{"_type": "sec_certs.sample.fips.FIPSCertificate", "dgst": "e560f3c5ee3df5df", "cert_id": 4967, "web_data": {"_type": "sec_certs.sample.fips.FIPSCertificate.WebData", "module_name": "Dell BSAFE\u2122 Crypto Module for C", "validation_history": [{"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry", "date": "2025-02-19", "validation_type": "Initial", "lab": "Leidos Accredited Testing & Evaluation (AT&E) Lab"}], "vendor_url": "http://www.dell.com ", "vendor": "Dell Australia Pty Limited, BSAFE Product Team", "certificate_pdf_url": null, "module_type": "Software", "standard": "FIPS 140-3", "status": "active", "level": 1, "caveat": "Interim validation. When operated in approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy", "exceptions": ["Physical security: N/A", "Non-invasive security: N/A"], "embodiment": "Multi-Chip Stand Alone", "description": "Dell BSAFE\u2122 Crypto Module for C software library is designed for developers to incorporate FIPS 140-3 approved cryptography into C-based products. BSAFE\u2122 Crypto Module security software helps protect sensitive data as it is stored, using strong encryption techniques that ease integration with existing data models. Using the capabilities of BSAFE\u2122 Crypto Module software in applications helps provide a persistent level of protection for data, lessening the risk of internal, as well as external, compromise.", "tested_conf": ["Dell PowerMaxOS 10 running on a PowerMax storage array compute node with an Intel Xeon Gold 5218 with PAA", "Dell PowerMaxOS 10 running on a PowerMax storage array compute node with an Intel Xeon Gold 5218 without PAA", "Dell PowerMaxOS 10 running on a PowerMax storage array compute node with an Intel Xeon Gold 6240L with PAA", "Dell PowerMaxOS 10 running on a PowerMax storage array compute node with an Intel Xeon Gold 6240L without PAA", "Dell PowerMaxOS 10 running on a PowerMax storage array compute node with an Intel Xeon Gold 6254 with PAA", "Dell PowerMaxOS 10 running on a PowerMax storage array compute node with an Intel Xeon Gold 6254 without PAA", "Dell PowerMaxOS 10 running on a PowerMax storage array compute node with an Intel Xeon Platinum 8280L with PAA", "Dell PowerMaxOS 10 running on a PowerMax storage array compute node with an Intel Xeon Platinum 8280L without PAA", "Microsoft Windows 10 Enterprise x86_64 (64-bit) (VS2017) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 with PAA", "Microsoft Windows 10 Enterprise x86_64 (64-bit) (VS2017) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 without PAA", "Microsoft Windows 10 Enterprise x86_64 (64-bit) (VS2019) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 with PAA", "Microsoft Windows 10 Enterprise x86_64 (64-bit) (VS2019) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 without PAA", "Microsoft Windows 11 on VMware ESXi 7.0.2 running on a Dell PowerEdge R630 with an Intel Xeon E5-2620 v4 with PAA", "Microsoft Windows 11 on VMware ESXi 7.0.2 running on a Dell PowerEdge R630 with an Intel Xeon E5-2620 v4 without PAA", "Microsoft Windows Server 2019 x86_64 (64-bit) (VS2017) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6246 with PAA", "Microsoft Windows Server 2019 x86_64 (64-bit) (VS2017) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6246 without PAA", "Microsoft Windows Server 2019 x86_64 (64-bit) (VS2017) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with an AMD EPYC 7451 with PAA", "Microsoft Windows Server 2019 x86_64 (64-bit) (VS2017) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with an AMD EPYC 7451 without PAA", "Microsoft Windows Server 2019 x86_64 (64-bit) (VS2019) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6246 with PAA", "Microsoft Windows Server 2019 x86_64 (64-bit) (VS2019) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6246 without PAA", "Microsoft Windows Server 2019 x86_64 (64-bit) (VS2019) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with an AMD EPYC 7451 with PAA", "Microsoft Windows Server 2019 x86_64 (64-bit) (VS2019) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with an AMD EPYC 7451 without PAA", "Red Hat Enterprise Linux 7.9 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 with PAA", "Red Hat Enterprise Linux 7.9 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 without PAA", "Red Hat Enterprise Linux 7.9 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 with PAA", "Red Hat