cert_id |
3303 |
3584 |
dgst |
19b8db7132366437 |
9955f4a562efd60e |
heuristics/algorithms |
CVL#1616, Triple-DES#2617, CVL#1599, DRBG#1880, SHS#4110, ECDSA#1300, Triple-DES#2605, ECDSA#1311, AES#5045, DRBG#1866, CVL#1617, SHS#4124, AES#5538, RSA#2744, RSA#2731, AES#5059, CVL#1600, HMAC#3379, HMAC#3365 |
CVL#1616, Triple-DES#2617, CVL#1599, DRBG#1880, SHS#4110, ECDSA#1300, Triple-DES#2605, ECDSA#1311, AES#5045, DRBG#1866, CVL#1617, SHS#4124, AES#5538, RSA#2744, RSA#2731, AES#5059, CVL#1600, HMAC#3379, HMAC#3365 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #1311: 1
- #1616: 1
- #1617: 1
- #1880: 1
- #2617: 1
- #2744: 1
- #3: 1
- #3379: 1
- #4124: 1
- #5059: 1
|
- Cert:
- #1311: 1
- #1616: 1
- #1617: 1
- #1880: 1
- #2617: 1
- #2744: 1
- #3: 1
- #3379: 1
- #4124: 1
- #5059: 1
- #5538: 1
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- #1600 CVL: 1
- AES 128, 192: 1
- AES GCM 128: 1
- AES GCM 36: 1
- AES GCM IV36: 1
- AES6: 1
- CVL14: 1
- DRBG17: 1
- Diffie-Hellman 17: 1
- HMAC 160: 1
- HMAC 160, 224: 1
- HMAC-SHA1: 2
- HMAC21: 2
- RSA 1024: 1
- RSA 2048: 1
- RSA22: 1
- SHA- 256: 2
- SHA- 384: 1
- SHA-1: 8
- SHA-2: 2
- SHA-224: 6
- SHA-256: 4
- SHA-384: 5
- SHA-512: 5
- SHA-512 160: 1
- SHS25: 1
|
- Certlike:
- #1600 CVL: 1
- AES 128, 192: 1
- AES GCM 128: 1
- AES GCM 36: 1
- AES GCM IV36: 1
- AES6: 1
- CVL14: 1
- DRBG17: 1
- Diffie-Hellman 17: 1
- HMAC 160: 1
- HMAC 160, 224: 1
- HMAC-SHA1: 2
- HMAC21: 2
- RSA 1024: 1
- RSA 2048: 1
- RSA22: 1
- SHA- 256: 2
- SHA- 384: 1
- SHA-1: 8
- SHA-2: 2
- SHA-224: 6
- SHA-256: 4
- SHA-384: 5
- SHA-512: 5
- SHA-512 160: 1
- SHS25: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 6
- SHA-256: 4
- SHA-384: 5
- SHA-512: 6
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 6
- SHA-256: 4
- SHA-384: 5
- SHA-512: 6
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
- Generic:
- Crypto Library ...............................................................................................5: 1
- Crypto Library 2.1: 1
- OpenSSL:
|
- Generic:
- Crypto Library ...............................................................................................5: 1
- Crypto Library 2.1: 1
- OpenSSL:
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 13
- FIPS 186-4: 1
- FIPS PUB 140-2: 4
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 6
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-133: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 3
- SP 800-38D: 1
- SP 800-90: 3
- SP 800-90A: 2
|
- FIPS:
- FIPS 140-2: 14
- FIPS 186-4: 1
- FIPS PUB 140-2: 4
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 6
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-133: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 3
- SP 800-38D: 1
- SP 800-90: 3
- SP 800-90A: 2
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
The module generates cryptographic keys whose strengths are modified by the available entropy. No assurance of the minimum strength of generated keys. |
No assurance of the minimum strength of generated keys |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertOct2018.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPSConsolidatedDec2019.pdf |
web_data/date_sunset |
|
|
web_data/description |
The module consists of a cryptographic library based on the OpenSSL FIPS Canister (OpenSSL FIPS Object Module version 2.0.13). It is compiled into object form (fipscanister.o for Linux-based systems, fipscanister.lib on Windows-based systems) and then statically linked to an instance of the OpenSSL version 1.0.2k libcrypto library at build-time. The OpenSSL libcrypto library is then linked to the calling application (dynamically linked on Linux, statically linked on Windows), which is loaded into memory for execution by the operating system loader. |
The module consists of a cryptographic library based on the OpenSSL FIPS Canister (OpenSSL FIPS Object Module version 2.0.13). It is compiled into object form (fipscanister.o for Linux-based systems, fipscanister.lib on Windows-based systems) and then statically linked to an instance of the OpenSSL version 1.0.2k libcrypto library at build-time. The OpenSSL libcrypto library is then linked to the calling application (dynamically linked on Linux, statically linked on Windows), which is loaded into memory for execution by the operating system loader. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
Moved to historical list due to sunsetting |
Moved to historical list due to sunsetting |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
HPE SimpliVity OmniStack Crypto Library |
HPE SimpliVity OmniStack Crypto Library |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
2.1 |
2.1 |
web_data/tested_conf |
OmniCube CN-3400-12bcc appliance with an Intel Xeon E5-2600 V3 Series processor with VMware ESXi 6.0.0 hosting a virtual machine running Ubuntu 14.04.5 LTS, OmniCube CN-3400-12bcc appliance with an Intel Xeon E5-2600 V3 Series processor with VMware ESXi 6.0.0 hosting a virtual machine running Windows Server 2012 R2 |
OmniCube CN-3400-12bcc appliance with an Intel Xeon E5-2600 V3 Series processor with VMware ESXi 6.0.0 hosting a virtual machine running Ubuntu 14.04.5 LTS, OmniCube CN-3400-12bcc appliance with an Intel Xeon E5-2600 V3 Series processor with VMware ESXi 6.0.0 hosting a virtual machine running Windows Server 2012 R2 (single-user mode) |
web_data/validation_history |
- date: 17.10.2018
- lab: DEKRA Testing and Certification S.A.U
- validation_type: Initial
|
- date: 17.12.2019
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
web_data/vendor |
Hewlett Packard Enterprise Development LP |
Hewlett Packard Enterprise Development LP |
web_data/vendor_url |
http://www.hpe.com |
https://www.hpe.org |