cert_id |
4509 |
4131 |
dgst |
55c5de31ec754ba4 |
aafee1a675603cc4 |
heuristics/algorithms |
ECDSA#A650, DRBG#A650, HMAC#A650, KTS#A650, CVL#A650, AES#A2017, AES#A650, KTS#A2017, RSA#A650, SHS#A2017, SHS#A650 |
ECDSA#A650, DRBG#A650, HMAC#A650, KTS#A650, CVL#A650, AES#A2017, AES#A650, AES#A653, RSA#A650, DSA#A650, Triple-DES#A650, SHS#A2017, SHS#A650 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
4214 |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
4214 |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
4214 |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
4214 |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-128: 1
- AES-192: 1
- AES-256: 2
- DSA5: 1
- HMAC 14: 2
- HMAC SHA-1: 2
- HMAC- SHA-512: 1
- HMAC-SHA-1: 2
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- PKCS#1: 3
- RSA PKCS#1: 1
- SHA 256: 2
- SHA- 384: 1
- SHA-1: 17
- SHA-2: 2
- SHA-224: 11
- SHA-256: 19
- SHA-384: 13
- SHA-512: 13
- SHA-512 1024: 2
- SHA-512 112: 1
- SHA-512 2048: 1
|
- Certlike:
- AES GCM 128: 1
- AES-128: 1
- AES-192: 1
- AES-256: 2
- HMAC 128: 2
- HMAC 192: 2
- HMAC SHA-1: 2
- HMAC- SHA-512: 1
- HMAC-SHA-1: 2
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- PKCS#1: 3
- RSA PKCS#1: 1
- SHA 256: 2
- SHA- 384: 1
- SHA-1: 20
- SHA-2: 2
- SHA-224: 16
- SHA-256: 26
- SHA-384: 13
- SHA-512: 12
- SHA-512 1024: 2
- SHA-512 112: 1
- SHA-512 2048: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 48
- AES-128: 1
- AES-192: 1
- AES-256: 2
- CAST:
- RC:
- DES:
- constructions:
- MAC:
- CMAC: 8
- HMAC: 21
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- miscellaneous:
- Blowfish:
- Camellia:
- IDEA:
- SEED:
|
- AES_competition:
- AES:
- AES: 53
- AES-128: 1
- AES-192: 1
- AES-256: 2
- CAST:
- RC:
- DES:
- 3DES:
- TDEA: 1
- TDES: 1
- Triple-DES: 29
- DES:
- constructions:
- MAC:
- CMAC: 10
- HMAC: 25
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- miscellaneous:
- Blowfish:
- Camellia:
- IDEA:
- SEED:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 11
- SHA-256: 19
- SHA-384: 13
- SHA-512: 17
- Whirpool:
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 16
- SHA-256: 26
- SHA-384: 13
- SHA-512: 17
- Whirpool:
|
pdf_data/keywords/crypto_scheme |
- KA:
- Key Agreement: 5
- Key agreement: 2
- KEX:
- MAC:
|
- KA:
- Key Agreement: 12
- Key agreement: 1
- KEX:
- MAC:
|
pdf_data/keywords/crypto_protocol |
|
- IKE:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 66
- TLS v1.0: 2
- TLSv1.2: 1
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-192: 5
- P-224: 7
- P-256: 10
- P-384: 8
- P-521: 8
- curve P-192: 1
- curve P-224: 1
|
- NIST:
- P-192: 7
- P-224: 13
- P-256: 18
- P-384: 14
- P-521: 14
- curve P-192: 1
- curve P-224: 1
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_CCM: 1
- TLS_DHE_RSA_WITH_AES_128_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CCM: 1
- TLS_DHE_RSA_WITH_AES_256_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_DH_DSS_WITH_AES_128_CBC_SHA: 1
- TLS_DH_DSS_WITH_AES_128_CBC_SHA256: 1
- TLS_DH_DSS_WITH_AES_128_GCM_SHA256: 1
- TLS_DH_DSS_WITH_AES_256_CBC_SHA: 1
- TLS_DH_DSS_WITH_AES_256_CBC_SHA256: 1
- TLS_DH_DSS_WITH_AES_256_GCM_SHA384: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_PSK_WITH_3DES_EDE_CBC_SHA: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_CCM: 1
- TLS_RSA_WITH_AES_128_CCM_8: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CCM: 1
- TLS_RSA_WITH_AES_256_CCM_8: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- Timing Attack: 1
- Timing Attacks: 1
- timing attacks: 1
|
- SCA:
- Timing Attack: 1
- Timing Attacks: 1
- timing attacks: 1
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 10
- FIPS 186-4: 1
- FIPS PUB 140-2: 2
- FIPS140-2: 1
- FIPS180-4: 2
- FIPS186-4: 11
- FIPS197: 2
- FIPS198-1: 2
- NIST:
- PKCS:
- RFC:
- RFC2246: 1
- RFC3268: 1
- RFC4279: 1
- RFC4346: 1
- RFC4492: 1
- RFC5116: 1
- RFC5246: 1
- RFC5288: 1
- RFC5487: 1
- RFC6655: 1
- RFC7251: 1
|
- FIPS:
- FIPS 140-2: 10
- FIPS 186-4: 2
- FIPS PUB 140-2: 2
- FIPS140-2: 1
- FIPS180-4: 2
- FIPS186-4: 17
- FIPS197: 2
- FIPS198-1: 2
- NIST:
- PKCS:
- RFC:
- RFC2246: 7
- RFC3268: 13
- RFC4253: 1
- RFC4279: 10
- RFC4346: 3
- RFC4492: 10
- RFC5116: 5
- RFC5246: 14
- RFC5288: 14
- RFC5289: 8
- RFC5487: 13
- RFC5489: 6
- RFC6655: 13
- RFC7251: 5
- RFC7296: 1
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Alejandro Fabio Masino
- /CreationDate: D:20220622220015+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20220622220015+00'00'
