cert_id |
3774 |
4508 |
dgst |
45d823d25b097fa8 |
647d52aad8925948 |
heuristics/algorithms |
AES#A58, RSA#A66, SHS#A62, KTS#A66, AES#A53, AES#A68, SHS#A65, CVL#A64, HMAC#A62, Triple-DES#A66, DRBG#A74, KTS#A60, HMAC#A73, AES#A70, AES#A71, AES#A54, DRBG#A53, HMAC#A74, HMAC#A66, KTS#A73, SHA-3#A56, RSA#A74, DRBG#A66, KTS#A62, AES#A57, AES#A72, DRBG#A73, SHS#A73, SHS#A74, RSA#A62, DRBG#A58, AES#A60, AES#A63, Triple-DES#A67, KTS#A74, DRBG#A62, AES#A59, AES#A66, AES#A61, SHS#A66, KTS#A68, AES#A69, Triple-DES#A57, KTS#A53, DRBG#A57, AES#A55, CVL#A52, HMAC#A56, KTS#A57, RSA#A73, DRBG#A60 |
AES#A58, RSA#A66, KTS#A66, SHS#A62, AES#A53, AES#A68, SHS#A65, Triple-DES#A66, HMAC#A62, DRBG#A74, KTS#A60, HMAC#A73, AES#A71, AES#A70, DRBG#A53, AES#A54, HMAC#A74, HMAC#A66, KTS#A73, SHA-3#A56, RSA#A74, DRBG#A66, KTS#A62, AES#A57, AES#A72, DRBG#A73, SHS#A73, SHS#A74, RSA#A62, DRBG#A58, AES#A60, AES#A63, Triple-DES#A67, KTS#A74, DRBG#A62, AES#A59, AES#A66, AES#A61, SHS#A66, KTS#A68, KTS#A53, Triple-DES#A57, AES#A69, HMAC#A56, AES#A55, DRBG#A57, KTS#A57, RSA#A73, DRBG#A60 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-128: 1
- AES-192: 1
- AES-256: 2
- HMAC SHA-1: 1
- HMAC-SHA- 384: 2
- HMAC-SHA-1: 2
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-512: 2
- PKCS#1: 2
- SHA-1: 9
- SHA-224: 6
- SHA-256: 11
- SHA-3: 2
- SHA-384: 7
- SHA-512: 7
- SHA-512 112: 1
- SHA-512 2048: 1
- SHA3-224: 3
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 3
- SHA3-512 112: 1
|
- Certlike:
- AES-128: 1
- AES-192: 1
- AES-256: 2
- HMAC SHA-1: 1
- HMAC- SHA2: 1
- HMAC-SHA-1: 4
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- PKCS#1: 2
- SHA-1: 9
- SHA-224: 5
- SHA-256: 10
- SHA-3: 2
- SHA-384: 7
- SHA-512: 7
- SHA-512 112: 1
- SHA-512 2048: 1
- SHA2: 1
- SHA3-224: 3
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 3
- SHA3-512 112: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 46
- AES-128: 1
- AES-192: 1
- AES-256: 2
- DES:
- 3DES:
- TDEA: 1
- TDES: 1
- Triple-DES: 17
- DES:
- constructions:
- MAC:
- CMAC: 7
- HMAC: 24
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 42
- AES-128: 1
- AES-192: 1
- AES-256: 2
- DES:
- 3DES:
- TDEA: 1
- TDES: 1
- Triple-DES: 17
- DES:
- constructions:
- MAC:
- CMAC: 7
- HMAC: 25
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 6
- SHA-256: 11
- SHA-384: 7
- SHA-512: 9
- SHA3:
- SHA-3: 2
- SHA3-224: 3
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 5
- SHA-256: 10
- SHA-384: 7
- SHA-512: 9
- SHA2: 1
- SHA3:
- SHA-3: 2
- SHA3-224: 3
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XEX:
- XTS:
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XEX:
- XTS:
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 40
- FIPS PUB 140-2: 1
- FIPS180-4: 2
- FIPS186-4: 2
- FIPS197: 3
- FIPS198-1: 3
- FIPS202: 1
- NIST:
- SP 800-57: 1
- SP 800-90A: 2
- PKCS:
- RFC:
|
- FIPS:
- FIPS 140-2: 40
- FIPS PUB 140-2: 1
- FIPS180-4: 2
- FIPS186-4: 2
- FIPS197: 3
- FIPS198-1: 3
- FIPS202: 1
- NIST:
- SP 800-38F: 1
- SP 800-57: 1
- SP 800-90A: 2
- PKCS:
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Traci Porter
- /CreationDate: D:20211123133224-06'00'
- /Creator: Writer
- /Keywords: FIPS 140-2
- /Producer: OpenOffice 4.1.10
- /Title: FIPS 140-2 Non-Proprietary Security Policy
- pdf_file_size_bytes: 371027
- pdf_hyperlinks: https://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://www.suse.com/, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, https://csrc.nist.gov/, https://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, https://csrc.nist.gov/groups/STM/cmvp/, https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, https://www.ietf.org/rfc/rfc3447.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, https://tools.ietf.org/html/rfc7296, https://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-67r1.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://tools.ietf.org/html/rfc4106, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /Author: Traci Porter
- /CreationDate: D:20230414152854-05'00'
- /Creator: Writer
- /Keywords: FIPS 140-2
- /Producer: LibreOffice 7.3
- /Title: FIPS 140-2 Non-Proprietary Security Policy
- pdf_file_size_bytes: 336183
- pdf_hyperlinks: https://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://www.suse.com/, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, https://csrc.nist.gov/, https://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, https://csrc.nist.gov/groups/STM/cmvp/, https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, https://www.ietf.org/rfc/rfc3447.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, https://tools.ietf.org/html/rfc7296, https://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-67r1.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://tools.ietf.org/html/rfc4106, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode and installed, initialized and configured as specified in section 10.1 of the Security Policy |
When operated in FIPS mode and installed, initialized and configured as specified in section 10.1 of the Security Policy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2020_040121_1006_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf |
web_data/date_sunset |
|
17.12.2025 |
web_data/description |
SUSE Linux Enterprise Server Kernel Crypto API Module provides cryptographic services to the Linux operating system kernel. |
SUSE Linux Enterprise Server Kernel Crypto API Module provides cryptographic services to the Linux operating system kernel. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition - replaced by certificate #4508 |
|
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
SUSE Linux Enterprise Server Kernel Crypto API Cryptographic Module |
SUSE Linux Enterprise Server Kernel Crypto API Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
active |
web_data/sw_versions |
3.0 |
3.0 |
web_data/tested_conf |
SUSE Linux Enterprise Server 15 SP0 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 with PAA, SUSE Linux Enterprise Server 15 SP0 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 without PAA (single-user mode) |
SUSE Linux Enterprise Server 15 SP0 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 with PAA, SUSE Linux Enterprise Server 15 SP0 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 without PAA (single-user mode) |
web_data/validation_history |
- date: 18.12.2020
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
- date: 05.05.2023
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
web_data/vendor |
SUSE, LLC |
SUSE, LLC |
web_data/vendor_url |
http://www.suse.com |
http://www.suse.com |