IBM® Crypto for C

Certificate #2420

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 05.08.2015
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description The IBM Crypto for C v8.4.0.0 (ICC) cryptographic module is implemented in the C programming language. It is packaged as dynamic (shared) libraries usable by applications written in a language that supports C language linking conventions (e.g. C, C++, Java, Assembler, etc.) for use on commercially available operating systems. The ICC allows these applications to access cryptographic functions using an Application Programming Interface (API) provided through an ICC import library and based on the API defined by the OpenSSL group.
Tested configurations
  • AIX® 7.1 64-bit running on an IBM 8286-42A POWER8 with PAA
  • AIX® 7.1 64-bit running on an IBM 8286-42A POWER8 without PAA
  • Microsoft Windows Server 2008® 64-bit running on S2600CP with PAA
  • Microsoft Windows Server 2008® 64-bit running on S2600CP without PAA
  • Red Hat Linux Enterprise Server 7.0 64-bit running on S2600CP with PAA
  • Red Hat Linux Enterprise Server 7.0 64-bit running on S2600CP without PAA
  • Red Hat Linux Enterprise Server 7.0 BE 64-bit running on an IBM 8286-42A POWER8 with PAA
  • Red Hat Linux Enterprise Server 7.0 BE 64-bit running on an IBM 8286-42A POWER8 without PAA
  • SLES 11 64-bit running on an IBM zSeries z196 type 2817 model M32 with CPACF
  • SLES 11 64-bit running on an IBM zSeries z196 type 2817 model M32 without CPACF (single-user mode)
  • Solaris® 11 64-bit running on Netra SPARC T4-1 Server with PAA
  • Solaris® 11 64-bit running on Netra SPARC T4-1 Server without PAA
  • Ubuntu 14.04 LE 64-bit running on IBM 8247-22L POWER8 with PAA
  • Ubuntu 14.04 LE 64-bit running on IBM 8247-22L POWER8 without PAA
Vendor IBM® Corporation
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, Rijndael, CAST, RC2, RC4, DES, TDEA, Triple-DES, Blowfish, Camellia, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD4, MD5, RIPEMD
Schemes
Key Agreement, Key agreement
Protocols
SSL, TLS
Randomness
TRNG, PRNG, DRBG, RNG, RBG
Libraries
OpenSSL
Elliptic Curves
P-192, P-224, P-256, P-384, P-521, K-163, B-163, K-233, K-283, K-409, K-571, B-233, B-283, B-409, B-571
Block cipher modes
ECB, CBC, CTR, OFB, GCM, CCM, XTS

Vendor
Microsoft

Security level
level 1, Level 1

Standards
FIPS 140-2, FIPS140-2, FIPS PUB 140-2, FIPS180-4, FIPS186-4, FIPS197, FIPS198-1, FIPS 186-4, FIPS 186-2, SP 800-67, PKCS#1, RFC 5288

