SUSE Linux Enterprise OpenSSL 1 Cryptographic Module

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

Certificate #5238

Webpage information

Status active
Validation dates 10.04.2026
Sunset date 09-04-2031
Standard FIPS 140-3
Security level 1
Type Software
Embodiment MultiChipStand
Caveat When operated in approved mode and installed, initialized and configured as specified in Section 11 of the Security Policy. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.
Exceptions
  • Physical security: N/A
  • Non-invasive security: N/A
Description OpenSSL is an open-source library of various cryptographic algorithms written mainly in C.
Vendor SUSE LLC
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-128, AES-192, AES-256, CAST, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DHE, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-256, SHA-2, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA-3, PBKDF2, PBKDF
Schemes
MAC, Key Exchange, Key Agreement
Protocols
SSH, TLS, TLS v1.2, TLS v1.3, TLS v1.0, TLSv1.2, TLSv1.3, TLS 1.2, TLS 1.3, IKE
Randomness
DRBG, RNG, RBG
Libraries
OpenSSL
Elliptic Curves
P-224, P-256, P-384, P-521, P-192
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS
TLS cipher suites
TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_PSK_WITH_AES_128_CBC_SHA, TLS_PSK_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_CCM, TLS_DHE_RSA_WITH_AES_256_CCM, TLS_DHE_RSA_WITH_AES_128_CCM_8, TLS_DHE_RSA_WITH_AES_256_CCM_8

Trusted Execution Environments
PSP, SSC

Security level
Level 1
Side-channel analysis
timing attacks

Standards
FIPS 140-3, FIPS PUB 140-3, FIPS186-5, FIPS 186-5, FIPS 198-1, FIPS 180-4, FIPS 202, FIPS 197, SP 800-132, SP 800-56A, SP 800-38C, SP 800-38B, SP 800-38F, SP 800-38E, SP 800-56C, SP 800-135, SP 800-90A, SP 800-52, SP 800-133, SP 800-38A, SP 800-38D, SP 800-90B, SP 800-131A, PKCS#1, RFC7627, RFC 5288, RFC 8446, RFC 4253, RFC 6668, RFC3268, RFC5246, RFC4279, RFC5288, RFC4492, RFC5289, RFC6655, RFC8446, RFC 3268, RFC 4279, RFC 4492, RFC 5246, RFC 5289, RFC 6655, RFC 7919

File metadata

Author Natan
Creation date D:20260408070139-04'00'
Modification date D:20260408070139-04'00'
Pages 136
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Related CVEs

ID Links Severity CVSS Score Published on
Base score
CVE-2000-0218
C N
HIGH 7.2 03.02.2000
CVE-2000-0361
C N
LOW 2.1 14.12.1999
CVE-2004-1184
C N
MEDIUM 4.6 21.01.2005
CVE-2004-1191
C N
LOW 1.2 10.01.2005
CVE-2004-1491
C N
MEDIUM 5.0 31.12.2004
CVE-2005-0206
C N
HIGH 7.5 27.04.2005
CVE-2005-0638
C N
HIGH 7.5 02.03.2005
CVE-2005-0639
C N
HIGH 7.5 02.03.2005
CVE-2005-1043
C N
MEDIUM 5.0 14.04.2005
CVE-2005-3146
C N
LOW 2.1 05.10.2005
CVE-2005-3147
C N
LOW 2.1 05.10.2005
CVE-2005-3148
C N
MEDIUM 4.6 05.10.2005
CVE-2005-3624
C N
MEDIUM 5.0 31.12.2005
CVE-2005-3625
C N
HIGH 10.0 31.12.2005
CVE-2005-3626
C N
MEDIUM 5.0 31.12.2005
CVE-2006-0043
C N
MEDIUM 4.6 31.01.2006
CVE-2007-0460
C N
HIGH 10.0 24.01.2007
CVE-2007-4074
C N
HIGH 10.0 30.07.2007
CVE-2007-4393
C N
MEDIUM 4.6 17.08.2007
CVE-2007-6167
C N
HIGH 7.2 29.11.2007
CVE-2008-3949
C N
HIGH 7.2 22.09.2008
Showing 5 out of 21.

