Aruba Crypto Module

Certificate #4940

Webpage information ?

Status active
Validation dates 09.01.2025
Sunset date 08-01-2027
Standard FIPS 140-3
Security level 1
Type Firmware
Embodiment Multi-Chip Stand Alone
Caveat Interim validation. When operated in Approved mode with module Aruba OpenSSL Module validated to FIPS 140-3 under Cert. #4929 operating in Approved mode.
Exceptions
  • Non-invasive security: N/A
  • Mitigation of other attacks: N/A
  • Documentation requirements: N/A
  • Cryptographic module security policy: N/A
Description The Aruba Crypto Module is an Hewlett Packard Enterprise cryptographic module that provides cryptographic services for the ArubaOS operating system running on the Hewlett Packard Enterprise hardware-based equipment or Hewlett Packard Enterprise virtual appliances.
Version (Firmware) 1.0
Tested configurations
  • ArubaOS 8.10 on VMWare ESXi 7.0 running on MC-VA-50 Mobility Controller Virtual Appliance on HPE ProLiant ML110 Gen10 with Intel Xeon Silver 4210 (Cascade Lake) with PAA
  • ArubaOS 8.10 on VMWare ESXi 7.0 running on MC-VA-50 Mobility Controller Virtual Appliance on HPE ProLiant ML110 Gen10 with Intel Xeon Silver 4210 (Cascade Lake) without PAA"
  • ArubaOS 8.10 running on 7220 Mobility Controller with Broadcom XLP432 (MIPS64) without PAA
  • ArubaOS 8.10 running on 9012 Gateway with Intel Atom C3508 (Denverton) without PAA
  • ArubaOS 8.10 running on AP-515 Wireless Access Point with Broadcom BCM (64-bit ARMv8) without PAA
  • ArubaOS 8.10 running on AP-535 Wireless Access Point with Qualcomm IPQ (64-bit ARM Cortex A53) without PAA
  • ArubaOS 8.10 running on AP-635 Wireless Access Point with Qualcomm IPQ (64-bit ARM Cortex A53) without PAA
  • ArubaOS 8.10 running on AP-655 Wireless Access Point with Qualcomm IPQ (64-bit ARM Cortex A53) without PAA
  • ArubaOS 8.10 running on MCR-HW-5K Mobility Conductor Hardware Appliance with Intel Xeon E5-2620v4 (Broadwell) with PAA
Vendor Hewlett Packard Enterprise
References

This certificate's webpage directly references 1 certificates, transitively this expands into 1 certificates.

Security policy ?

Symmetric Algorithms
AES, AES-256, RC4, DES, Triple-DES, HMAC
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA2, SHA-3, MD5
Schemes
Key Exchange, Key Agreement, Key agreement
Protocols
IKE, IKEv2, IPsec, VPN
Randomness
DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-256, P-384
Block cipher modes
CBC, CTR, GCM

Trusted Execution Environments
PSP
Vendor
Qualcomm, Broadcom

Security level
Level 1

Standards
FIPS 140-3, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 186-2, FIPS 180-4, SP 800-38A, SP 800-38D, SP 800-135, SP 800-56A, SP 800-38F, SP 800-90A, PKCS1, RFC 4106, RFC 7296, RFC 5282, ISO/IEC 24759, ISO/IEC 19790:2012, ISO/IEC 24759:2017

File metadata

Author McGlashan, Dave
Creation date D:20250106153543-05'00'
Modification date D:20250106153543-05'00'
Pages 31
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing
  • 4929 - active - Aruba OpenSSL Module

Heuristics ?

No heuristics are available for this certificate.

References ?

Updates ?