File metadata

Title
Author amasino
Creation date D:20150716144129-05'00'
Modification date D:20150804075356-04'00'
Pages 31
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2420,
  "dgst": "7f5d3582377f050d",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#3237",
        "DRBG#701",
        "ECDSA#606",
        "DRBG#706",
        "AES#3248",
        "DRBG#708",
        "RSA#1641",
        "ECDSA#607",
        "AES#3228",
        "SHS#2683",
        "ECDSA#597",
        "RSA#1654",
        "HMAC#2040",
        "Triple-DES#1837",
        "SHS#2688",
        "SHS#2687",
        "RSA#1642",
        "DRBG#688",
        "HMAC#2048",
        "DRBG#691",
        "AES#3240",
        "SHS#2672",
        "SHS#2678",
        "DRBG#690",
        "DSA#930",
        "DSA#928",
        "DRBG#713",
        "SHS#2668",
        "SHS#2671",
        "SHS#2685",
        "DSA#925",
        "HMAC#2044",
        "ECDSA#605",
        "RSA#1649",
        "DRBG#711",
        "AES#3246",
        "SHS#2670",
        "DSA#929",
        "SHS#2684",
        "SHS#2675",
        "DSA#919",
        "DSA#924",
        "Triple-DES#1833",
        "SHS#2673",
        "CVL#451",
        "AES#3245",
        "HMAC#2031",
        "AES#3239",
        "DRBG#687",
        "SHS#2666",
        "CVL#445",
        "CVL#441",
        "AES#3230",
        "DRBG#693",
        "DRBG#700",
        "DRBG#699",
        "CVL#452",
        "SHS#2680",
        "Triple-DES#1835",
        "CVL#453",
        "RSA#1655",
        "DRBG#703",
        "HMAC#2032",
        "AES#3226",
        "HMAC#2034",
        "HMAC#2036",
        "Triple-DES#1836",
        "DRBG#696",
        "HMAC#2046",
        "AES#3251",
        "RSA#1646",
        "AES#3236",
        "DRBG#694",
        "RSA#1648",
        "AES#3252",
        "CVL#449",
        "AES#3247",
        "SHS#2682",
        "Triple-DES#1840",
        "RSA#1640",
        "CVL#450",
        "AES#3238",
        "CVL#447",
        "DRBG#705",
        "ECDSA#601",
        "AES#3235",
        "CVL#444",
        "SHS#2686",
        "DSA#927",
        "CVL#442",
        "AES#3231",
        "DSA#923",
        "HMAC#2051",
        "DRBG#692",
        "HMAC#2030",
        "AES#3232",
        "HMAC#2033",
        "DSA#921",
        "RSA#1651",
        "SHS#2676",
        "DSA#922",
        "HMAC#2039",
        "ECDSA#608",
        "HMAC#2049",
        "RSA#1643",
        "Triple-DES#1838",
        "DRBG#704",
        "AES#3229",
        "AES#3242",
        "SHS#2679",
        "SHS#2667",
        "Triple-DES#1841",
        "RSA#1652",
        "AES#3233",
        "DRBG#697",
        "ECDSA#600",
        "DRBG#710",
        "DSA#920",
        "DSA#926",
        "DRBG#709",
        "HMAC#2038",
        "CVL#446",
        "RSA#1647",
        "CVL#448",
        "Triple-DES#1843",
        "ECDSA#603",
        "HMAC#2050",
        "CVL#443",
        "AES#3249",
        "Triple-DES#1844",
        "AES#3227",
        "AES#3250",
        "RSA#1653",
        "ECDSA#604",
        "AES#3243",
        "ECDSA#610",
        "DRBG#712",
        "RSA#1645",
        "HMAC#2045",
        "DRBG#689",
        "Triple-DES#1842",
        "AES#3241",
        "ECDSA#602",
        "HMAC#2041",
        "DRBG#707",
        "SHS#2681",
        "SHS#2677",
        "ECDSA#609",
        "HMAC#2047",
        "ECDSA#596",
        "Triple-DES#1839",
        "DSA#931",
        "HMAC#2035",
        "SHS#2669",
        "HMAC#2042",
        "HMAC#2043",
        "ECDSA#599",
        "DRBG#702",
        "Triple-DES#1834",
        "RSA#1650",
        "ECDSA#598",
        "HMAC#2037",
        "AES#3244",
        "DRBG#698",
        "Triple-DES#1832"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 19
          }
        },
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 9
          },
          "DSA": {
            "DSA": 10
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CCM": {
          "CCM": 1
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 3
        },
        "OFB": {
          "OFB": 2
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 7
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 3,
          "B-233": 2,
          "B-283": 1,
          "B-409": 1,
          "B-571": 1,
          "K-163": 3,
          "K-233": 2,
          "K-283": 1,
          "K-409": 1,
          "K-571": 1,
          "P-192": 6,
          "P-224": 2,
          "P-256": 2,
          "P-384": 6,
          "P-521": 2
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 31
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#1640": 1,
          "#1641": 1,
          "#1642": 1,
          "#1643": 1,
          "#1645": 1,
          "#1646": 1,
          "#1647": 1,
          "#1648": 1,
          "#1649": 1,
          "#1650": 1,
          "#1651": 1,
          "#1652": 1,
          "#1653": 1,
          "#1654": 1,
          "#1655": 1,
          "#1832": 1,
          "#1833": 1,
