Oracle OpenSSL FIPS Provider

Certificate #4506

Webpage information ?

Status active
Validation dates 03.05.2023 , 26.03.2025
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. No assurance of the minimum strength of generated keys.
Exceptions
  • Physical Security: N/A
  • Design Assurance: Level 3
Description The Oracle OpenSSL FIPS Provider is a software library written in C programming language for use by Oracle applications that require FIPS 140-2 validated cryptography.
Tested configurations
  • Oracle ILOM OS v3.0 running on Emulex Pilot-4 Orion mainboard with Oracle ILOM SP v4 ARM v7
  • Oracle ILOM OS v5.0 running on AST2520 Server Management Processor with Oracle ILOM SP v5 with ARM v11
  • Oracle ILOM OS v5.1 running on AST2600 Server Management Processor with Oracle ILOM SP v6 with ARM v7
  • Oracle Linux 8.9 64-bit running on Oracle A1-2C Server with ARMv8 with PAA
  • Oracle Linux 8.9 64-bit running on Oracle A1-2C Server with ARMv8 without PAA
  • Oracle Linux 8.9 64-bit running on Oracle X9-2C Server with Intel XEON Platinum 8358 with PAA
  • Oracle Linux 8.9 64-bit running on Oracle X9-2C Server with Intel XEON Platinum 8358 without PAA
  • Oracle Solaris 11.4 64-bit running on Oracle X9 Server with Intel XEON Gold 6354 with PAA
  • Oracle Solaris 11.4 64-bit running on Oracle X9 Server with Intel XEON Gold 6354 without PAA
  • Oracle Solaris 11.4 64-bit running on SPARC T8 with SPARC M8 with PAA
  • Oracle Solaris 11.4 64-bit running on SPARC T8 with SPARC M8 without PAA
  • Windows Server 2019 running on Oracle X9-2C Server with Intel XEON Platinum 8358 with PAA
  • Windows Server 2019 running on Oracle X9-2C Server with Intel XEON Platinum 8358 without PAA
  • Windows Server 2022 running on Oracle E4-2C server with AMD EPYC 7J13 with PAA
  • Windows Server 2022 running on Oracle E4-2C server with AMD EPYC 7J13 without PAA (single-user mode)
Vendor Oracle Corporation
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, AES128, AES192, AES256, AES-128, AES-192, AES-256, Triple-DES, TDES, TDEA, HMAC, HMAC-SHA-256, KMAC, CMAC
Asymmetric Algorithms
RSA-OAEP, ECDH, ECDSA, EdDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-2, SHA-3, SHA3-224, SHA-3-256, Keccak, PBKDF2, PBKDF
Schemes
MAC, Key Agreement
Protocols
SSHv2, SSH, TLS 1.2, TLS 1.3, TLS, TLS v1.3, TLS v1.2
Randomness
DRBG
Libraries
OpenSSL
Elliptic Curves
P-224, P-192, P-256, K-233, B-233, K-163, B-163
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

JavaCard API constants
X25519, X448

Security level
Level 1, level 1
Side-channel analysis
side-channel, timing attacks

Standards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 186-4, FIPS 202, FIPS 180-4, FIPS 198-1, SP 800-135, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38F, SP 800-38E, SP 800-132, SP 800-108, SP 800-185, NIST SP 800-133, NIST SP 800-38D, SP 800-131A, PKCS 1, PKCS#1, RFC 8446, RFC 5288, RFC 5246

File metadata

Author chris brych
Creation date D:20250314094959-04'00'
Modification date D:20250314094959-04'00'
Pages 37
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 04.04.2025 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The validation_history property was updated, with the [[1, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2025-03-26', 'validation_type': 'Update', 'lab': 'Lightship Security, Inc.'}]] values inserted.
    • The tested_conf property was set to ['Oracle ILOM OS v3.0 running on Emulex Pilot-4 Orion mainboard with Oracle ILOM SP v4 ARM v7', 'Oracle ILOM OS v5.0 running on AST2520 Server Management Processor with Oracle ILOM SP v5 with ARM v11', 'Oracle ILOM OS v5.1 running on AST2600 Server Management Processor with Oracle ILOM SP v6 with ARM v7', 'Oracle Linux 8.9 64-bit running on Oracle A1-2C Server with ARMv8 with PAA', 'Oracle Linux 8.9 64-bit running on Oracle A1-2C Server with ARMv8 without PAA', 'Oracle Linux 8.9 64-bit running on Oracle X9-2C Server with Intel XEON Platinum 8358 with PAA', 'Oracle Linux 8.9 64-bit running on Oracle X9-2C Server with Intel XEON Platinum 8358 without PAA', 'Oracle Solaris 11.4 64-bit running on Oracle X9 Server with Intel XEON Gold 6354 with PAA', 'Oracle Solaris 11.4 64-bit running on Oracle X9 Server with Intel XEON Gold 6354 without PAA', 'Oracle Solaris 11.4 64-bit running on SPARC T8 with SPARC M8 with PAA', 'Oracle Solaris 11.4 64-bit running on SPARC T8 with SPARC M8 without PAA', 'Windows Server 2019 running on Oracle X9-2C Server with Intel XEON Platinum 8358 with PAA', 'Windows Server 2019 running on Oracle X9-2C Server with Intel XEON Platinum 8358 without PAA', 'Windows Server 2022 running on Oracle E4-2C server with AMD EPYC 7J13 with PAA', 'Windows Server 2022 running on Oracle E4-2C server with AMD EPYC 7J13 without PAA (single-user mode)'].
    • The sw_versions property was set to 3.0.15.

