Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Gallagher OpenSSL Cryptographic Module
Gallagher OpenSSL Cryptographic Module
cert_id 4112 3158
dgst 059f5e543bd484b0 625df624f8d7ccd7
heuristics/algorithms HMAC#A2047, DSA#A2047, AES#A2047, SHS#A2047, Triple-DES#A2047, ECDSA#A2047, RSA#A2047, DRBG#A2047 SHS#4196, DRBG#1978, HMAC#3448, AES#5206, DSA#1348, ECDSA#1349, RSA#2788, CVL#1712, Triple-DES#2640
heuristics/module_processed_references/directly_referencing {} 2398
heuristics/module_processed_references/indirectly_referencing {} 2398
heuristics/module_prunned_references {} 2398
pdf_data/keywords/fips_security_level
  • Level:
    • Level 1: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES 128/ 192/256: 1
    • AES 128/192/256: 1
    • AES GCM3: 1
    • AES, 256: 1
    • AES-128: 3
    • AES-128 128: 1
    • AES-192: 2
    • AES-256: 2
    • AES-256 256: 1
    • DRBG1: 1
    • HMAC SHA-1: 1
    • HMAC-SHA-1: 8
    • PKCS#1: 2
    • SHA- 256: 2
    • SHA-1: 19
    • SHA-1 128: 1
    • SHA-1, 224: 18
    • SHA-2: 3
    • SHA-2 (224: 2
    • SHA-224: 15
    • SHA-256: 3
    • SHA-384: 5
    • SHA-512: 4
    • SHA-512 256: 1
    • SHA1: 2
    • SHA2: 1
    • SHA256: 2
  • Certlike:
    • AES 128/ 192/256: 1
    • AES 128/192/256: 2
    • AES, 256: 1
    • DSA (1024: 2
    • HMAC SHA1: 1
    • HMAC- SHA-1: 1
    • HMAC-SHA-1: 18
    • HMAC-SHA1: 4
    • PKCS#1: 2
    • SHA- 1: 1
    • SHA- 224: 1
    • SHA- 256: 1
    • SHA- 384: 2
    • SHA- 512: 2
    • SHA-1: 20
    • SHA-1, 224: 3
    • SHA-2: 1
    • SHA-224: 5
    • SHA-256: 9
    • SHA-384: 8
    • SHA-512: 7
    • SHA1: 3
    • SHA1, 224: 14
    • SHA1,224: 1
    • SHA2: 2
    • SHA2 (224: 2
    • SHA224: 13
    • SHA256: 4
    • SHA384: 1
    • SHA512: 2
pdf_data/keywords/vendor
  • Microsoft:
    • Microsoft: 1
    • Microsoft Corporation: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 19
      • AES-128: 4
      • AES-192: 3
      • AES-256: 3
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 1
      • Triple-DES: 7
  • constructions:
    • MAC:
      • CMAC: 15
      • HMAC: 6
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 9
  • constructions:
    • MAC:
      • CMAC: 15
      • HMAC: 8
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 15
  • FF:
    • DH:
      • DH: 6
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 16
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 9
    • DSA:
      • DSA: 18
pdf_data/keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 38
      • SHA1: 2
    • SHA2:
      • SHA-2: 5
      • SHA-224: 16
      • SHA-256: 3
      • SHA-384: 5
      • SHA-512: 5
      • SHA2: 1
      • SHA256: 2
  • SHA:
    • SHA1:
      • SHA-1: 23
      • SHA1: 18
    • SHA2:
      • SHA-2: 1
      • SHA-224: 5
      • SHA-256: 9
      • SHA-384: 8
      • SHA-512: 7
      • SHA2: 4
      • SHA224: 13
      • SHA256: 4
      • SHA384: 1
      • SHA512: 2
pdf_data/keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • KA:
    • Key Agreement: 2
    • Key agreement: 2
pdf_data/keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 18
  • PRNG:
    • DRBG: 20
  • RNG:
    • RNG: 2
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CFB:
    • CFB: 3
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 7
  • OFB:
    • OFB: 1
  • XTS:
    • XTS: 5
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CFB:
    • CFB: 3
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 5
  • OFB:
    • OFB: 1
  • XTS:
    • XTS: 4
pdf_data/keywords/ecc_curve
  • NIST:
    • B-163: 2
    • B-233: 1
    • B-283: 1
    • B-409: 1
    • B-571: 1
    • K-233: 2
    • K-283: 1
    • K-409: 1
    • K-571: 2
    • P-192: 6
    • P-224: 4
    • P-256: 2
    • P-384: 2
    • P-521: 2
  • NIST:
    • B-163: 3
    • B-283: 1
    • B-571: 1
    • K-233: 3
    • K-409: 1
    • P-192: 6
    • P-224: 2
    • P-256: 4
    • P-521: 2
pdf_data/keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 24
  • OpenSSL:
    • OpenSSL: 35
pdf_data/keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 13
    • FIPS 180-4: 2
    • FIPS 186-2: 4
    • FIPS 186-4: 8
    • FIPS 197: 2
    • FIPS 198: 1
    • FIPS 198-1: 1
  • NIST:
    • NIST SP 800-38D: 1
    • SP 800-131A: 1
    • SP 800-133: 1
    • SP 800-135: 1
    • SP 800-38A: 2
    • SP 800-38B: 2
    • SP 800-38C: 2
    • SP 800-38D: 2
    • SP 800-38E: 1
    • SP 800-56A: 2
    • SP 800-56C: 1
    • SP 800-67: 1
    • SP 800-89: 1
    • SP 800-90A: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5246: 1
    • RFC 5288: 1
  • FIPS:
    • FIPS 140-2: 31
    • FIPS 180-3: 1
    • FIPS 180-4: 1
    • FIPS 186-2: 8
    • FIPS 186-4: 9
    • FIPS 197: 2
    • FIPS 198: 1
    • FIPS 198-1: 1
  • NIST:
    • SP 800-131A: 2
    • SP 800-38B: 2
    • SP 800-38C: 2
    • SP 800-38D: 2
    • SP 800-38E: 1
    • SP 800-56A: 4
    • SP 800-67: 1
    • SP 800-89: 1
    • SP 800-90A: 5
  • PKCS:
    • PKCS#1: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode. No assurance of the minimum strength of generated keys. When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. This validation entry is a non-security relevant modification to Cert. #2398
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2021_020122_0905_signed.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140-2-ConsolidatedMarch2018.pdf
web_data/mentioned_certs
  • 2398: 1
web_data/sw_versions 1.1 2.0.12
web_data/tested_conf Linux 4.9 on Gallagher Controller 6000 High Spec- PIV with ARM926EJ-S (ARMv5TEJ) (single-user mode) Linux 4.9 running on ARM926EJ-S (ARMv5TEJ) (gcc Compiler Version 7.2.0) (single-user mode)
web_data/validation_history
  • date: 20.12.2021
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial
  • date: 25.03.2018
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial
web_data/vendor_url http://www.gallagher.com