on HP ProLiant DL380 with PAA (single-user mode)
  • SUSE Linux Enterprise Server 11 SP2 64-bit running on HP ProLiant DL380 without PAA
Vendor SUSE Linux Products GmbH
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, Triple-DES, TDES, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-256, SHA-224, SHA-384, SHA-512, MD5
Schemes
MAC, Key agreement, Key Agreement
Protocols
SSH, TLS
Randomness
PRNG, RNG
Libraries
OpenSSL
Block cipher modes
ECB, CBC, CFB, OFB, CCM

Security level
Level 1, level 1
Side-channel analysis
timing attacks

Standards
FIPS 140-2, FIPS 197, FIPS 180-3, FIPS 198-1, FIPS 186-3, PKCS #1

File metadata

Title FIPS 140-2 Security Policy
Subject SUSE Linux Enterprise Server 11 SP2 - OpenSSL Module
Author Alejandro Fabio Masino
Creation date D:20130401152336-05'00'
Modification date D:20130408090025-04'00'
Pages 21
Creator Writer
Producer OpenOffice.org 3.0

References

Incoming
  • 2435 - historical - SUSE Linux Enterprise Server 12 - OpenSSL Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1930,
  "dgst": "70fa656aa0391eb9",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "DSA#651",
        "SHS#1797",
        "AES#2053",
        "DSA#650",
        "RNG#1074",
        "RNG#1073",
        "HMAC#1250",
        "Triple-DES#1323",
        "Triple-DES#1324",
        "AES#2055",
        "HMAC#1249",
        "SHS#1798",
        "RSA#1069",
        "RSA#1070",
        "AES#2052",
        "AES#2054"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2435"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2472",
          "2484",
          "3038",
          "2435",
          "3099",
          "2471",
          "2549"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 9
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 1
        },
        "CFB": {
          "CFB": 5
        },
        "ECB": {
          "ECB": 3
        },
        "OFB": {
          "OFB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 29
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 2
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1,
          "#1069": 1,
          "#1070": 1,
          "#1073": 1,
          "#1074": 1,
          "#1249": 5,
          "#1250": 5,
          "#1323": 1,
          "#1324": 1,
          "#1797": 5,
          "#1798": 5,
          "#2052": 1,
          "#2053": 1,
          "#2054": 1,
          "#2055": 1,
          "#650": 1,
          "#651": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "HMAC SHA- 224": 1,
          "HMAC SHA-1": 1,
          "HMAC SHA-256": 5,
          "HMAC SHA-384": 1,
          "HMAC SHA-512": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-224": 2,
          "HMAC-SHA-256": 4,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 2,
          "HMAC-SHA224": 2,
          "HMAC-SHA256": 2,
          "HMAC-SHA384": 2,
          "HMAC-SHA512": 2,
          "PKCS #1": 2,
          "SHA- 224": 1,
          "SHA-1": 4,
          "SHA-224": 3,
          "SHA-256": 9,
          "SHA-384": 4,
          "SHA-512": 5
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "level 1": 4
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 9,
            "SHA-384": 4,
            "SHA-512": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 4
        },
        "RNG": {
          "RNG": 5
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 40,
          "FIPS 180-3": 1,
          "FIPS 186-3": 1,
          "FIPS 197": 1,
          "FIPS 198-1": 1
        },
        "PKCS": {
          "PKCS #1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13
          }
        },
        "DES": {
          "3DES": {
            "TDES": 5,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 24,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Alejandro Fabio Masino",
      "/CreationDate": "D:20130401152336-05\u002700\u0027",
      "/Creator": "Writer",
      "/ModDate": "D:20130408090025-04\u002700\u0027",
      "/Producer": "OpenOffice.org 3.0",
      "/Subject": "SUSE Linux Enterprise Server 11 SP2 - OpenSSL Module",
      "/Title": "FIPS 140-2 Security Policy",
      "pdf_file_size_bytes": 202774,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://webstore.ansi.org/FindStandards.aspx?Action=displaydept\u0026DeptID=80\u0026Acro=X9\u0026DpName=X9,%20Inc.",
          "http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI+X9.52%3A1998",
          "mailto:[email protected]",
          "http://csrc.nist.gov/groups/STM/cmvp/standards.html",
          "http://csrc.nist.gov/publications/PubsFIPS.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "4b72f395dd5e1d80cef7707bcd8bfc6ce341dcba86cde4a53e69d676085e53f8",
    "policy_txt_hash": "cb75e3f08960ce7785c1f90c228e79cc554b68b790239c0fb8958b3bd6b1c500"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "The module generates cryptographic keys whose strengths are modified by available entropy. When installed, initialized and configured as specified in the security policy section 9.1",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0028.pdf",
    "date_sunset": null,
    "description": "The OpenSSL Module is a software library supporting FIPS 140-2 -approved cryptographic algorithms for the purposes of protecting data in transit and at rest on the SUSE Linux platforms.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": null,
    "fw_versions": null,
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "OpenSSL Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "0.9.8j",
    "tested_conf": [
      "SUSE Linux Enterprise Server 11 SP2 32-bit running on HP ProLiant DL380 with PAA",
      "SUSE Linux Enterprise Server 11 SP2 32-bit running on HP ProLiant DL380 without PAA",
      "SUSE Linux Enterprise Server 11 SP2 64-bit running on HP ProLiant DL380 with PAA (single-user mode)",
      "SUSE Linux Enterprise Server 11 SP2 64-bit running on HP ProLiant DL380 without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2013-04-08",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      }
    ],
    "vendor": "SUSE Linux Products GmbH",
    "vendor_url": "http://www.suse.com"
  }
}