cert_id |
4112 |
3158 |
dgst |
059f5e543bd484b0 |
625df624f8d7ccd7 |
heuristics/algorithms |
HMAC#A2047, DSA#A2047, AES#A2047, SHS#A2047, Triple-DES#A2047, ECDSA#A2047, RSA#A2047, DRBG#A2047 |
SHS#4196, DRBG#1978, HMAC#3448, AES#5206, DSA#1348, ECDSA#1349, RSA#2788, CVL#1712, Triple-DES#2640 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
2398 |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
2398 |
heuristics/module_prunned_references |
{} |
2398 |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES 128/ 192/256: 1
- AES 128/192/256: 1
- AES GCM3: 1
- AES, 256: 1
- AES-128: 3
- AES-128 128: 1
- AES-192: 2
- AES-256: 2
- AES-256 256: 1
- DRBG1: 1
- HMAC SHA-1: 1
- HMAC-SHA-1: 8
- PKCS#1: 2
- SHA- 256: 2
- SHA-1: 19
- SHA-1 128: 1
- SHA-1, 224: 18
- SHA-2: 3
- SHA-2 (224: 2
- SHA-224: 15
- SHA-256: 3
- SHA-384: 5
- SHA-512: 4
- SHA-512 256: 1
- SHA1: 2
- SHA2: 1
- SHA256: 2
|
- Certlike:
- AES 128/ 192/256: 1
- AES 128/192/256: 2
- AES, 256: 1
- DSA (1024: 2
- HMAC SHA1: 1
- HMAC- SHA-1: 1
- HMAC-SHA-1: 18
- HMAC-SHA1: 4
- PKCS#1: 2
- SHA- 1: 1
- SHA- 224: 1
- SHA- 256: 1
- SHA- 384: 2
- SHA- 512: 2
- SHA-1: 20
- SHA-1, 224: 3
- SHA-2: 1
- SHA-224: 5
- SHA-256: 9
- SHA-384: 8
- SHA-512: 7
- SHA1: 3
- SHA1, 224: 14
- SHA1,224: 1
- SHA2: 2
- SHA2 (224: 2
- SHA224: 13
- SHA256: 4
- SHA384: 1
- SHA512: 2
|
pdf_data/keywords/vendor |
|
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 19
- AES-128: 4
- AES-192: 3
- AES-256: 3
- DES:
- 3DES:
- TDEA: 1
- TDES: 1
- Triple-DES: 7
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 5
- SHA-224: 16
- SHA-256: 3
- SHA-384: 5
- SHA-512: 5
- SHA2: 1
- SHA256: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 5
- SHA-256: 9
- SHA-384: 8
- SHA-512: 7
- SHA2: 4
- SHA224: 13
- SHA256: 4
- SHA384: 1
- SHA512: 2
|
pdf_data/keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 2
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- B-163: 2
- B-233: 1
- B-283: 1
- B-409: 1
- B-571: 1
- K-233: 2
- K-283: 1
- K-409: 1
- K-571: 2
- P-192: 6
- P-224: 4
- P-256: 2
- P-384: 2
- P-521: 2
|
- NIST:
- B-163: 3
- B-283: 1
- B-571: 1
- K-233: 3
- K-409: 1
- P-192: 6
- P-224: 2
- P-256: 4
- P-521: 2
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 13
- FIPS 180-4: 2
- FIPS 186-2: 4
- FIPS 186-4: 8
- FIPS 197: 2
- FIPS 198: 1
- FIPS 198-1: 1
- NIST:
- NIST SP 800-38D: 1
- SP 800-131A: 1
- SP 800-133: 1
- SP 800-135: 1
- SP 800-38A: 2
- SP 800-38B: 2
- SP 800-38C: 2
- SP 800-38D: 2
- SP 800-38E: 1
- SP 800-56A: 2
- SP 800-56C: 1
- SP 800-67: 1
- SP 800-89: 1
- SP 800-90A: 4
- PKCS:
- RFC:
|
- FIPS:
- FIPS 140-2: 31
- FIPS 180-3: 1
- FIPS 180-4: 1
- FIPS 186-2: 8
- FIPS 186-4: 9
- FIPS 197: 2
- FIPS 198: 1
- FIPS 198-1: 1
- NIST:
- SP 800-131A: 2
- SP 800-38B: 2
- SP 800-38C: 2
- SP 800-38D: 2
- SP 800-38E: 1
- SP 800-56A: 4
- SP 800-67: 1
- SP 800-89: 1
- SP 800-90A: 5
- PKCS:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: chris brych
- /CreationDate: D:20211111200302-08'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20211111200302-08'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 505655
- pdf_hyperlinks: http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf, https://tools.ietf.org/html/rfc5246, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf, https://csrc.nist.gov/projects/cryptographic-module-validation-program, https://tools.ietf.org/html/rfc5288, http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf, http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, http://csrc.nist.gov/publications/nistpubs/800-89/SP-800-89_November2006.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf, http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Dave Herron
- /CreationDate: D:20200413193525-07'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20200413193525-07'00'
- /Producer: Microsoft® Word for Office 365
- /Subject: FIPS 140-2 Non-Proprietary Security Policy
- /Title: Gallagher OpenSSL Cryptographic Module
- pdf_file_size_bytes: 443449
- pdf_hyperlinks: http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf, http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf, http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf, http://www.openssl.org/source/openssl-fips-2.0.12.tar.gz, http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, http://csrc.nist.gov/publications/nistpubs/800-89/SP-800-89_November2006.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf, http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. No assurance of the minimum strength of generated keys. |
When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. This validation entry is a non-security relevant modification to Cert. #2398 |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2021_020122_0905_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140-2-ConsolidatedMarch2018.pdf |
web_data/date_sunset |
|
|
web_data/description |
Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products. |
Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 3, Mitigation of Other Attacks: N/A |
Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 3, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
Moved to historical list due to sunsetting |
Moved to historical list due to sunsetting |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Gallagher OpenSSL Cryptographic Module |
Gallagher OpenSSL Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
1.1 |
2.0.12 |
web_data/tested_conf |
Linux 4.9 on Gallagher Controller 6000 High Spec- PIV with ARM926EJ-S (ARMv5TEJ) (single-user mode) |
Linux 4.9 running on ARM926EJ-S (ARMv5TEJ) (gcc Compiler Version 7.2.0) (single-user mode) |
web_data/validation_history |
- date: 20.12.2021
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
- date: 25.03.2018
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
web_data/vendor |
Gallagher Group |
Gallagher Group |
web_data/vendor_url |
|
http://www.gallagher.com |