This page was not yet optimized for use on mobile
devices.
OpenSSL FIPS Provider for AlmaLinux 9
Certificate #4823
Webpage information
Security policy
Symmetric Algorithms
AES, AES-256, AES-, AES-128, CAST, HMAC, CMACAsymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-512, SHA-256, SHA-3, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, PBKDF2, PBKDFSchemes
MAC, Key Exchange, Key AgreementProtocols
SSH, TLS v1.3, TLS v1.2, TLS 1.2, TLS, TLS 1.3, IKERandomness
DRBG, RNG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521, P-224Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSTrusted Execution Environments
PSP, SSCSecurity level
Level 1Side-channel analysis
side-channel, timing attacks, Fault InductionStandards
FIPS 140-3, FIPS PUB 140-3, FIPS186-4, FIPS 186-4, FIPS 198-1, FIPS 202, FIPS 180-4, FIPS 197, SP 800-132, SP 800-56C, SP 800-135, SP 800-90A, SP 800-38A, SP 800-38C, SP 800-38B, SP 800-38F, SP 800-38E, SP 800-56A, SP 800-38D, SP 800-108, SP 800-140B, SP 800-90B, PKCS#1, RFC7627, RFC 5288, RFC8446, RFC 3526, RFC 7919, RFC 4253, RFC 6668, RFC 8446File metadata
| Creation date | D:20240927144708Z00'00' |
|---|---|
| Modification date | D:20240927144708Z00'00' |
| Pages | 103 |
| Producer | macOS Versione 14.5 (Build 23F79) Quartz PDFContext |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4823,
"dgst": "9189d4def691cd31",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"Counter DRBGA4053",
"HMAC-SHA3-512A4055",
"HMAC-SHA2-512A4082",
"KDF ANS 9.63A4082",
"HMAC-SHA3-256A4055",
"HMAC-SHA2-512/224A4082",
"KDF SP800-108A4084",
"SHA3-512A4055",
"AES-KWPA4063",
"HMAC-SHA2-256A4082",
"AES-CBC-CS3A4063",
"AES-GCMA4078",
"AES-OFBA4063",
"Safe Primes Key GenerationA4085",
"SHAKE-256A4055",
"AES-XTS Testing Revision 2.0A4063",
"PBKDFA4082",
"KDA HKDF Sp800-56Cr1A4052",
"RSA KeyGen (FIPS186-4)A4082",
"HMAC DRBGA4053",
"HMAC-SHA2-512/256A4082",
"TLS v1.2 KDF RFC7627A4082",
"ECDSA KeyVer (FIPS186-4)A4082",
"KDA OneStep SP800-56Cr2A4051",
"AES-GMACA4078",
"SHA3-256A4055",
"SHA2-512/224A4082",
"SHA-1A4082",
"AES-CCMA4063",
"HMAC-SHA2-384A4082",
"AES-CMACA4063",
"AES-CBC-CS2A4063",
"RSA SigGen (FIPS186-4)A4082",
"Hash DRBGA4053",
"AES-CFB128A4063",
"SHA2-384A4082",
"SHA2-512/256A4082",
"ECDSA SigGen (FIPS186-4)A4082",
"SHAKE-128A4055",
"AES-CFB1A4063",
"SHA3-384A4055",
"TLS v1.3 KDFA4052",
"AES-ECBA4066",
"HMAC-SHA3-224A4055",
"SHA2-256A4082",
"HMAC-SHA3-384A4055",
"HMAC-SHA-1A4082",
"AES-CFB8A4063",
"AES-KWA4063",
"SHA2-224A4082",
"AES-CTRA4063",
"KAS-FFC-SSC Sp800-56Ar3A4085",
"ECDSA SigVer (FIPS186-4)A4082",
"KAS-ECC-SSC Sp800-56Ar3A4082",
"AES-CBC-CS1A4063",
"KDF SSHA4066",
"ECDSA KeyGen (FIPS186-4)A4082",
"AES-CBCA4063",
"HMAC-SHA2-224A4082",
"SHA2-512A4082",
"KDF ANS 9.42A4082",
"RSA SigVer (FIPS186-4)A4082",
"SHA3-224A4055"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"9"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 13
},
"ECDSA": {
"ECDSA": 101
}
},
"FF": {
"DH": {
"DH": 35,
"Diffie-Hellman": 10
}
},
"RSA": {
"RSA-OAEP": 3,
"RSA-PSS": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 11
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 27
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 9
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 11
}
},
"crypto_protocol": {
"IKE": {
"IKE": 6
},
"SSH": {
"SSH": 43
},
"TLS": {
"TLS": {
"TLS": 31,
"TLS 1.2": 9,
"TLS 1.3": 8,
"TLS v1.2": 26,
"TLS v1.3": 6
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 9
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-224": 18,
"P-256": 36,
"P-384": 14,
"P-521": 12
}
},
"eval_facility": {
"atsec": {
"atsec": 2
}
},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES-128": 7,
"AES-256": 2,
"HMAC SHA-256": 5,
"HMAC-SHA- 1": 2,
"HMAC-SHA-1": 16,
"PKCS#1": 30,
"SHA- 2": 1,
"SHA- 3": 1,
"SHA- 384": 1,
"SHA-1": 36,
"SHA-224": 5,
"SHA-256": 38,
"SHA-3": 10,
"SHA-512": 3,
"SHA2-224": 8,
"SHA2-256": 31,
"SHA2-384": 8,
"SHA2-512": 17,
"SHA3-224": 3,
"SHA3-256": 6,
"SHA3-384": 5,
"SHA3-512": 4