References

No references are available for this certificate.

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 5238,
  "dgst": "f34eb9d345d7d40d",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": []
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2005-0206",
        "CVE-2004-1491",
        "CVE-2004-1184",
        "CVE-2007-4074",
        "CVE-2005-3624",
        "CVE-2004-1191",
        "CVE-2005-1043",
        "CVE-2005-3147",
        "CVE-2005-0638",
        "CVE-2007-0460",
        "CVE-2005-3625",
        "CVE-2005-0639",
        "CVE-2006-0043",
        "CVE-2007-4393",
        "CVE-2007-6167",
        "CVE-2008-3949",
        "CVE-2005-3626",
        "CVE-2005-3146",
        "CVE-2005-3148",
        "CVE-2000-0218",
        "CVE-2000-0361"
      ]
    },
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 87
          }
        },
        "FF": {
          "DH": {
            "DH": 38,
            "DHE": 1,
            "Diffie-Hellman": 11
          },
          "DSA": {
            "DSA": 2
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CCM": {
          "CCM": 6
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 12
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 9
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 141
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "SSH": {
          "SSH": 34
        },
        "TLS": {
          "TLS": {
            "TLS": 68,
            "TLS 1.2": 1,
            "TLS 1.3": 1,
            "TLS v1.0": 2,
            "TLS v1.2": 19,
            "TLS v1.3": 5,
            "TLSv1.2": 1,
            "TLSv1.3": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 21
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-192": 12,
          "P-224": 20,
          "P-256": 80,
          "P-384": 22,
          "P-521": 22
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 2
        }
      },
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES-128": 2,
          "AES-192": 2,
          "AES-256": 3,
          "HMAC SHA-256": 2,
          "PKCS#1": 66,
          "SHA- 256": 26,
          "SHA-1": 6,
          "SHA-2": 1,
          "SHA-256": 28,
          "SHA-3": 2,
          "SHA2- 256": 13,
          "SHA2-224": 5,
          "SHA2-256": 53,
          "SHA2-384": 7,
          "SHA2-512": 20,
          "SHA3-224": 4,
          "SHA3-256": 17,
          "SHA3-384": 4,
          "SHA3-512": 16
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 3
        }
      },
      "hash_function": {
        "PBKDF": {
          "PBKDF": 39,
          "PBKDF2": 5
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 28
          },
          "SHA3": {
            "SHA-3": 2,
            "SHA3-224": 4,
            "SHA3-256": 17,
            "SHA3-384": 4,
            "SHA3-512": 16
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 47
        },
        "RNG": {
          "RBG": 2,
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "timing attacks": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 148,
          "FIPS 180-4": 7,
          "FIPS 186-5": 11,
          "FIPS 197": 1,
          "FIPS 198-1": 11,
          "FIPS 202": 7,
          "FIPS PUB 140-3": 2,
          "FIPS186-5": 148
        },
        "NIST": {
          "SP 800-131A": 1,
          "SP 800-132": 7,
          "SP 800-133": 4,
          "SP 800-135": 5,
          "SP 800-38A": 1,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 1,
          "SP 800-38E": 3,
          "SP 800-38F": 3,
          "SP 800-52": 3,
          "SP 800-56A": 6,
          "SP 800-56C": 2,
          "SP 800-90A": 3,
          "SP 800-90B": 1
        },
        "PKCS": {
          "PKCS#1": 33
        },
        "RFC": {
          "RFC 3268": 1,
          "RFC 4253": 1,
          "RFC 4279": 1,
          "RFC 4492": 1,
          "RFC 5246": 1,
          "RFC 5288": 3,
          "RFC 5289": 1,
          "RFC 6655": 1,
          "RFC 6668": 1,
          "RFC 7919": 1,
          "RFC 8446": 3,
          "RFC3268": 4,
          "RFC4279": 2,
          "RFC4492": 8,
          "RFC5246": 4,
          "RFC5288": 4,
          "RFC5289": 16,
          "RFC6655": 4,
          "RFC7627": 15,
          "RFC8446": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 43,
            "AES-128": 2,
            "AES-192": 2,
            "AES-256": 3
          },
          "CAST": {
            "CAST": 535
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "HMAC": 16
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 7
