This page was not yet optimized for use on mobile
devices.
Network Security Services (NSS) Cryptographic Module
Certificate #815
Webpage information
Security policy
Symmetric Algorithms
AES, RC2, RC4, DES, Triple-DES, HMACAsymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, MD5, PBKDF1Schemes
MACProtocols
TLSRandomness
RNGLibraries
NSSElliptic Curves
P-256, P-384, P-521, Curve P-256, K-283, secp160k1, secp160r1, secp160r2, secp192k1, secp224k1, secp256k1, sect163r1, sect193r1, sect193r2, sect239k1, secp112r1, secp112r2, secp128r1, secp128r2, sect113r1, sect113r2, sect131r1, sect131r2, prime192v2, prime192v3, prime239v1, prime239v2, prime239v3, c2pnb163v1, c2pnb163v2, c2pnb163v3, c2tnb191v1, c2tnb191v2, c2tnb191v3, c2tnb239v1, c2tnb239v2, c2tnb239v3, c2pnb176w1, c2pnb208w1, c2pnb272w1, c2pnb304w1, c2pnb368w1Block cipher modes
ECB, CBCVendor
MicrosoftSecurity level
Level 1, Level 2, level 1, level 2Side-channel analysis
Timing attacks, Timing attack, timing attacks, Timing AttacksStandards
FIPS 140-2, FIPS 46-3, FIPS 197, FIPS 180-2, FIPS 198, FIPS 186-2, PKCS #11, PKCS #5, PKCS #1File metadata
| Title | Security Policy - MozillaWiki |
|---|---|
| Keywords | Security Policy |
| Creation date | D:20070719122604-07'00' |
| Modification date | D:20070813095356-04'00' |
| Pages | 31 |
| Creator | Writer |
| Producer | StarOffice 7 |
References
Incoming- 1386 - historical - Red Hat Enterprise Linux 5 OpenSwan Cryptographic Module
- 2310 - historical - Brocade® FCX 624/648, ICX ™ 6610, ICX 6450, ICX 6650, ICX 7750 and SX 800/1600 Series
- 1859 - historical - Red Hat Enterprise Linux 6.2 Openswan Cryptographic Module
- 1387 - historical - Red Hat Enterprise Linux 5 Kernel Crypto API Cryptographic Module
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 815,
"dgst": "96da2f8885ba92c9",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"AES#352",
"HMAC#152",
"ECDSA#37",
"SHS#426",
"RSA#152",
"ECDSA#30",
"DSA#172",
"Triple-DES#410",
"Triple-DES#469",
"RNG#208"
]
},
"cpe_matches": null,
"direct_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2001-0473",
"CVE-2008-4302",
"CVE-2013-4332",
"CVE-2012-6542",
"CVE-2011-1002",
"CVE-2017-5410",
"CVE-2012-0877",
"CVE-2019-14814",
"CVE-2001-1028",
"CVE-2012-1149",
"CVE-2007-6283",
"CVE-2010-4657",
"CVE-2018-19214",
"CVE-2015-0383",
"CVE-2011-2942",
"CVE-2014-0224",
"CVE-2001-0889",
"CVE-2020-27774",
"CVE-2000-0604",
"CVE-2012-3359",
"CVE-2016-9900",
"CVE-2011-3630",
"CVE-2013-4235",
"CVE-2012-1568",
"CVE-2012-2697",
"CVE-2017-5386",
"CVE-2010-0302",
"CVE-2011-3045",
"CVE-2015-1819",
"CVE-1999-0798",
"CVE-2013-3718",
"CVE-2008-3270",
"CVE-2020-27777",
"CVE-2005-4890",
"CVE-2012-2142",
"CVE-2011-3631",
"CVE-2015-0831",
"CVE-2002-0044",
"CVE-2013-4124",
"CVE-2012-5644",
"CVE-2017-5401",
"CVE-2017-5380",
"CVE-1999-1288",
"CVE-2019-11477",
"CVE-2007-3103",
"CVE-2020-27767",
"CVE-2017-5376",
"CVE-2001-1002",
