cert_id |
4070 |
4725 |
dgst |
634bce1b71598aee |
6879547fb139e734 |
heuristics/algorithms |
AES#A787, KTS#A780, ECDSA#A782, AES#A788, AES#A789, DSA#A781, SHS#A780, KTS#A793, AES#A795, KTS#A779, KTS#A782, AES#A784, ECDSA#A781, CVL#A779, KAS#A807, CVL#A780, DRBG#A792, KAS-SSC#A781, SHS#A781, AES#A791, DRBG#A795, KAS#A781, KAS-SSC#A807, AES#A792, CVL#A781, DSA#A780, HMAC#A780, RSA#A782, SHS#A779, ECDSA#A779, HMAC#A782, RSA#A779, AES#A794, HMAC#A781, AES#A790, DSA#A779, AES#A785, AES#A783, ECDSA#A780, DRBG#A797, RSA#A780, KAS#A779, SHS#A782, KAS#A780, HMAC#A779, KTS#A781, KAS-SSC#A779, KAS-SSC#A780, CVL#A782, KAS-SSC#A782, KAS#A782, DSA#A782, DRBG#A786, RSA#A781, Triple-DES#A793, AES#A786 |
AES-CTRA3167, HMAC-SHA3-512A3175, HMAC-SHA2-256A3210, AES-KWPA3167, SHA3-224A3175, AES-GCMA3206, AES-XTS Testing Revision 2.0A3167, PBKDFA3210, HMAC-SHA2-384A3210, Counter DRBGA3167, SHA2-384A3210, SHAKE-128A3175, HMAC-SHA2-512A3210, ECDSA KeyGen (FIPS186-4)A3210, KDF SSHA3172, SHA3-384A3175, SHA2-256A3210, ECDSA KeyVer (FIPS186-4)A3210, HMAC-SHA3-384A3175, KAS-FFC-SSC Sp800-56Ar3A3211, AES-CFB128A3167, HMAC-SHA2-224A3210, AES-CFB8A3167, KDF TLSA3210, ECDSA SigVer (FIPS186-4)A3210, SHA3-512A3175, AES-CFB1A3167, RSA SigGen (FIPS186-4)A3210, AES-CMACA3167, Safe Primes Key VerificationA3211, AES-KWA3167, AES-CCMA3167, SHA-1A3210, SHA2-224A3210, AES-OFBA3167, RSA SigVer (FIPS186-4)A3210, SHA2-512A3210, SHAKE-256A3175, HMAC-SHA3-224A3175, KAS-ECC-SSC Sp800-56Ar3A3210, TLS v1.2 KDF RFC7627A3210, HMAC-SHA3-256A3175, KDA HKDF Sp800-56Cr1A3168, RSA KeyGen (FIPS186-4)A3210, HMAC-SHA-1A3210, Safe Primes Key GenerationA3211, AES-ECBA3172, SHA3-256A3175, ECDSA SigGen (FIPS186-4)A3210, AES-CBCA3167 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
4822 |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
4822 |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
4822 |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
4822 |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES GCM 128: 1
- AES-128: 1
- AES-192: 1
- AES-256: 2
- HMAC 128: 2
- HMAC 192: 2
- HMAC SHA-1: 2
- HMAC-SHA-1: 4
- HMAC-SHA-224: 4
- HMAC-SHA-256: 6
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
- PKCS#1: 4
- RSA PKCS#1: 2
- SHA- 256: 2
- SHA- 384: 1
- SHA-1: 14
- SHA-224: 19
- SHA-256: 30
- SHA-3: 1
- SHA-384: 21
- SHA-512: 14
- SHA-512 1024: 3
- SHA-512 112: 1
- SHA-512 2048: 3
- SHA1: 2
- SHA224: 2
- SHS4: 1
|
- Certlike:
- AES 128, 192: 2
- AES GCM 128: 1
- AES key 128, 192: 1
- AES- 192: 1
- AES- 256: 1
- AES-128: 1
- AES-256: 1
- HMAC 112: 4
- HMAC 128: 2
- HMAC SHA-1: 1
- HMAC-SHA-1: 4
- PKCS#1: 4
- SHA- 1: 1
- SHA-1: 12
- SHA-3: 4
- SHA2- 224: 1
- SHA2- 256: 4
- SHA2- 384: 8
- SHA2-224: 11
- SHA2-256: 22
- SHA2-384: 6
- SHA2-512: 7
- SHA2-512 1024: 3
- SHA2-512 128: 1
- SHA2-512 2048: 3
- SHA3- 256: 4
- SHA3-224: 3
- SHA3-256: 2
- SHA3-384: 5
- SHA3-512: 6
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 57
- AES-: 1
- AES-128: 1
- AES-192: 1
- AES-256: 2
- CAST:
- RC:
- DES:
- 3DES:
- TDEA: 1
- TDES: 1
- Triple-DES: 37
- DES:
- constructions:
- MAC:
- CMAC: 11
- HMAC: 28
- HMAC-SHA-224: 2
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- miscellaneous:
|
- AES_competition:
- AES:
- AES: 57
- AES-: 11
- AES-128: 1
- AES-256: 1
- CAST:
- RC:
- DES:
- constructions:
- djb:
- miscellaneous:
- ARIA:
- Blowfish:
- Camellia:
- SEED:
- SM4:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 19
- SHA-256: 30
- SHA-384: 21
- SHA-512: 21
- SHA224: 2
- SHA3:
|
- BLAKE:
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA3:
- SHA-3: 4
- SHA3-224: 5
- SHA3-256: 2
- SHA3-384: 5
- SHA3-512: 6
|
pdf_data/keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 4
- KEX:
- MAC:
|
pdf_data/keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- DTLS:
- TLS:
- TLS: 67
- TLS v1.0: 2
- TLS v1.3: 1
- TLSv1.2: 1
|
- IKE:
- SSH:
- TLS:
- TLS:
- TLS: 57
- TLS v1.0: 1
- TLS v1.3: 1
- TLSv1.0: 2
- TLSv1.2: 2
- TLSv1.3: 1
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- OFB:
- XEX:
- XTS:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-192: 6
- P-224: 8
- P-256: 12
- P-384: 8
- P-521: 8
|
- NIST:
- P-192: 10
- P-224: 12
- P-256: 16
- P-384: 12
- P-521: 8
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_CCM: 1
- TLS_DHE_RSA_WITH_AES_128_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CCM: 1
- TLS_DHE_RSA_WITH_AES_256_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_PSK_WITH_3DES_EDE_CBC_SHA: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_CCM: 1
- TLS_RSA_WITH_AES_128_CCM_8: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CCM: 1
- TLS_RSA_WITH_AES_256_CCM_8: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_CCM: 1
- TLS_DHE_RSA_WITH_AES_128_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CCM: 1
- TLS_DHE_RSA_WITH_AES_256_CCM_8: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DH_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_PSK_WITH_AES_128_CBC_SHA: 1
- TLS_PSK_WITH_AES_256_CBC_SHA: 1
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- Timing Attacks: 2
- timing attacks: 1
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 50
- FIPS 186-4: 2
- FIPS PUB 140-2: 1
- FIPS180-4: 2
- FIPS186-4: 6
- FIPS197: 2
- FIPS198-1: 2
- FIPS202: 1