  • 27.01.2025 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name Aruba Crypto Module was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4940,
  "dgst": "468aa3110cc68497",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "SHA2-512A2689",
        "HMAC-SHA-1A2689",
        "RSA SigVer (FIPS186-2)A2689",
        "KDF IKEv2A2689",
        "ECDSA KeyVer (FIPS186-4)A2689",
        "AES-CTRA2689",
        "KAS-ECC-SSC Sp800-56Ar3A2689",
        "SHA2-256A2689",
        "SHA-1A2689",
        "RSA KeyGen (FIPS186-4)A2689",
        "ECDSA SigVer (FIPS186-4)A2689",
        "RSA SigVer (FIPS186-4)A2689",
        "SHA2-384A2689",
        "RSA Signature PrimitiveA2689",
        "AES-GCMA2689",
        "KAS-FFC-SSC Sp800-56Ar3A2689",
        "HMAC-SHA2-512A2689",
        "HMAC-SHA2-384A2689",
        "AES-CBCA2689",
        "ECDSA KeyGen (FIPS186-4)A2689",
        "RSA SigGen (FIPS186-4)A2689",
        "DSA KeyGen (FIPS186-4)A2689",
        "DSA PQGGen (FIPS186-4)A2689",
        "HMAC-SHA2-256A2689",
        "ECDSA SigGen (FIPS186-4)A2689"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "4929"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "4929"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "4929"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "4929"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "4929"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "4929"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 20
          }
        },
        "FF": {
          "DH": {
            "DH": 14,
            "Diffie-Hellman": 17
          },
          "DSA": {
            "DSA": 2
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CTR": {
          "CTR": 2
        },
        "GCM": {
          "GCM": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 27
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 18,
          "IKEv2": 25
        },
        "IPsec": {
          "IPsec": 1
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 2
        },
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 24,
          "P-384": 20
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#4929": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES CTR 256": 1,
          "AES-256": 2,
          "AES-CBC7": 1,
          "AES-GCM6": 1,
          "DRBG8": 1,
          "DSA3": 1,
          "HMAC- SHA-1": 1,
          "HMAC-SHA-1": 16,
          "PAA 8": 1,
          "PKCS1": 6,
          "RSA 2048": 1,
          "SHA-1": 9,
          "SHA-14": 1,
          "SHA-15": 1,
          "SHA-256": 1,
          "SHA-3": 1,
          "SHA-384": 1,
          "SHA-512": 1,
          "SHA2": 1,
          "SHA2-256": 11,
          "SHA2-384": 9,
          "SHA2-512": 6
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 43
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 9
          },
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA2": 1
          },
          "SHA3": {
            "SHA-3": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 17
        },
        "RNG": {
          "RNG": 6
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 48,
          "FIPS 180-4": 1,
          "FIPS 186-2": 1,
          "FIPS 186-4": 7,
          "FIPS 197": 1,
          "FIPS 198-1": 2
        },
        "ISO": {
          "ISO/IEC 19790:2012": 1,
          "ISO/IEC 24759": 2,
          "ISO/IEC 24759:2017": 1
        },
        "NIST": {
          "SP 800-135": 2,
          "SP 800-38A": 1,
          "SP 800-38D": 1,
          "SP 800-38F": 2,
          "SP 800-56A": 5,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS1": 3
        },
        "RFC": {
          "RFC 4106": 1,
          "RFC 5282": 1,
          "RFC 7296": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 16,
            "AES-256": 2
          },
          "RC": {
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 3
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 10
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 5
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Broadcom": {
          "Broadcom": 2
        },
        "Qualcomm": {
          "Qualcomm": 3
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "McGlashan, Dave",
      "/CreationDate": "D:20250106153543-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20250106153543-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 770750,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35300",
          "https://www.hpe.com/us/en/networking/",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations/certificate/7",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search",
          "https://myenterpriselicense.hpe.com/cwp-ui/software",
          "https://networkingsupport.hpe.com/end-of-life",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35301",
          "https://networkingsupport.hpe.com/downloads;pageSize=100;fileTypes=DOCUMENT;products=Aruba%20Access%20Points,Aruba%20Mobility%20Gateways;softwareGroups=ArubaOS;softwareMajorVersions=8.10",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/Details?validation=35301",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/Details?validation=35300"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 31
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "12a8596dcbfeee80881d35a2a61684f7e59371c241a2f4d468e25f22d2d1c077",
    "policy_txt_hash": "a193b45e1f38d1333b36291044dfc0cb68f9ebd9192a0513c213323dcc15dd59"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "Interim validation. When operated in Approved mode with module Aruba OpenSSL Module validated to FIPS 140-3 under Cert. #4929 operating in Approved mode.",
    "certificate_pdf_url": null,
    "date_sunset": "2027-01-08",
    "description": "The Aruba Crypto Module is an Hewlett Packard Enterprise cryptographic module that provides cryptographic services for the ArubaOS operating system running on the Hewlett Packard Enterprise hardware-based equipment or Hewlett Packard Enterprise virtual appliances.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Non-invasive security: N/A",
      "Mitigation of other attacks: N/A",
      "Documentation requirements: N/A",
      "Cryptographic module security policy: N/A"
    ],
    "fw_versions": "1.0",
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "4929": 1
    },
    "module_name": "Aruba Crypto Module",
    "module_type": "Firmware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-3",
    "status": "active",
    "sw_versions": null,
    "tested_conf": [
      "ArubaOS 8.10 on VMWare ESXi 7.0 running on MC-VA-50 Mobility Controller Virtual Appliance on HPE ProLiant ML110 Gen10 with Intel Xeon Silver 4210 (Cascade Lake) with PAA",
      "ArubaOS 8.10 on VMWare ESXi 7.0 running on MC-VA-50 Mobility Controller Virtual Appliance on HPE ProLiant ML110 Gen10 with Intel Xeon Silver 4210 (Cascade Lake) without PAA\"",
      "ArubaOS 8.10 running on 7220 Mobility Controller with Broadcom XLP432 (MIPS64) without PAA",
      "ArubaOS 8.10 running on 9012 Gateway with Intel Atom C3508 (Denverton) without PAA",
      "ArubaOS 8.10 running on AP-515 Wireless Access Point with Broadcom BCM (64-bit ARMv8) without PAA",
      "ArubaOS 8.10 running on AP-535 Wireless Access Point with Qualcomm IPQ (64-bit ARM Cortex A53) without PAA",
      "ArubaOS 8.10 running on AP-635 Wireless Access Point with Qualcomm IPQ (64-bit ARM Cortex A53) without PAA",
      "ArubaOS 8.10 running on AP-655 Wireless Access Point with Qualcomm IPQ (64-bit ARM Cortex A53) without PAA",
      "ArubaOS 8.10 running on MCR-HW-5K Mobility Conductor Hardware Appliance with Intel Xeon E5-2620v4 (Broadwell) with PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2025-01-09",
        "lab": "Lightship Security, Inc.",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Hewlett Packard Enterprise",
    "vendor_url": "http://www.hpe.com/us/en/networking/"
  }
}