}
},
"fips_security_level": {
"Level": {
"Level 1": 2
}
},
"hash_function": {
"PBKDF": {
"PBKDF": 32,
"PBKDF2": 8
},
"SHA": {
"SHA1": {
"SHA-1": 36
},
"SHA2": {
"SHA-224": 5,
"SHA-256": 38,
"SHA-512": 3
},
"SHA3": {
"SHA-3": 10,
"SHA3-224": 3,
"SHA3-256": 6,
"SHA3-384": 5,
"SHA3-512": 4
}
},
"SHAKE": {
"SHAKE128": 9,
"SHAKE256": 9
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 44
},
"RNG": {
"RBG": 2,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Induction": 2
},
"SCA": {
"side-channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 140-3": 121,
"FIPS 180-4": 37,
"FIPS 186-4": 42,
"FIPS 197": 1,
"FIPS 198-1": 41,
"FIPS 202": 7,
"FIPS PUB 140-3": 2,
"FIPS186-4": 138
},
"NIST": {
"SP 800-108": 1,
"SP 800-132": 13,
"SP 800-135": 22,
"SP 800-140B": 1,
"SP 800-38A": 66,
"SP 800-38B": 7,
"SP 800-38C": 7,
"SP 800-38D": 25,
"SP 800-38E": 8,
"SP 800-38F": 15,
"SP 800-56A": 8,
"SP 800-56C": 2,
"SP 800-90A": 3,
"SP 800-90B": 1
},
"PKCS": {
"PKCS#1": 15
},
"RFC": {
"RFC 3526": 3,
"RFC 4253": 1,
"RFC 5288": 3,
"RFC 6668": 1,
"RFC 7919": 3,
"RFC 8446": 1,
"RFC7627": 20,
"RFC8446": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 68,
"AES-": 24,
"AES-128": 7,
"AES-256": 2
},
"CAST": {
"CAST": 217
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"HMAC": 26
}
}
},
"tee_name": {
"AMD": {
"PSP": 3
},
"IBM": {
"SSC": 13
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/CreationDate": "D:20240927144708Z00\u002700\u0027",
"/ModDate": "D:20240927144708Z00\u002700\u0027",
"/Producer": "macOS Versione 14.5 (Build 23F79) Quartz PDFContext",
"pdf_file_size_bytes": 1065864,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.ietf.org/rfc/rfc5288.txt",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf",
"https://www.ietf.org/rfc/rfc7919.txt",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf",
"https://webstore.ansi.org/standards/ascx9/ansix9632001",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf",
"https://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf",
"http://www.atsec.com/",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr1.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"https://webstore.ansi.org/standards/ascx9/ansix9422001",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90B.pdf",
"https://www.ietf.org/rfc/rfc8446.txt",
"https://www.ietf.org/rfc/rfc3526.txt",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140B.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a-add.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 103
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "5be7726d9daeb02fbc1a0aea39ea7a9cec867dd878d6019d315e0579ca6af8f1",
"policy_txt_hash": "744d33afaefe4b67c2c8931672aae4861514c87ea3952b2a11d1a686b95fd15d"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "Interim validation. When operated in Approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy",
"certificate_pdf_url": null,
"date_sunset": "2029-10-06",
"description": "AlmaLinux 9.2 OpenSSL FIPS provider implementation providing cryptographic services to Linux user space software components.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical security: N/A",
"Non-invasive security: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "OpenSSL FIPS Provider for AlmaLinux 9",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": "3.0.7-1d2bd88ee26b3c90",
"tested_conf": [
"AlmaLinux 9.2 running on Amazon Web Services (AWS) a1.metal with AWS Graviton with PAA",
"AlmaLinux 9.2 running on Amazon Web Services (AWS) a1.metal with AWS Graviton without PAA",
"AlmaLinux 9.2 running on Amazon Web Services (AWS) m5.metal with Intel Xeon Platinum 8259CL with PAA",
"AlmaLinux 9.2 running on Amazon Web Services (AWS) m5.metal with Intel Xeon Platinum 8259CL without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-10-07",
"lab": "atsec information security corporation",
"validation_type": "Initial"
}
],
"vendor": "Cloudlinux Inc., TuxCare division",
"vendor_url": "http://www.tuxcare.com"
}
}