This page was not yet optimized for use on mobile devices.
OpenSSL FIPS Provider for AlmaLinux 9
Certificate #4823
Webpage information
Security policy
Symmetric Algorithms
AES, AES-256, AES-, AES-128, CAST, HMAC, CMACAsymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-512, SHA-256, SHA-3, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, PBKDF2, PBKDFSchemes
MAC, Key Exchange, Key AgreementProtocols
SSH, TLS v1.3, TLS v1.2, TLS 1.2, TLS, TLS 1.3, IKERandomness
DRBG, RNG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521, P-224Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSTrusted Execution Environments
PSP, SSCSecurity level
Level 1Side-channel analysis
side-channel, timing attacks, Fault InductionStandards
FIPS 140-3, FIPS PUB 140-3, FIPS186-4, FIPS 186-4, FIPS 198-1, FIPS 202, FIPS 180-4, FIPS 197, SP 800-132, SP 800-56C, SP 800-135, SP 800-90A, SP 800-38A, SP 800-38C, SP 800-38B, SP 800-38F, SP 800-38E, SP 800-56A, SP 800-38D, SP 800-108, SP 800-140B, SP 800-90B, PKCS#1, RFC7627, RFC 5288, RFC8446, RFC 3526, RFC 7919, RFC 4253, RFC 6668, RFC 8446File metadata
Creation date | D:20240927144708Z00'00' |
---|---|
Modification date | D:20240927144708Z00'00' |
Pages | 103 |
Producer | macOS Versione 14.5 (Build 23F79) Quartz PDFContext |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates
-
24.02.2025 The certificate data changed.
Certificate changed
The web extraction data was updated.
- The exceptions property was updated.
-
08.10.2024 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name OpenSSL FIPS Provider for AlmaLinux 9 was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4823,
"dgst": "9189d4def691cd31",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHA2-512A4082",
"SHA2-512/224A4082",
"SHA3-256A4055",
"AES-CBC-CS2A4063",
"AES-CBCA4063",
"HMAC-SHA3-384A4055",
"KDA HKDF Sp800-56Cr1A4052",
"SHAKE-128A4055",
"AES-OFBA4063",
"HMAC-SHA3-256A4055",
"SHA2-224A4082",
"ECDSA KeyVer (FIPS186-4)A4082",
"AES-CFB8A4063",
"KDF ANS 9.63A4082",
"HMAC-SHA2-512/224A4082",
"HMAC DRBGA4053",
"HMAC-SHA2-256A4082",
"AES-GCMA4078",
"HMAC-SHA3-512A4055",
"SHA3-512A4055",
"KDF SP800-108A4084",
"TLS v1.2 KDF RFC7627A4082",
"AES-XTS Testing Revision 2.0A4063",
"KDA OneStep SP800-56Cr2A4051",
"SHA2-256A4082",
"Hash DRBGA4053",
"KAS-ECC-SSC Sp800-56Ar3A4082",
"Safe Primes Key GenerationA4085",
"AES-CFB128A4063",
"PBKDFA4082",
"AES-GMACA4078",
"AES-KWPA4063",
"AES-CFB1A4063",
"HMAC-SHA3-224A4055",
"AES-CBC-CS3A4063",
"AES-CBC-CS1A4063",
"HMAC-SHA2-384A4082",
"HMAC-SHA2-512A4082",
"ECDSA SigGen (FIPS186-4)A4082",
"ECDSA KeyGen (FIPS186-4)A4082",
"HMAC-SHA2-224A4082",
"Counter DRBGA4053",
"SHAKE-256A4055",
"SHA2-384A4082",
"AES-ECBA4066",
"AES-KWA4063",
"HMAC-SHA2-512/256A4082",
"RSA SigGen (FIPS186-4)A4082",
"RSA KeyGen (FIPS186-4)A4082",
"AES-CTRA4063",
"SHA3-224A4055",
"HMAC-SHA-1A4082",
"KDF SSHA4066",
"KAS-FFC-SSC Sp800-56Ar3A4085",
"SHA2-512/256A4082",
"SHA-1A4082",
"TLS v1.3 KDFA4052",
"AES-CMACA4063",
"RSA SigVer (FIPS186-4)A4082",
"ECDSA SigVer (FIPS186-4)A4082",
"KDF ANS 9.42A4082",
"SHA3-384A4055",
"AES-CCMA4063"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"9"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 13
},
"ECDSA": {
"ECDSA": 101
}
},
"FF": {
"DH": {
"DH": 35,
"Diffie-Hellman": 10
}
},
"RSA": {
"RSA-OAEP": 3,
"RSA-PSS": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 11
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 27
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 9
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 11
}
},
"crypto_protocol": {
"IKE": {
"IKE": 6
},
"SSH": {
"SSH": 43
},
"TLS": {
"TLS": {
"TLS": 31,
"TLS 1.2": 9,
"TLS 1.3": 8,
"TLS v1.2": 26,
"TLS v1.3": 6
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 9
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-224": 18,
"P-256": 36,
"P-384": 14,
"P-521": 12
}
},
"eval_facility": {
"atsec": {
"atsec": 2
}
},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES-128": 7,
"AES-256": 2,
"HMAC SHA-256": 5,
"HMAC-SHA- 1": 2,
"HMAC-SHA-1": 16,
"PKCS#1": 30,
"SHA- 2": 1,
"SHA- 3": 1,
"SHA- 384": 1,
"SHA-1": 36,
"SHA-224": 5,
"SHA-256": 38,