    The PDF extraction data was updated.

    • The keywords property was updated, with the {'fips_certlike': {'__update__': {'Certlike': {'__update__': {'SHA2-224': 8}, '__delete__': ['SHA-3-224']}}}, 'eval_facility': {}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'3DES': {'__update__': {'Triple-DES': 5, 'TDES': 8}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC': 9}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 17}}}}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 17}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA3': {'__delete__': ['SHA-3-224']}}}}}, 'crypto_protocol': {'__update__': {'SSH': {'__insert__': {'SSHv2': 4}}}}, 'cipher_mode': {'__update__': {'ECB': {'__update__': {'ECB': 3}}, 'CBC': {'__update__': {'CBC': 3}}}}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 51}}}}, 'standard_id': {'__update__': {'NIST': {'__insert__': {'SP 800-131A': 1}, '__update__': {'SP 800-38F': 3, 'SP 800-38E': 2}, '__delete__': ['SP 800-90A', 'SP 800-90']}}}} data.
    • The policy_metadata property was updated, with the {'pdf_file_size_bytes': 698791, 'pdf_number_of_pages': 37, '/CreationDate': "D:20250314094959-04'00'", '/ModDate': "D:20250314094959-04'00'", 'pdf_hyperlinks': {'__discard__': {'_type': 'Set', 'elements': ['https://www.openssl.org/source/openssl-3.0.0.tar.gz', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14792']}, '__add__': {'_type': 'Set', 'elements': ['https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=38675', 'https://csrc.nist.gov/pubs/sp/800/38/f/final', 'https://www.openssl.org/source/openssl-3.0.15.tar.gz.', 'https://csrc.nist.gov/pubs/sp/800/38/e/final']}}} data.

    The computed heuristics were updated.

    • The algorithms property was set to {'_type': 'Set', 'elements': ['KDA#A6065', 'KTS#A6065', 'SHS#A6065', 'SHA-3#A6065', 'PBKDF#A6065', 'DSA#A6065', 'HMAC#A6065', 'KMAC#A6065', 'Triple-DES#A6065', 'KAS-SSC#A6065', 'AES#A6065', 'DRBG#A6065', 'KTS-RSA#A6065', 'ECDSA#A6065', 'RSA#A6065', 'CVL#A6065', 'KBKDF#A6065', 'KAS-RSA-SSC#A6065']}.

    The state was updated.