          "#1834": 1,
          "#1835": 1,
          "#1836": 1,
          "#1837": 1,
          "#1838": 1,
          "#1839": 1,
          "#1840": 1,
          "#1841": 1,
          "#1842": 1,
          "#1843": 1,
          "#1844": 1,
          "#2030": 1,
          "#2031": 1,
          "#2032": 1,
          "#2033": 1,
          "#2034": 1,
          "#2035": 1,
          "#2036": 1,
          "#2037": 1,
          "#2038": 1,
          "#2039": 1,
          "#2040": 1,
          "#2041": 1,
          "#2042": 1,
          "#2043": 1,
          "#2044": 1,
          "#2045": 1,
          "#2046": 1,
          "#2047": 1,
          "#2048": 1,
          "#2049": 1,
          "#2050": 1,
          "#2051": 1,
          "#2666": 1,
          "#2667": 1,
          "#2668": 1,
          "#2669": 1,
          "#2670": 1,
          "#2671": 1,
          "#2672": 1,
          "#2673": 1,
          "#2675": 1,
          "#2676": 1,
          "#2677": 1,
          "#2678": 1,
          "#2679": 1,
          "#2680": 1,
          "#2681": 1,
          "#2682": 1,
          "#2683": 1,
          "#2684": 1,
          "#2685": 1,
          "#2686": 1,
          "#2687": 1,
          "#2688": 1,
          "#3226": 1,
          "#3227": 1,
          "#3228": 1,
          "#3229": 1,
          "#3230": 1,
          "#3231": 1,
          "#3232": 1,
          "#3233": 1,
          "#3235": 1,
          "#3236": 1,
          "#3237": 1,
          "#3238": 1,
          "#3239": 1,
          "#3240": 1,
          "#3241": 1,
          "#3242": 1,
          "#3243": 1,
          "#3244": 1,
          "#3245": 1,
          "#3246": 1,
          "#3247": 1,
          "#3248": 1,
          "#3249": 1,
          "#3250": 1,
          "#3251": 1,
          "#3252": 1,
          "#441": 1,
          "#442": 1,
          "#443": 1,
          "#444": 1,
          "#445": 1,
          "#446": 1,
          "#447": 1,
          "#448": 1,
          "#449": 1,
          "#450": 1,
          "#451": 1,
          "#452": 1,
          "#453": 1,
          "#596": 1,
          "#597": 1,
          "#598": 1,
          "#599": 1,
          "#600": 1,
          "#601": 1,
          "#602": 1,
          "#603": 1,
          "#604": 1,
          "#605": 1,
          "#606": 1,
          "#607": 1,
          "#608": 1,
          "#609": 1,
          "#610": 1,
          "#687": 1,
          "#688": 1,
          "#689": 1,
          "#690": 1,
          "#691": 1,
          "#692": 1,
          "#693": 1,
          "#694": 1,
          "#696": 1,
          "#697": 1,
          "#698": 1,
          "#699": 1,
          "#700": 1,
          "#701": 1,
          "#702": 1,
          "#703": 1,
          "#704": 1,
          "#705": 1,
          "#706": 1,
          "#707": 1,
          "#708": 1,
          "#709": 1,
          "#710": 1,
          "#711": 1,
          "#712": 1,
          "#713": 1,
          "#919": 1,
          "#920": 1,
          "#921": 1,
          "#922": 1,
          "#923": 1,
          "#924": 1,
          "#925": 1,
          "#926": 1,
          "#927": 1,
          "#928": 1,
          "#929": 1,
          "#930": 1,
          "#931": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "#2688 DRBG": 1,
          "#610 SHA": 1,
          "#713 HMAC": 1,
          "#931 RSA": 1,
          "AES #3226": 1,
          "AES 256": 1,
          "CVL #441": 1,
          "DRBG #687": 1,
          "DSA #919": 1,
          "HMAC #2030": 2,
          "HMAC - SHA-224": 1,
          "HMAC - SHA-384": 1,
          "HMAC-SHA-1": 2,
          "HMAC-SHA-224": 2,
          "HMAC-SHA-256": 2,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 2,
          "HMAC-SHA256": 2,
          "PKCS#1": 14,
          "RSA #1640": 1,
          "SHA #2666": 1,
          "SHA- 256": 1,
          "SHA-1": 11,
          "SHA-2": 5,
          "SHA-224": 7,
          "SHA-256": 9,
          "SHA-384": 7,
          "SHA-512": 7
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "level 1": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 5
          },
          "MD5": {
            "MD5": 5
          }
        },
        "RIPEMD": {
          "RIPEMD": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 11
          },
          "SHA2": {
            "SHA-2": 5,
            "SHA-224": 8,
            "SHA-256": 8,
            "SHA-384": 8,
            "SHA-512": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19,
          "PRNG": 3
        },
        "RNG": {
          "RBG": 1,
          "RNG": 9
        },
        "TRNG": {
          "TRNG": 12
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 40,
          "FIPS 186-2": 1,
          "FIPS 186-4": 1,
          "FIPS PUB 140-2": 3,
          "FIPS140-2": 1,
          "FIPS180-4": 3,
          "FIPS186-4": 8,
          "FIPS197": 7,
          "FIPS198-1": 2
        },
        "NIST": {
          "SP 800-67": 1