- NIST:
- PKCS:
- RFC:
- RFC2246: 4
- RFC3268: 7
- RFC3526: 5
- RFC4253: 1
- RFC4279: 4
- RFC4346: 1
- RFC4492: 7
- RFC5116: 1
- RFC5246: 8
- RFC5288: 8
- RFC5289: 8
- RFC5487: 1
- RFC5489: 1
- RFC6655: 9
- RFC7251: 1
- RFC7296: 2
- RFC7919: 4
|
- FIPS:
- FIPS 140-3: 66
- FIPS 186-4: 4
- FIPS PUB 140-3: 1
- FIPS140-3: 1
- FIPS180-4: 2
- FIPS186-4: 6
- FIPS197: 3
- FIPS198-1: 3
- FIPS202: 2
- ISO:
- PKCS:
- RFC:
- RFC3268: 4
- RFC3394: 1
- RFC3526: 3
- RFC4279: 2
- RFC4492: 8
- RFC5246: 4
- RFC5288: 5
- RFC5289: 16
- RFC5649: 1
- RFC6655: 4
- RFC7627: 1
- RFC7919: 3
- RFC8446: 4
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Traci Porter
- /CreationDate: D:20210903092740-05'00'
- /Creator: Writer
- /Keywords: FIPS 140-2
- /Producer: OpenOffice 4.1.10
- /Title: FIPS 140-2 Non-Proprietary Security Policy
- pdf_file_size_bytes: 446396
- pdf_hyperlinks: https://www.ietf.org/rfc/rfc3268.txt%20, https://www.ietf.org/rfc/rfc2246.txt, https://www.ietf.org/rfc/rfc4346.txt%20, https://tools.ietf.org/html/rfc5246.txt%20, https://tools.ietf.org/html/rfc5288.txt, https://tools.ietf.org/html/rfc7251.txt, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-67r1.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, https://www.ietf.org/rfc/rfc4492.txt%20, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, https://www.ietf.org/rfc/rfc4279.txt%20, https://www.ietf.org/rfc/rfc5116.txt%20, https://tools.ietf.org/html/rfc7296, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, https://tools.ietf.org/html/rfc7919, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, http://www.ietf.org/rfc/rfc3447.txt, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, https://tools.ietf.org/html/rfc6655.txt, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://tools.ietf.org/html/rfc5487.txt, https://tools.ietf.org/html/rfc3526, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, http://csrc.nist.gov/, https://tools.ietf.org/html/rfc5489.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /CreationDate: D:20240628205446Z00'00'
- /ModDate: D:20240628205446Z00'00'
- /Producer: macOS Version 13.6.7 (Build 22G720) Quartz PDFContext
- pdf_file_size_bytes: 1211429
- pdf_hyperlinks: https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35795, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38G.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35782, https://documentation.suse.com/sled/15-SP4/html/SLED-all/book-security.html, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35764, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35796, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35793, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35765, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35768, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35755, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf, https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35810, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35812, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35760, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35780, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35789, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35813, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90B.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35770, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35786, https://documentation.suse.com/sle-rt/15-SP4, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35788, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35807, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35779, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35787, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35783, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35811, https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations/certificate/28, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35762, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35808, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38B.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35790, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35759, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35750, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35803, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35820, https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations/certificate/29, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35756, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35784, https://documentation.suse.com/smart/linux/html/concept-bci/index.html, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140B.