This page was not yet optimized for use on mobile devices.
HPE OpenSSL Cryptographic Module on Red Hat Enterprise Linux
Certificate #4877
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES-128, AES-256, AES128, AES256, CAST, CAST5, RC2, RC4, RC5, DES, Triple-DES, TDES, TDEA, ChaCha20, Poly1305, IDEA, Blowfish, Camellia, ARIA, SEED, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-224, CMACAsymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-384, SHA-256, SHA-512, SHA384, SHA-3, SHA3-224, SHA3-256, SHA3-384, SHA3-512, BLAKE2, MD4, MD5, RIPEMD, PBKDFSchemes
MAC, Key Exchange, Key Agreement, Key agreementProtocols
SSH, TLS, TLS v1.0, TLS 1.3, TLS 1.0, TLSv1.2, TLSv1.3, IKE, IKEv2Randomness
PRNG, DRBG, RNGLibraries
OpenSSLElliptic Curves
P-224, P-384, P-521, P-256, P-192Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSTrusted Execution Environments
SSCSecurity level
Level 1, level 1Side-channel analysis
timing attacksStandards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 180-4, FIPS 202, FIPS 198-1, FIPS186-4, SP 800-38D, SP 800-38A, SP 800-38C, SP 800-38E, SP 800-38F, SP 800-38B, SP 800-67, SP 800-90A, SP 800-135, SP 800-132, SP 800-90B, SP 800-57, NIST SP 800-67, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-38D, NIST SP 800-38E, NIST SP 800-56A, NIST SP 800-90A, PKCS#1, RFC 5246, RFC7919, RFC3526, RFC5288File metadata
Title | FIPS 140-2 Non-proprietary Security Policy |
---|---|
Subject | Red Hat Enterprise Linux 7.7 OpenSSL Module |
Author | Alejandro Fabio Masino |
Creation date | D:20241105092444-06'00' |
Pages | 38 |
Creator | Writer |
Producer | LibreOffice 7.2 |
References
Outgoing- 4642 - active - Red Hat Enterprise Linux 8 OpenSSL Cryptographic Module
Heuristics ?
No heuristics are available for this certificate.
References ?
Updates ?
-
18.11.2024 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4877,
"dgst": "e9fcc34d4cd9e902",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"HMAC#A1822",
"PBKDF#A1821",
"AES#A1811",
"PBKDF#A1822",
"KAS-SSC#A1821",
"KTS#A1792",
"SHS#A1820",
"Triple-DES#A1799",
"CVL#A1823",
"CVL#A1797",
"ECDSA#A1820",
"SHS#A1823",
"HMAC#A1802",
"CVL#A1800",
"DSA#A1822",
"CVL#A1798",
"KAS-SSC#A1820",
"AES#A1814",
"KAS-SSC#A1823",
"HMAC#A1820",
"AES#A1813",
"DRBG#A1793",
"AES#A1799",
"KTS#A1820",
"Triple-DES#A1797",
"DSA#A1820",
"KTS#A1823",
"KTS#A1822",
"KTS-RSA#A1821",
"CVL#A1821",
"DSA#A1821",
"KTS-RSA#A1822",
"DRBG#A1794",
"ECDSA#A1821",
"HMAC#A1801",
"Triple-DES#A1798",
"CVL#A1822",
"HMAC#A1823",
"ECDSA#A1822",
"AES#A1812",
"SHS#A1821",
"SHA-3#A1802",
"KDA#A1796",
"RSA#A1822",
"AES#A1816",
"AES#A1800",
"PBKDF#A1823",
"KBKDF#A1835",
"AES#A1794",
"KTS-RSA#A1823",
"KAS#A1823",
"PBKDF#A1802",
"SHA-3#A1801",
"HMAC#A1803",
"KAS#A1821",
"AES#A1818",
"ECDSA#A1823",
"AES#A1819",
"KAS#A1820",
"RSA#A1821",
"Triple-DES#A1800",
"AES#A1798",
"KTS#A1821",
"CVL#A1799",
"PBKDF#A1820",
"Triple-DES#A1792",
"AES#A1797",
"SHA-3#A1803",
"AES#A1795",
"SHS#A1822",
"KTS-RSA#A1820",
"RSA#A1820",
"KAS-SSC#A1822",
"DSA#A1823",
"CVL#A1820",
"PBKDF#A1803",
"AES#A1815",
"KAS#A1822",
"KAS-SSC#A1834",
"AES#A1817",
"DRBG#A1795",
"KAS#A1834",
"HMAC#A1821",
"RSA#A1823",
"AES#A1793"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"4642"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"4642"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"4642"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 25
}
},
"FF": {
"DH": {
"DH": 3,
"Diffie-Hellman": 53
},
"DSA": {
"DSA": 31
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 7
},
"CCM": {
"CCM": 6
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 5
},
"GCM": {
"GCM": 10
},
"OFB": {
"OFB": 3
},
"XTS": {
"XTS": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 58
}
},
"crypto_protocol": {
"IKE": {
"IKE": 2,
"IKEv2": 1
},
"SSH": {
"SSH": 3
},
"TLS": {
"TLS": {
"TLS": 33,
"TLS 1.0": 1,
"TLS 1.3": 1,
"TLS v1.0": 1,
"TLSv1.2": 1,
"TLSv1.3": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3,
"Key agreement": 5
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-192": 4,
"P-224": 8,
"P-256": 6,
"P-384": 8,
"P-521": 8
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#4642": 1
}
},
"fips_certlike": {
"Certlike": {
"AES (128": 1,
"AES-128": 2,
"AES-256": 1,