Enterprise Linux 7.9 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 without PAA", "Red Hat Enterprise Linux 8.5 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 with PAA", "Red Hat Enterprise Linux 8.5 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 without PAA", "Red Hat Enterprise Linux 8.5 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 with PAA", "Red Hat Enterprise Linux 8.5 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 without PAA", "SUSE Linux Enterprise Server 12 SP5 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 with PAA", "SUSE Linux Enterprise Server 12 SP5 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 without PAA", "SUSE Linux Enterprise Server 12 SP5 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 with PAA", "SUSE Linux Enterprise Server 12 SP5 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6136 without PAA", "SUSE Linux Enterprise Server 15 SP3 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6246 with PAA", "SUSE Linux Enterprise Server 15 SP3 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6246 without PAA", "SUSE Linux Enterprise Server 15 SP3 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6246 with PAA", "SUSE Linux Enterprise Server 15 SP3 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with an Intel Xeon Gold 6246 without PAA", "SUSE Linux Enterprise Server 15 SP3 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with an AMD EPYC 7451 with PAA", "SUSE Linux Enterprise Server 15 SP3 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with an AMD EPYC 7451 without PAA"], "hw_versions": null, "fw_versions": null, "sw_versions": "3.0.1", "mentioned_certs": {}, "historical_reason": null, "date_sunset": "2027-02-18", "revoked_reason": null, "revoked_link": null}, "pdf_data": {"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData", "keywords": {"fips_cert_id": {"Cert": {"#1": 7}}, "fips_security_level": {"Level": {"Level 1": 10}}, "fips_certlike": {"Certlike": {"HMAC13": 2, "SHA2-224": 16, "SHA2-256": 24, "SHA2-384": 19, "SHA2-512": 18, "SHA-1": 19, "SHA3-224": 10, "SHA3-256": 10, "SHA3-384": 9, "SHA3-512": 6, "SHA3-512 128": 4, "SHA3-22410": 2, "SHA3-25610": 2, "SHA3-38410": 2, "SHA3-51210": 2, "SHA2-512 128": 2, "SHA1": 1, "SHA2-512 256": 2, "SHA3": 6, "SHA-1 112": 1, "SHA2": 2, "SHA-2": 3, "SHA-3": 1, "RSA-PKCS #1": 2, "RSA PKCS #1": 4, "PKCS #1": 6, "AES-CTR 128": 1, "AES (128": 1, "AES-128 128": 1, "AES-192 192": 1, "AES-2561": 1, "AES-256": 4, "AES-128": 1, "AES-192": 1, "AES-128 3072": 1, "AES-192 7680": 1, "AES 128, 192": 1, "DRBG12": 1, "DES31": 1, "DES3": 4}}, "vendor": {"Microsoft": {"Microsoft": 15}}, "eval_facility": {}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 50, "AES-128": 3, "AES-192": 3, "AES-256": 4}, "CAST": {"CAST": 6}}, "DES": {"DES": {"DES": 5}, "3DES": {"3DES": 1, "Triple-DES": 2, "TDEA": 1}}, "constructions": {"MAC": {"HMAC": 36, "CMAC": 6, "CBC-MAC": 1}}}, "asymmetric_crypto": {"ECC": {"ECDH": {"ECDH": 5}, "ECDSA": {"ECDSA": 10}, "ECC": {"ECC": 16}}, "FF": {"DH": {"Diffie-Hellman": 9, "DH": 18}, "DSA": {"DSA": 37}}}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA1": {"SHA-1": 20, "SHA1": 1}, "SHA2": {"SHA2": 2, "SHA-2": 3}, "SHA3": {"SHA3-224": 10, "SHA3-256": 10, "SHA3-384": 10, "SHA3-512": 11, "SHA3": 6, "SHA-3": 1}}, "MD": {"MD4": {"MD4": 1}, "MD5": {"MD5": 3}}, "PBKDF": {"PBKDF2": 9}}, "crypto_scheme": {"MAC": {"MAC": 33}, "KA": {"Key Agreement": 3, "Key agreement": 1}}, "crypto_protocol": {"SSH": {"SSH": 5}, "TLS": {"TLS": {"TLS": 11, "TLS v1.2": 8, "TLS v1.3": 5, "TLSv1.2": 2}}}, "randomness": {"PRNG": {"PRNG": 1, "DRBG": 75}, "RNG": {"RNG": 2}}, "cipher_mode": {"ECB": {"ECB": 5}, "CBC": {"CBC": 6}, "CTR": {"CTR": 16}, "CFB": {"CFB": 8}, "OFB": {"OFB": 5}, "GCM": {"GCM": 6}, "CCM": {"CCM": 2}, "XTS": {"XTS": 5}}, "ecc_curve": {"NIST": {"P-224": 14, "P-256": 10, "P-384": 10, "P-521": 10, "P-192": 2, "K-233": 6, "K-283": 5, "K-409": 5, "K-571": 5, "B-233": 5, "B-283": 5, "B-409": 5, "B-571": 5, "B-163": 1, "K-163": 1}}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"SCA": {"timing attacks": 2, "Timing Attacks": 1}}, "device_model": {}, "tee_name": {"AMD": {"PSP": 6}}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS 140-3": 28, "FIPS 186-4": 12, "FIPS 186-2": 2, "FIPS 180-4": 1, "FIPS 202": 1, "FIPS 198-1": 2}, "NIST": {"SP 800-38A": 1, "SP 800-38C": 1, "SP 800-38D": 2, "SP 800-38E": 1, "SP 800-38F": 1, "SP 800-56B": 4, "SP 800-56A": 10, "SP 800-132": 3, "SP 800-108": 1, "SP 800-135": 6, "SP 800-90A": 4, "SP 800-38B": 1, "SP 800-56C": 3, "SP 800-133": 8, "SP 800-90B": 10, "SP 800-131A": 1, "SP 800-57": 7, "SP 800-107": 1, "SP 800-52": 1}, "PKCS": {"PKCS #1": 5}, "RFC": {"RFC 7627": 1, "RFC 5246": 2, "RFC 8446": 1, "RFC 5288": 2, "RFC 2246": 1}, "ISO": {"ISO/IEC 24759": 2}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"OutOfScope": {"out of scope": 1, "variables containing SSP data on the stack or heap should be zeroized after use or before going out of scope. 