"CVE-2014-3646",
"CVE-2002-0638",
"CVE-2001-0233",
"CVE-2012-6546",
"CVE-2017-5383",
"CVE-2000-1134",
"CVE-2017-1000111",
"CVE-2000-0844",
"CVE-2011-1145",
"CVE-2017-1000253",
"CVE-2013-1943",
"CVE-2017-7792",
"CVE-2010-0013",
"CVE-2016-5285",
"CVE-2012-5630",
"CVE-2016-5244",
"CVE-2015-0410",
"CVE-2011-2726",
"CVE-2003-0041",
"CVE-2001-0690",
"CVE-2020-27776",
"CVE-2011-2022",
"CVE-2014-7169",
"CVE-2014-2483",
"CVE-2019-14815",
"CVE-2013-4854",
"CVE-2000-0867",
"CVE-2011-2897",
"CVE-2013-2133",
"CVE-2011-4967",
"CVE-1999-0037",
"CVE-2020-25692",
"CVE-2013-0219",
"CVE-2007-5494",
"CVE-2020-27765",
"CVE-2013-1913",
"CVE-2016-5766",
"CVE-2011-3585",
"CVE-2008-2944",
"CVE-2013-2174",
"CVE-2017-5402",
"CVE-2001-0128",
"CVE-2015-0395",
"CVE-2017-5396",
"CVE-2009-2416",
"CVE-2013-1824",
"CVE-2015-2877",
"CVE-2019-19906",
"CVE-2001-0736",
"CVE-2015-0240",
"CVE-2015-3456",
"CVE-2017-5405",
"CVE-2000-0230",
"CVE-2017-7785",
"CVE-2011-1593",
"CVE-2009-1837",
"CVE-2019-10216",
"CVE-2000-1009",
"CVE-2016-9898",
"CVE-2001-0977",
"CVE-2019-14816",
"CVE-2014-3470",
"CVE-2021-3596",
"CVE-2017-5408",
"CVE-2015-0294",
"CVE-2012-3440",
"CVE-2000-0701",
"CVE-2014-3611",
"CVE-2017-5404",
"CVE-2012-0867",
"CVE-2016-9899",
"CVE-2013-4248",
"CVE-2013-4345",
"CVE-2020-12826",
"CVE-2012-0042",
"CVE-2007-6285",
"CVE-2011-3346",
"CVE-2001-0309",
"CVE-2001-0197",
"CVE-2009-3553",
"CVE-2013-2217",
"CVE-2016-9895",
"CVE-2020-25639",
"CVE-2012-6537",
"CVE-2012-3406",
"CVE-2012-0067",
"CVE-2015-0407",
"CVE-2001-0441",
"CVE-2000-0751",
"CVE-2014-3566",
"CVE-2017-7787",
"CVE-2017-7784",
"CVE-2000-0750",
"CVE-2013-4282",
"CVE-2013-1978",
"CVE-2020-27775",
"CVE-2000-0607",
"CVE-2014-0221",
"CVE-2016-6170",
"CVE-2014-4650",
"CVE-2012-6544",
"CVE-2000-0017",
"CVE-2016-2183",
"CVE-2016-9893",
"CVE-2011-3632",
"CVE-2017-5390",
"CVE-2014-3660",
"CVE-2011-1182",
"CVE-2017-7793",
"CVE-2017-5407",
"CVE-2015-0412",
"CVE-2018-19215",
"CVE-2021-20239",
"CVE-2008-0884",
"CVE-2020-25710",
"CVE-2011-2517",
"CVE-2020-14394",
"CVE-2017-5378",
"CVE-2014-0001",
"CVE-2017-15102",
"CVE-2001-0886",
"CVE-2013-4566",
"CVE-2013-7347",
"CVE-2017-7791",
"CVE-2014-6271",
"CVE-2019-3459",
"CVE-2008-0595",
"CVE-2015-5160",
"CVE-2012-4289",
"CVE-2012-2124",
"CVE-2016-9079",
"CVE-2007-5964",
"CVE-2019-3839",
"CVE-2013-1976",
"CVE-2019-3838",
"CVE-2012-0041",
"CVE-2014-3647",
"CVE-1999-0894",
"CVE-2000-1207",
"CVE-2014-8867",
"CVE-2010-2941",
"CVE-2013-2015",
"CVE-2020-27773",
"CVE-2000-0378",
"CVE-2012-4291",
"CVE-2010-0727",
"CVE-2001-0641",
"CVE-2010-3904",
"CVE-2015-0408",
"CVE-2013-2164",
"CVE-2016-5195",
"CVE-2008-1198",
"CVE-2015-8980",
"CVE-2020-27772",
"CVE-2014-3917",
"CVE-2013-4342",
"CVE-1999-0297",
"CVE-2002-1232",
"CVE-2002-0836",
"CVE-2015-8553",
"CVE-2015-6815",
"CVE-2000-0606",
"CVE-2013-1861",
"CVE-2000-1125",
"CVE-2012-4290",
"CVE-2000-0170",
"CVE-2011-1746",
"CVE-2014-0249",
"CVE-2014-6601",