"SHA-3": 10,
"SHA-512": 3,
"SHA2-224": 8,
"SHA2-256": 31,
"SHA2-384": 8,
"SHA2-512": 17,
"SHA3-224": 3,
"SHA3-256": 6,
"SHA3-384": 5,
"SHA3-512": 4
}
},
"fips_security_level": {
"Level": {
"Level 1": 2
}
},
"hash_function": {
"PBKDF": {
"PBKDF": 32,
"PBKDF2": 8
},
"SHA": {
"SHA1": {
"SHA-1": 36
},
"SHA2": {
"SHA-224": 5,
"SHA-256": 38,
"SHA-512": 3
},
"SHA3": {
"SHA-3": 10,
"SHA3-224": 3,
"SHA3-256": 6,
"SHA3-384": 5,
"SHA3-512": 4
}
},
"SHAKE": {
"SHAKE128": 9,
"SHAKE256": 9
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 44
},
"RNG": {
"RBG": 2,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Induction": 2
},
"SCA": {
"side-channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 140-3": 121,
"FIPS 180-4": 37,
"FIPS 186-4": 42,
"FIPS 197": 1,
"FIPS 198-1": 41,
"FIPS 202": 7,
"FIPS PUB 140-3": 2,
"FIPS186-4": 138
},
"NIST": {
"SP 800-108": 1,
"SP 800-132": 13,
"SP 800-135": 22,
"SP 800-140B": 1,
"SP 800-38A": 66,
"SP 800-38B": 7,
"SP 800-38C": 7,
"SP 800-38D": 25,
"SP 800-38E": 8,
"SP 800-38F": 15,
"SP 800-56A": 8,
"SP 800-56C": 2,
"SP 800-90A": 3,
"SP 800-90B": 1
},
"PKCS": {
"PKCS#1": 15
},
"RFC": {
"RFC 3526": 3,
"RFC 4253": 1,
"RFC 5288": 3,
"RFC 6668": 1,
"RFC 7919": 3,
"RFC 8446": 1,
"RFC7627": 20,
"RFC8446": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 68,
"AES-": 24,
"AES-128": 7,
"AES-256": 2
},
"CAST": {
"CAST": 217
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"HMAC": 26
}
}
},
"tee_name": {
"AMD": {
"PSP": 3
},
"IBM": {
"SSC": 13
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/CreationDate": "D:20240927144708Z00\u002700\u0027",
"/ModDate": "D:20240927144708Z00\u002700\u0027",
"/Producer": "macOS Versione 14.5 (Build 23F79) Quartz PDFContext",
"pdf_file_size_bytes": 1065864,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr1.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a-add.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140B.pdf",
"https://webstore.ansi.org/standards/ascx9/ansix9632001",
"http://www.atsec.com/",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf",
"https://webstore.ansi.org/standards/ascx9/ansix9422001",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf",
"https://www.ietf.org/rfc/rfc3526.txt",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
"https://www.ietf.org/rfc/rfc8446.txt",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf",
"https://www.ietf.org/rfc/rfc5288.txt",
"https://www.ietf.org/rfc/rfc7919.txt",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90B.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
"https://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf",
"https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 103
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "5be7726d9daeb02fbc1a0aea39ea7a9cec867dd878d6019d315e0579ca6af8f1",
"policy_txt_hash": "744d33afaefe4b67c2c8931672aae4861514c87ea3952b2a11d1a686b95fd15d"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "Interim validation. When operated in Approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy",
"certificate_pdf_url": null,
"date_sunset": "2026-10-06",
"description": "AlmaLinux 9.2 OpenSSL FIPS provider implementation providing cryptographic services to Linux user space software components.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical security: N/A",
"Non-invasive security: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "OpenSSL FIPS Provider for AlmaLinux 9",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": "3.0.7-1d2bd88ee26b3c90",
"tested_conf": [
"AlmaLinux 9.2 running on Amazon Web Services (AWS) a1.metal with AWS Graviton with PAA",
"AlmaLinux 9.2 running on Amazon Web Services (AWS) a1.metal with AWS Graviton without PAA",
"AlmaLinux 9.2 running on Amazon Web Services (AWS) m5.metal with Intel Xeon Platinum 8259CL with PAA",
"AlmaLinux 9.2 running on Amazon Web Services (AWS) m5.metal with Intel Xeon Platinum 8259CL without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-10-07",
"lab": "ATSEC INFORMATION SECURITY CORP",
"validation_type": "Initial"
}
],
"vendor": "Cloudlinux Inc., TuxCare division",
"vendor_url": "http://www.tuxcare.com"
}
}