11.2.2 Random Number Generation Operations Using the CTR DRBG with AES-256 is recommended as it is": 1}}}, "policy_metadata": {"pdf_file_size_bytes": 464808, "pdf_is_encrypted": false, "pdf_number_of_pages": 53, "/Author": "Dell Australia Pty Limited", "/CreationDate": "D:20100527131853Z", "/Creator": "FrameMaker 17.0.5", "/Keywords": "BSAFE Crypto Module for C, BSAFE, fips, security policy, level 1", "/ModDate": "D:20250213070646+10'00'", "/Producer": "Adobe PDF Library 17.0", "/Title": "Dell BSAFE\u2122 Crypto Module for C 3.0.1 Security Policy", "/Trapped": "/False", "pdf_hyperlinks": {"_type": "Set", "elements": ["http://csrc.nist.gov/index.html", "https://www.rambus.com/timing-attacks-on-implementations-of-diffie-hellman-rsa-dss-and-other-systems/", "http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf", "https://link.springer.com/content/pdf/10.1007/s001450010016.pdf", "https://www.dell.com/support", "https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search/all", "http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf", "https://ink.library.smu.edu.sg/sis_research/3723/", "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf", "https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final"]}}}, "heuristics": {"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics", "algorithms": {"_type": "Set", "elements": ["HMAC-SHA2-224A2308", "ECDSA SigVer (FIPS186-4)A2308", "HMAC-SHA3-512A2308", "DSA PQGVer (FIPS186-4)A2308", "SHA3-384A2308", "RSA SigGen (FIPS186-4)A2308", "AES-OFBA2308", "HMAC-SHA3-256A2308", "SHA2-384A2308", "SHA3-512A2308", "SHA-1A2308", "DSA SigVer (FIPS186-4)A2308", "KDA OneStep Sp800-56Cr1A2308", "AES-CBC-CS3A2308", "AES-CBCA2308", "AES-GCMA2308", "AES-ECBA2308", "SHAKE-256A2308", "KDF SSHA2308", "KDF TLSA2308", "RSA Decryption PrimitiveA2308", "ECDSA KeyVer (FIPS186-4)A2308", "AES-GMACA2308", "SHA2-512/256A2308", "KDA HKDF Sp800-56Cr1A2308", "RSA SigVer (FIPS186-2)A2308", "AES-CTRA2308", "ECDSA KeyGen (FIPS186-4)A2308", "HMAC-SHA-1A2308", "DSA SigGen (FIPS186-4)A2308", "AES-XTS Testing Revision 2.0A2308", "TLS v1.3 KDFA2308", "HMAC-SHA2-512/224A2308", "HMAC-SHA2-384A2308", "HMAC-SHA2-512A2308", "AES-KWPA2308", "Safe Primes Key VerificationA2308", "HMAC-SHA2-512/256A2308", "HMAC-SHA3-384A2308", "KAS-ECC-SSC Sp800-56Ar3A2308", "KAS-IFC-SSCA2308", "KDF SP800-108A2308", "PBKDFA2308", "AES-KWA2308", "KDF ANS 9.63A2308", "Safe Primes Key GenerationA2308", "HMAC DRBGA2308", "SHA2-512/224A2308", "RSA KeyGen (FIPS186-4)A2308", "AES-CFB128A2308", "SHAKE-128A2308", "AES-CCMA2308", "AES-CMACA2308", "HMAC-SHA3-224A2308", "SHA2-256A2308", "SHA2-224A2308", "DSA KeyGen (FIPS186-4)A2308", "KAS-FFC-SSC Sp800-56Ar3A2308", "Counter DRBGA2308", "SHA2-512A2308", "SHA3-224A2308", "TLS v1.2 KDF RFC7627A2308", "DSA PQGGen (FIPS186-4)A2308", "HMAC-SHA2-256A2308", "ECDSA SigGen (FIPS186-4)A2308", "RSA Signature PrimitiveA2308", "SHA3-256A2308", "RSA SigVer (FIPS186-4)A2308"]}, "extracted_versions": {"_type": "Set", "elements": ["-"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "policy_prunned_references": {"_type": "Set", "elements": []}, "module_prunned_references": {"_type": "Set", "elements": []}, "policy_processed_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "module_processed_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "direct_transitive_cves": null, "indirect_transitive_cves": null}, "state": {"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState", "module_download_ok": true, "policy_download_ok": true, "policy_convert_ok": true, "module_extract_ok": true, "policy_extract_ok": true, "policy_pdf_hash": "45564fd548f04a3e903b5d4bae5c1c10cff2efd24acc2401b2eee70405c3963d", "policy_txt_hash": "c7154bb37e1ca3a9646265e49f118670bbf6b349d2e640d186a860dc4daee491", "policy_json_hash": null}}