"CVE-2018-14667",
"CVE-2008-1951",
"CVE-2002-0080",
"CVE-2011-2717",
"CVE-2000-0508",
"CVE-2016-4983",
"CVE-2014-3673",
"CVE-2012-4285",
"CVE-2012-5521",
"CVE-2016-7091",
"CVE-2014-3690",
"CVE-2015-1350",
"CVE-2020-27771",
"CVE-2019-11478",
"CVE-2017-7786",
"CVE-2012-6545",
"CVE-2011-1745",
"CVE-2008-1036",
"CVE-2012-0066"
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2001-0473",
"CVE-2008-4302",
"CVE-2013-4332",
"CVE-2012-6542",
"CVE-2011-1002",
"CVE-2017-5410",
"CVE-2012-0877",
"CVE-2019-14814",
"CVE-2001-1028",
"CVE-2012-1149",
"CVE-2007-6283",
"CVE-2010-4657",
"CVE-2018-19214",
"CVE-2015-0383",
"CVE-2011-2942",
"CVE-2014-0224",
"CVE-2001-0889",
"CVE-2020-27774",
"CVE-2000-0604",
"CVE-2012-3359",
"CVE-2016-9900",
"CVE-2011-3630",
"CVE-2013-4235",
"CVE-2012-1568",
"CVE-2012-2697",
"CVE-2017-5386",
"CVE-2010-0302",
"CVE-2011-3045",
"CVE-2015-1819",
"CVE-1999-0798",
"CVE-2013-3718",
"CVE-2008-3270",
"CVE-2020-27777",
"CVE-2005-4890",
"CVE-2012-2142",
"CVE-2011-3631",
"CVE-2015-0831",
"CVE-2002-0044",
"CVE-2013-4124",
"CVE-2012-5644",
"CVE-2017-5401",
"CVE-2017-5380",
"CVE-1999-1288",
"CVE-2019-11477",
"CVE-2007-3103",
"CVE-2020-27767",
"CVE-2017-5376",
"CVE-2001-1002",
"CVE-2014-3646",
"CVE-2002-0638",
"CVE-2001-0233",
"CVE-2012-6546",
"CVE-2017-5383",
"CVE-2000-1134",
"CVE-2017-1000111",
"CVE-2000-0844",
"CVE-2011-1145",
"CVE-2017-1000253",
"CVE-2013-1943",
"CVE-2017-7792",
"CVE-2010-0013",
"CVE-2016-5285",
"CVE-2012-5630",
"CVE-2016-5244",
"CVE-2015-0410",
"CVE-2011-2726",
"CVE-2003-0041",
"CVE-2001-0690",
"CVE-2020-27776",
"CVE-2011-2022",
"CVE-2014-7169",
"CVE-2014-2483",
"CVE-2019-14815",
"CVE-2013-4854",
"CVE-2000-0867",
"CVE-2011-2897",
"CVE-2013-2133",
"CVE-2011-4967",
"CVE-1999-0037",
"CVE-2020-25692",
"CVE-2013-0219",
"CVE-2007-5494",
"CVE-2020-27765",
"CVE-2013-1913",
"CVE-2016-5766",
"CVE-2011-3585",
"CVE-2008-2944",
"CVE-2013-2174",
"CVE-2017-5402",
"CVE-2001-0128",
"CVE-2015-0395",
"CVE-2017-5396",
"CVE-2009-2416",
"CVE-2013-1824",
"CVE-2015-2877",
"CVE-2019-19906",
"CVE-2001-0736",
"CVE-2015-0240",
"CVE-2015-3456",
"CVE-2017-5405",
"CVE-2000-0230",
"CVE-2017-7785",
"CVE-2011-1593",
"CVE-2009-1837",
"CVE-2019-10216",
"CVE-2000-1009",
"CVE-2016-9898",
"CVE-2001-0977",
"CVE-2019-14816",
"CVE-2014-3470",
"CVE-2021-3596",
"CVE-2017-5408",
"CVE-2015-0294",
"CVE-2012-3440",
"CVE-2000-0701",
"CVE-2014-3611",
"CVE-2017-5404",
"CVE-2012-0867",
"CVE-2016-9899",
"CVE-2013-4248",
"CVE-2013-4345",
"CVE-2020-12826",
"CVE-2012-0042",
"CVE-2007-6285",
"CVE-2011-3346",
"CVE-2001-0309",
"CVE-2001-0197",
"CVE-2009-3553",
"CVE-2013-2217",
"CVE-2016-9895",
"CVE-2020-25639",
"CVE-2012-6537",
"CVE-2012-3406",
"CVE-2012-0067",
"CVE-2015-0407",
"CVE-2001-0441",
"CVE-2000-0751",
"CVE-2014-3566",
"CVE-2017-7787",
"CVE-2017-7784",
"CVE-2000-0750",
"CVE-2013-4282",
"CVE-2013-1978",
"CVE-2020-27775",
"CVE-2000-0607",
"CVE-2014-0221",
"CVE-2016-6170",