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35773, https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations/certificate/22, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35817, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35804, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35816, https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations/certificate/30, https://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35800, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35769, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35806, https://www.ietf.org/rfc/rfc5649.txt, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35758, https://www.ietf.org/rfc/rfc3447.txt, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35749, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35757, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35771, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35753, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35761, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35809, https://documentation.suse.com/sles/15-SP4/html/SLES-all/book-security.html, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35805, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35777, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35776, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35775, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35792, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35752, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35751, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35746, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35798, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35766, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35815, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35814, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35767, https://documentation.suse.com/sle-micro/5.3/single-html/SLE-Micro-security/#sec-fips-slemicro-install, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35785, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35781, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35778, https://www.ietf.org/rfc/rfc3394.txt, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35763, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35754, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35794, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35772, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35748, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35797, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35791, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35747, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35821
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode and installed, initialized and configured as specified in Section 9.1 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. |
Interim validation. When operated in the approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/November 2021_011221_0923_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/July 2024_010824_1146.pdf |
web_data/date_sunset |
21.09.2026 |
11.07.2026 |
web_data/description |
OpenSSL is an open-source library of various cryptographic algorithms written mainly in C. |
OpenSSL is an open-source library of various cryptographic algorithms written mainly in C. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A, , , |
Physical security: N/A, Non-invasive security: N/A, Documentation requirements: N/A, Cryptographic module security policy: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
None |
None |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
SUSE Linux Enterprise OpenSSL Cryptographic Module |
SUSE Linux Enterprise OpenSSL Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-3 |
web_data/status |
active |
active |
web_data/sw_versions |
3.1 |
4.2 |
web_data/tested_conf |
SUSE Linux Enterprise Server 12 SP5 running on FUJITSU Server PRIMERGY RX4770 M5 with Intel Cascade Lake Xeon Platinum 8268 with PAA, SUSE Linux Enterprise Server 12 SP5 running on FUJITSU Server PRIMERGY RX4770 M5 with Intel Cascade Lake Xeon Platinum 8268 without PAA, SUSE Linux Enterprise Server 12 SP5 running on IBM z13 with z13 with PAI, SUSE Linux Enterprise Server 12 SP5 running on IBM z13 with z13 without PAI (single-user mode), , , , , , |
SUSE Linux Enterprise Server 15 SP4 on PowerVM (VIOS 3.1.4.00) running on IBM Power E1080 (9080-HEX) with Power10 with PAA, SUSE Linux Enterprise Server 15 SP4 on PowerVM (VIOS 3.1.4.00) running on IBM Power E1080 (9080-HEX) with Power10 without PAA, SUSE Linux Enterprise Server 15 SP4 running on GIGABYTE G242-P32-QZ with ARM Ampere(R) Altra(R) Q80-30 with PAA, SUSE Linux Enterprise Server 15 SP4 running on GIGABYTE G242-P32-QZ with ARM Ampere(R) Altra(R) Q80-30 without PAA, SUSE Linux Enterprise Server 15 SP4 running on GIGABYTE R181-Z90-00 with AMD EPYC(TM) 7371 with PAA, SUSE Linux Enterprise Server 15 SP4 running on GIGABYTE R181-Z90-00 with AMD EPYC(TM) 7371 without PAA, SUSE Linux Enterprise Server 15 SP4 running on IBM z/15 with z15 with PAI, SUSE Linux Enterprise Server 15 SP4 running on IBM z/15 with z15 without PAI, SUSE Linux Enterprise Server 15 SP4 running on Supermicro Super Server SYS-6019P-WTR with Intel(R) Xeon(R) Silver 4215R with PAA, SUSE Linux Enterprise Server 15 SP4 running on Supermicro Super Server SYS-6019P-WTR with Intel(R) Xeon(R) Silver 4215R without PAA |
web_data/validation_history |
- date: 15.11.2021
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
- date: 12.07.2024
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
web_data/vendor |
SUSE, LLC |
SUSE, LLC |
web_data/vendor_url |
http://www.suse.com |
http://www.suse.com |