"AES128": 1,
"AES256": 1,
"HMAC SHA-256": 2,
"HMAC- SHA-1": 1,
"HMAC- SHA-224": 1,
"HMAC-SHA-1": 4,
"HMAC-SHA-224": 2,
"HMAC-SHA-256": 10,
"HMAC-SHA-384": 6,
"HMAC-SHA-512": 4,
"PKCS#1": 8,
"SHA-1": 10,
"SHA-224": 9,
"SHA-256": 21,
"SHA-3": 1,
"SHA-384": 6,
"SHA-512": 8,
"SHA2-256": 1,
"SHA3- 256": 1,
"SHA3-224": 2,
"SHA3-256": 2,
"SHA3-384": 2,
"SHA3-512": 4,
"SHA384": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 2,
"level 1": 5
}
},
"hash_function": {
"BLAKE": {
"BLAKE2": 1
},
"MD": {
"MD4": {
"MD4": 1
},
"MD5": {
"MD5": 2
}
},
"PBKDF": {
"PBKDF": 14
},
"RIPEMD": {
"RIPEMD": 1
},
"SHA": {
"SHA1": {
"SHA-1": 10
},
"SHA2": {
"SHA-224": 11,
"SHA-256": 20,
"SHA-384": 5,
"SHA-512": 8,
"SHA384": 1
},
"SHA3": {
"SHA-3": 2,
"SHA3-224": 2,
"SHA3-256": 2,
"SHA3-384": 2,
"SHA3-512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 22,
"PRNG": 1
},
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"SCA": {
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 50,
"FIPS 180-4": 2,
"FIPS 186-4": 11,
"FIPS 197": 4,
"FIPS 198-1": 2,
"FIPS 202": 1,
"FIPS186-4": 2
},
"NIST": {
"NIST SP 800-38B": 1,
"NIST SP 800-38C": 1,
"NIST SP 800-38D": 1,
"NIST SP 800-38E": 1,
"NIST SP 800-56A": 1,
"NIST SP 800-67": 1,
"NIST SP 800-90A": 1,
"SP 800-132": 2,
"SP 800-135": 3,
"SP 800-38A": 2,
"SP 800-38B": 2,
"SP 800-38C": 1,
"SP 800-38D": 2,
"SP 800-38E": 2,
"SP 800-38F": 1,
"SP 800-57": 1,
"SP 800-67": 2,
"SP 800-90A": 7,
"SP 800-90B": 3
},
"PKCS": {
"PKCS#1": 4
},
"RFC": {
"RFC 5246": 1,
"RFC3526": 3,
"RFC5288": 1,
"RFC7919": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 37,
"AES-128": 2,
"AES-256": 1,
"AES128": 1,
"AES256": 1
},
"CAST": {
"CAST": 1,
"CAST5": 1
},
"RC": {
"RC2": 1,
"RC4": 1,
"RC5": 1
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 1,
"Triple-DES": 21
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 9,
"HMAC": 23,
"HMAC-SHA-224": 1,
"HMAC-SHA-256": 5,
"HMAC-SHA-384": 3,
"HMAC-SHA-512": 2
}
},
"djb": {
"ChaCha": {
"ChaCha20": 2
},
"Poly": {
"Poly1305": 1
}
},
"miscellaneous": {
"ARIA": {
"ARIA": 1
},
"Blowfish": {
"Blowfish": 1
},
"Camellia": {
"Camellia": 1
},
"IDEA": {
"IDEA": 1
},
"SEED": {
"SEED": 1
}
}
},
"tee_name": {
"IBM": {
"SSC": 3
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Alejandro Fabio Masino",
"/CreationDate": "D:20241105092444-06\u002700\u0027",
"/Creator": "Writer",
"/Producer": "LibreOffice 7.2",
"/Subject": "Red Hat Enterprise Linux 7.7 OpenSSL Module",
"/Title": "FIPS 140-2 Non-proprietary Security Policy",
"pdf_file_size_bytes": 338391,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf",
"http://webstore.ansi.org/FindStandards.aspx?Action=displaydept\u0026DeptID=80\u0026Acro=X9\u0026DpName=X9,%20Inc.",
"https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402DTR.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"mailto:[email protected]",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program/standards",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf",
"http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI+X9.52%3A1998",
"https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402IG.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "98b3da838cbd2f85b839fbb22e633422d3ba86c56b9f81f76c6de02c5017f853",
"policy_txt_hash": "299caf45e79d0c6ab553ee93607fb6e6dcf1e31cb11f88571b12a0deaa3cedd9"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode and installed, initialized and configured as specified in Section 9.1 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": null,
"date_sunset": "2026-09-21",
"description": "The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "HPE OpenSSL Cryptographic Module on Red Hat Enterprise Linux",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "active",
"sw_versions": "rhel8.20231130",
"tested_conf": [
"Red Hat Enterprise Linux 8 running on Dell PowerEdge R440 with an Intel(R) Xeon(R) Silver 4216 with PAA",
"Red Hat Enterprise Linux 8 running on Dell PowerEdge R440 with an Intel(R) Xeon(R) Silver 4216 without PAA (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-11-13",
"lab": "ATSEC INFORMATION SECURITY CORP",
"validation_type": "Initial"
}
],
"vendor": "HPE Aruba Networking",
"vendor_url": "http://www.arubanetworks.com/"
}
}