"CVE-2014-4650",
"CVE-2012-6544",
"CVE-2000-0017",
"CVE-2016-2183",
"CVE-2016-9893",
"CVE-2011-3632",
"CVE-2017-5390",
"CVE-2014-3660",
"CVE-2011-1182",
"CVE-2017-7793",
"CVE-2017-5407",
"CVE-2015-0412",
"CVE-2018-19215",
"CVE-2021-20239",
"CVE-2008-0884",
"CVE-2020-25710",
"CVE-2011-2517",
"CVE-2020-14394",
"CVE-2017-5378",
"CVE-2014-0001",
"CVE-2017-15102",
"CVE-2001-0886",
"CVE-2013-4566",
"CVE-2013-7347",
"CVE-2017-7791",
"CVE-2014-6271",
"CVE-2019-3459",
"CVE-2008-0595",
"CVE-2015-5160",
"CVE-2012-4289",
"CVE-2012-2124",
"CVE-2016-9079",
"CVE-2007-5964",
"CVE-2019-3839",
"CVE-2013-1976",
"CVE-2019-3838",
"CVE-2012-0041",
"CVE-2014-3647",
"CVE-1999-0894",
"CVE-2000-1207",
"CVE-2014-8867",
"CVE-2010-2941",
"CVE-2013-2015",
"CVE-2020-27773",
"CVE-2000-0378",
"CVE-2012-4291",
"CVE-2010-0727",
"CVE-2001-0641",
"CVE-2010-3904",
"CVE-2015-0408",
"CVE-2013-2164",
"CVE-2016-5195",
"CVE-2008-1198",
"CVE-2015-8980",
"CVE-2020-27772",
"CVE-2014-3917",
"CVE-2013-4342",
"CVE-1999-0297",
"CVE-2002-1232",
"CVE-2002-0836",
"CVE-2015-8553",
"CVE-2015-6815",
"CVE-2000-0606",
"CVE-2013-1861",
"CVE-2000-1125",
"CVE-2012-4290",
"CVE-2000-0170",
"CVE-2011-1746",
"CVE-2014-0249",
"CVE-2014-6601",
"CVE-2018-14667",
"CVE-2008-1951",
"CVE-2002-0080",
"CVE-2011-2717",
"CVE-2000-0508",
"CVE-2016-4983",
"CVE-2014-3673",
"CVE-2012-4285",
"CVE-2012-5521",
"CVE-2016-7091",
"CVE-2014-3690",
"CVE-2015-1350",
"CVE-2020-27771",
"CVE-2019-11478",
"CVE-2017-7786",
"CVE-2012-6545",
"CVE-2011-1745",
"CVE-2008-1036",
"CVE-2012-0066"
]
},
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"1387",
"1386"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"1387",
"1386"
]
},
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"2310",
"1859",
"1386",
"1387"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"2310",
"1859",
"1386",
"1387"
]
},
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 20
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"Diffie-Hellman": 7
},
"DSA": {
"DSA": 13
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"NSS": {
"NSS": 96
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 9
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"Curve P-256": 2,
"K-283": 2,
"P-256": 14,
"P-384": 4,
"P-521": 12,
"c2pnb163v1": 1,
"c2pnb163v2": 1,
"c2pnb163v3": 1,
"c2pnb176w1": 1,
"c2pnb208w1": 1,
"c2pnb272w1": 1,
"c2pnb304w1": 1,
"c2pnb368w1": 1,
"c2tnb191v1": 1,
"c2tnb191v2": 1,
"c2tnb191v3": 1,
"c2tnb239v1": 1,
"c2tnb239v2": 1,
"c2tnb239v3": 1,
"prime192v2": 1,
"prime192v3": 1,
"prime239v1": 1,
"prime239v2": 1,
"prime239v3": 1,
"secp112r1": 1,
"secp112r2": 1,
"secp128r1": 1,
"secp128r2": 1,
"secp160k1": 1,
"secp160r1": 1,
"secp160r2": 1,
"secp192k1": 1,
"secp224k1": 1,
"secp256k1": 1,
"sect113r1": 1,
"sect113r2": 1,
"sect131r1": 1,
"sect131r2": 1,
"sect163r1": 1,
"sect193r1": 1,
"sect193r2": 1,
"sect239k1": 1
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 3,