- pdf_file_size_bytes: 1081241
- pdf_hyperlinks: http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf, http://www.ietf.org/rfc/rfc3447.txt, https://tools.ietf.org/html/rfc6655.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf, https://www.ietf.org/rfc/rfc5116.txt, https://www.ietf.org/rfc/rfc4279.txt, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf, https://www.ietf.org/rfc/rfc4346.txt, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, https://tools.ietf.org/html/rfc5487.txt, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://tools.ietf.org/html/rfc7251.txt, http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf, https://www.ietf.org/rfc/rfc3268.txt, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf, http://csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, https://www.ietf.org/rfc/rfc2246.txt, https://www.ietf.org/rfc/rfc4492.txt, http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, https://tools.ietf.org/html/rfc5246.txt, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, https://tools.ietf.org/html/rfc5288.txt, http://man7.org/linux/man-pages/
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: Alejandro Fabio Masino
- /CreationDate: D:20211114182431+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20211114182431+00'00'
- pdf_file_size_bytes: 1201549
- pdf_hyperlinks: http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf, http://www.ietf.org/rfc/rfc3447.txt, https://tools.ietf.org/html/rfc6655.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf, https://www.ietf.org/rfc/rfc5116.txt, https://tools.ietf.org/html/rfc5489.txt, https://www.ietf.org/rfc/rfc4279.txt, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf, https://www.ietf.org/rfc/rfc4346.txt, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://tools.ietf.org/html/rfc5487.txt, https://tools.ietf.org/html/rfc7251.txt, http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf, https://www.ietf.org/rfc/rfc3268.txt, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf, http://csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, https://www.ietf.org/rfc/rfc2246.txt, https://www.ietf.org/rfc/rfc4492.txt, http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, https://tools.ietf.org/html/rfc5246.txt, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, https://tools.ietf.org/html/rfc5288.txt, http://man7.org/linux/man-pages/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/January 2022_010222_0702_signed.pdf |
web_data/date_sunset |
21.09.2026 |
|
web_data/description |
The Juniper OpenSSL Cryptographic Module is a set of software libraries implementing the Transport Layer Security (TLS) protocol v1.0, v1.1 and v1.2 and Datagram Transport Layer Security (DTLS) protocol v1.0 and v1.2, as well as general purpose cryptographic algorithms. |
The Juniper OpenSSL Cryptographic Module is a set of software libraries implementing the Transport Layer Security (TLS) protocol v1.0, v1.1 and v1.2 and Datagram Transport Layer Security (DTLS) protocol v1.0 and v1.2, as well as general purpose cryptographic algorithms. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A |
Physical Security: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
None |
SP 800-56Arev3 transition - replaced by certificate #4509 |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Juniper OpenSSL Cryptographic Module |
Juniper OpenSSL Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
active |
historical |
web_data/sw_versions |
1.0 |
1.0 |
web_data/tested_conf |
Junos OS Evolved version 19.4R2 running on Juniper Networks Packet Transport Router Model PTX10003-80C with Intel Xeon E5-2628Lv4 with PAA, Junos OS Evolved version 19.4R2 running on Juniper Networks Packet Transport Router Model PTX10003-80C with Intel Xeon E5-2628Lv4 without PAA(single-user mode) |
Junos OS Evolved version 19.4R2 running on Juniper Networks Packet Transport Router Model PTX10003-80C with Intel Xeon E5-2628Lv4 with PAA, Junos OS Evolved version 19.4R2 running on Juniper Networks Packet Transport Router Model PTX10003-80C with Intel Xeon E5-2628Lv4 without PAA(single-user mode) |
web_data/validation_history |
- date: 05.05.2023
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
- date: 13.01.2022
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
web_data/vendor |
Juniper Networks, Inc. |
Juniper Networks, Inc. |
web_data/vendor_url |
http://www.juniper.net/us/en |
http://www.juniper.net/us/en |