        },
        "PKCS": {
          "PKCS#1": 7
        },
        "RFC": {
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22
          },
          "CAST": {
            "CAST": 1
          },
          "RC": {
            "RC2": 3,
            "RC4": 2
          },
          "Rijndael": {
            "Rijndael": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 3,
            "Triple-DES": 8
          },
          "DES": {
            "DES": 12
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 4,
            "HMAC": 12,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 1
          },
          "Camellia": {
            "Camellia": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "amasino",
      "/CreationDate": "D:20150716144129-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20150804075356-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": " ",
      "pdf_file_size_bytes": 402422,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "file:///C:/Z:IBMGSKitFIPS43-129TID%2011-0002developerdesign_assuranceiccDoc4ATSEC1.2icchtmldetailedhtmlicc__a_8h.html%237209213a1296479ac60c67f3a86f3275",
          "file:///C:/Z:IBMGSKitFIPS43-129TID%2011-0002developerdesign_assuranceiccDoc4ATSEC1.2icchtmldetailedhtmlicc__a_8h.html%236e45d7a69c0ccd49614d4778f3bfea97",
          "file:///C:/Z:IBMGSKitFIPS43-129TID%2011-0002developerdesign_assuranceiccDoc4ATSEC1.2icchtmldetailedhtmlicc__a_8h.html%23abf4b56874dd56932779c6eca9b85f59",
          "file:///C:/Z:IBMGSKitFIPS43-129TID%2011-0002developerdesign_assuranceiccDoc4ATSEC1.2icchtmldetailedhtmlicc__a_8h.html%23eaef1b0d85a45ad477f594f83cfe7beb",
          "file:///C:/Z:IBMGSKitFIPS43-129TID%2011-0002developerdesign_assuranceiccDoc4ATSEC1.2icchtmldetailedhtmlicc__a_8h.html%230a5c5ea68b97780cfd603b77a621d205",
          "file:///C:/Z:IBMGSKitFIPS43-129TID%2011-0002developerdesign_assuranceiccDoc4ATSEC1.2icchtmldetailedhtmlicc__a_8h.html%23471936f30d3b4d97e4d9db79fffb55ab",
          "file:///C:/Z:IBMGSKitFIPS43-129TID%2011-0002developerdesign_assuranceiccDoc4ATSEC1.2icchtmldetailedhtmlicc__a_8h.html%238a381cb01df1f5e7c61dbc3f0964e224",
          "file:///C:/Z:IBMGSKitFIPS43-129TID%2011-0002developerdesign_assuranceiccDoc4ATSEC1.2icchtmldetailedhtmlicc__a_8h.html%23ddade425bc97dd5c96142b63badd7db6",
          "file:///C:/Z:IBMGSKitFIPS43-129TID%2011-0002developerdesign_assuranceiccDoc4ATSEC1.2icchtmldetailedhtmlicc__a_8h.html%235e0cf9533f4eaf92ac4e17819dc42301"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 31
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "8ad3d29ae21b8bfc3fc2da5b735658ec202f9464d5caa50ac98a6962be11fb52",
    "policy_txt_hash": "97621779d96c80e6915bcc24c7927846f9f4a0b79300e3b00b0d43a89a83049a"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0056.pdf",
    "date_sunset": null,
    "description": "The IBM Crypto for C v8.4.0.0 (ICC) cryptographic module is implemented in the C programming language. It is packaged as dynamic (shared) libraries usable by applications written in a language that supports C language linking conventions (e.g. C, C++, Java, Assembler, etc.) for use on commercially available operating systems. The ICC allows these applications to access cryptographic functions using an Application Programming Interface (API) provided through an ICC import library and based on the API defined by the OpenSSL group.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "IBM\u00ae Crypto for C",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "8.4.1.0",
    "tested_conf": [
      "AIX\u00ae 7.1 64-bit running on an IBM 8286-42A POWER8 with PAA",
      "AIX\u00ae 7.1 64-bit running on an IBM 8286-42A POWER8 without PAA",
      "Microsoft Windows Server 2008\u00ae 64-bit running on S2600CP with PAA",
      "Microsoft Windows Server 2008\u00ae 64-bit running on S2600CP without PAA",
      "Red Hat Linux Enterprise Server 7.0 64-bit running on S2600CP with PAA",
      "Red Hat Linux Enterprise Server 7.0 64-bit running on S2600CP without PAA",
      "Red Hat Linux Enterprise Server 7.0 BE 64-bit running on an IBM 8286-42A POWER8 with PAA",
      "Red Hat Linux Enterprise Server 7.0 BE 64-bit running on an IBM 8286-42A POWER8 without PAA",
      "SLES 11 64-bit running on an IBM zSeries z196 type 2817 model M32 with CPACF",
      "SLES 11 64-bit running on an IBM zSeries z196 type 2817 model M32 without CPACF (single-user mode)",
      "Solaris\u00ae 11 64-bit running on Netra SPARC T4-1 Server with PAA",
      "Solaris\u00ae 11 64-bit running on Netra SPARC T4-1 Server without PAA",
      "Ubuntu 14.04 LE 64-bit running on IBM 8247-22L POWER8 with PAA",
      "Ubuntu 14.04 LE 64-bit running on IBM 8247-22L POWER8 without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2015-08-05",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      }
    ],
    "vendor": "IBM\u00ae Corporation",
    "vendor_url": "http://www.ibm.com"
  }
}