"#11": 8,
"#16": 1,
"#5": 2
}
},
"fips_certlike": {
"Certlike": {
"AES 352": 1,
"DES 410": 1,
"DSA 172": 1,
"HMAC 152": 2,
"HMAC-SHA256": 2,
"HMAC-SHA348": 2,
"HMAC-SHA512": 2,
"PKCS #1": 6,
"PKCS #11": 14,
"PKCS #5": 4,
"RSA 152": 1,
"SHA-1": 8,
"SHA-256": 5,
"SHA-384": 4,
"SHA-386": 1,
"SHA-512": 5,
"SHS 426": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 5,
"Level 2": 6,
"level 1": 1,
"level 2": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"PBKDF": {
"PBKDF1": 1
},
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-256": 5,
"SHA-384": 4,
"SHA-512": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"SCA": {
"Timing Attacks": 2,
"Timing attack": 1,
"Timing attacks": 1,
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 14,
"FIPS 180-2": 1,
"FIPS 186-2": 7,
"FIPS 197": 1,
"FIPS 198": 1,
"FIPS 46-3": 1
},
"PKCS": {
"PKCS #1": 3,
"PKCS #11": 7,
"PKCS #5": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
},
"RC": {
"RC2": 1,
"RC4": 1
}
},
"DES": {
"3DES": {
"Triple-DES": 5
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"HMAC": 9
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/CreationDate": "D:20070719122604-07\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Security Policy",
"/ModDate": "D:20070813095356-04\u002700\u0027",
"/Producer": "StarOffice 7",
"/Title": "Security Policy - MozillaWiki",
"pdf_file_size_bytes": 292910,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 31
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "799263be1022596f4f9f4194046e7c6645aa64357735afecb906cd944a40e8d6",
"policy_txt_hash": "8ab988f2c418e31df952e1c5ed1be07929897044e1087db956e2261aa37e5613"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt815.pdf",
"date_sunset": null,
"description": "Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major crypto algorithms and Internet security standards, and supports smartcards and hardware crypto devices. NSS is available free of charge under the Mozilla Public License, the GNU General Public License, and the GNU Lesser General Public License. For more information, see http://www.mozilla.org/projects/security/pki/nss/",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": null,
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Network Security Services (NSS) Cryptographic Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "3.11.4",
"tested_conf": [
"64-bit Solaris 10",
"HP-UX B.11.11 with HP-UX Strong Random Number Generator (KRNG11i) bundle",
"Mac OS X 10.4 (single user mode)",
"Microsoft Windows XP SP 2",
"Red Hat Enterprise Linux 4 x86"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2007-08-08",
"lab": "Aspect",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2007-12-07",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "Red Hat\u00ae, Inc. and Sun Microsystems, Inc.",
"vendor_url": "http://mozilla.org/projects/security/pki/nss/fips"
}
}