        },
        "IBM": {
          "SSC": 1
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_128_CCM": 1,
          "TLS_DHE_RSA_WITH_AES_128_CCM_8": 1,
          "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_256_CCM": 1,
          "TLS_DHE_RSA_WITH_AES_256_CCM_8": 1,
          "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_DH_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_DH_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_DH_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_DH_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_DH_RSA_WITH_AES_256_CBC_SHA256": 1,
          "TLS_DH_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_PSK_WITH_AES_128_CBC_SHA": 1,
          "TLS_PSK_WITH_AES_256_CBC_SHA": 1
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Natan",
      "/CreationDate": "D:20260408070139-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId": "92475855-0a98-4324-a177-63b58c2a3de7",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits": "1",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled": "true",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method": "Privileged",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name": "UNCLASSIFIED",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate": "2026-04-08T10:57:18Z",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId": "da9cbe40-ec1e-4997-afb3-17d87574571a",
      "/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Tag": "10, 0, 1, 1",
      "/ModDate": "D:20260408070139-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 2337607,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/csrc/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf",
          "https://doi.org/10.6028/NIST.SP.800-56Cr2",
          "https://doi.org/10.6028/NIST.SP.800-38A",
          "https://doi.org/10.6028/NIST.SP.800-131Ar2",
          "https://www.ietf.org/rfc/rfc7919.txt",
          "https://doi.org/10.6028/NIST.FIPS.198-1",
          "https://doi.org/10.6028/NIST.SP.800-133r2",
          "https://doi.org/10.6028/NIST.SP.800-56Ar3",
          "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf",
          "https://doi.org/10.6028/NIST.SP.800-38E",
          "https://doi.org/10.6028/NIST.SP.800-38C",
          "https://doi.org/10.6028/NIST.FIPS.186-5",
          "https://doi.org/10.6028/NIST.SP.800-90Ar1",
          "https://doi.org/10.6028/NIST.FIPS.180-4",
          "https://csrc.nist.gov/csrc/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS-140-3-CMVP%20Management%20Manual.pdf",
          "https://doi.org/10.6028/NIST.SP.800-132",
          "https://www.rfc-editor.org/rfc/rfc4492.txt",
          "https://doi.org/10.6028/NIST.SP.800-52r2",
          "https://www.rfc-editor.org/rfc/rfc5246.txt",
          "https://www.ietf.org/rfc/rfc5289.txt",
          "https://www.ietf.org/rfc/rfc8446.txt",
          "https://doi.org/10.6028/NIST.SP.800-90B",
          "https://doi.org/10.6028/NIST.FIPS.202",
          "https://doi.org/10.6028/NIST.SP.800-38F",
          "https://www.rfc-editor.org/rfc/rfc6655.txt",
          "https://doi.org/10.6028/NIST.FIPS.197-upd1",
          "https://www.rfc-editor.org/rfc/rfc4279.txt",
          "https://www.rfc-editor.org/rfc/rfc3268.txt",
          "https://doi.org/10.6028/NIST.SP.800-135r1",
          "https://doi.org/10.6028/NIST.SP.800-38B"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 136
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "9c3a7873b3e21ce7721067f4ca0113e192995850507bb61b198ba272382dd77a",
    "policy_txt_hash": "ea35d947c475b2e2e9ff23fc9a872146ed58ee69ec5db31de54b7468d7686fc8"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in approved mode and installed, initialized and configured as specified in Section 11 of the Security Policy. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.",
    "certificate_pdf_url": null,
    "date_sunset": "2031-04-09",
    "description": "OpenSSL is an open-source library of various cryptographic algorithms written mainly in C.",
    "embodiment": "MultiChipStand",
    "exceptions": [
      "Physical security: N/A",
      "Non-invasive security: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "SUSE Linux Enterprise OpenSSL 1 Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-3",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2026-04-10",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      }
    ],
    "vendor": "SUSE LLC",
    "vendor_url": "http://www.suse.com"
  }
}