    • The policy_pdf_hash property was set to e6e69dab1d845a0e7699039248bf2aa6dc4f73ce888773e5067c072ca9566fff.
    • The policy_txt_hash property was set to 2e913c6e948ded9b6fd7fe2b0d56d654fa9aac51b0800d415ab6b1de2702d39b.
  • 26.06.2023 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The certificate_pdf_url property was set to https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf.
  • 18.05.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name Oracle OpenSSL FIPS Provider was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4506,
  "dgst": "7fe7914ad0e02022",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "KAS-SSC#A6065",
        "RSA#A6065",
        "KTS-RSA#A6065",
        "KMAC#A6065",
        "KAS-RSA-SSC#A6065",
        "AES#A6065",
        "HMAC#A6065",
        "KDA#A6065",
        "KTS#A6065",
        "KBKDF#A6065",
        "SHA-3#A6065",
        "SHS#A6065",
        "Triple-DES#A6065",
        "ECDSA#A6065",
        "DRBG#A6065",
        "DSA#A6065",
        "CVL#A6065",
        "PBKDF#A6065"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 17
          },
          "EdDSA": {
            "EdDSA": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 17,
            "Diffie-Hellman": 3
          },
          "DSA": {
            "DSA": 17
          }
        },
        "RSA": {
          "RSA-OAEP": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 3
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 3
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 9
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 51
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 1,
          "SSHv2": 4
        },
        "TLS": {
          "TLS": {
            "TLS": 5,
            "TLS 1.2": 4,
            "TLS 1.3": 4,
            "TLS v1.2": 1,
            "TLS v1.3": 3
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 6
        },
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 2,
          "B-233": 4,
          "K-163": 2,
          "K-233": 5,
          "P-192": 4,
          "P-224": 12,
          "P-256": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128/192/256": 1,
          "AES-128": 1,
          "AES-192": 1,
          "AES-256": 1,
          "AES128": 1,
          "AES192": 1,
          "AES256": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-256": 8,
          "PKCS 1": 4,
          "PKCS#1": 4,
          "SHA- 1": 1,
          "SHA-1": 13,
          "SHA-1, 224": 1,
          "SHA-1, 256": 1,
          "SHA-2": 2,
          "SHA-224": 5,
          "SHA-256": 3,
          "SHA-3": 6,
          "SHA-3-256": 1,
          "SHA2-224": 8,
          "SHA2-256": 2,
          "SHA2-512": 1,
          "SHA3-224": 5
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 5,
          "level 1": 1
        }
      },
      "hash_function": {
        "Keccak": {
          "Keccak": 1
        },
        "PBKDF": {
          "PBKDF": 1,
          "PBKDF2": 5
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 15
          },
          "SHA2": {
            "SHA-2": 4,
            "SHA-224": 5,
            "SHA-256": 3
          },
          "SHA3": {
            "SHA-3": 6,
            "SHA-3-256": 1,
            "SHA3-224": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "X25519": 10,
          "X448": 10
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 17
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 4,
          "FIPS 140-2": 20,
          "FIPS 180-4": 2,
          "FIPS 186-4": 6,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS 202": 2
        },
        "NIST": {
          "NIST SP 800-133": 1,
          "NIST SP 800-38D": 2,
          "SP 800-108": 2,
          "SP 800-131A": 1,
          "SP 800-132": 4,
          "SP 800-135": 5,
          "SP 800-185": 1,
          "SP 800-38A": 2,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 2,
          "SP 800-38E": 2,
          "SP 800-38F": 3
        },
        "PKCS": {
          "PKCS 1": 2,
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 5246": 1,
          "RFC 5288": 2,
          "RFC 8446": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 30,
            "AES-128": 1,
            "AES-192": 1,
            "AES-256": 1,
            "AES128": 1,
            "AES192": 1,
            "AES256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 8,
            "Triple-DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 12,
            "HMAC": 9,
            "HMAC-SHA-256": 4,
            "KMAC": 5
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "chris brych",
      "/CreationDate": "D:20250314094959-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20250314094959-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 698791,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=38675",
          "https://datatracker.ietf.org/doc/html/rfc5288",
          "https://www.rfc-editor.org/info/rfc3447",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf",
          "https://www.openssl.org/docs/manmaster/man1/openssl-fipsinstall.html",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
          "http://csrc.nist.gov/groups/STM/cmvp/index.html",
          "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf",
          "https://csrc.nist.gov/pubs/sp/800/38/e/final",
          "https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf",
          "http://www.oracle.com/",
          "https://csrc.nist.gov/pubs/sp/800/38/f/final",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
          "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
          "https://csrc.nist.gov/csrc/media/publications/fips/197/final/documents/fips-197.pdf",
          "https://datatracker.ietf.org/doc/html/rfc8446",
          "https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-38b.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
          "https://csrc.nist.gov/csrc/media/publications/fips/198/1/final/documents/fips-198-1_final.pdf",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
          "https://www.openssl.org/source/openssl-3.0.15.tar.gz.",
          "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "e6e69dab1d845a0e7699039248bf2aa6dc4f73ce888773e5067c072ca9566fff",
    "policy_txt_hash": "2e913c6e948ded9b6fd7fe2b0d56d654fa9aac51b0800d415ab6b1de2702d39b"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf",
    "date_sunset": "2026-09-21",
    "description": "The Oracle OpenSSL FIPS Provider is a software library written in C programming language for use by Oracle applications that require FIPS 140-2 validated cryptography.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Design Assurance: Level 3"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Oracle OpenSSL FIPS Provider",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "3.0.15",
    "tested_conf": [
      "Oracle ILOM OS v3.0 running on Emulex Pilot-4 Orion mainboard with Oracle ILOM SP v4 ARM v7",
      "Oracle ILOM OS v5.0 running on AST2520 Server Management Processor with Oracle ILOM SP v5 with ARM v11",
      "Oracle ILOM OS v5.1 running on AST2600 Server Management Processor with Oracle ILOM SP v6 with ARM v7",
      "Oracle Linux 8.9 64-bit running on Oracle A1-2C Server with ARMv8 with PAA",
      "Oracle Linux 8.9 64-bit running on Oracle A1-2C Server with ARMv8 without PAA",
      "Oracle Linux 8.9 64-bit running on Oracle X9-2C Server with Intel XEON Platinum 8358 with PAA",
      "Oracle Linux 8.9 64-bit running on Oracle X9-2C Server with Intel XEON Platinum 8358 without PAA",
      "Oracle Solaris 11.4 64-bit running on Oracle X9 Server with Intel XEON Gold 6354 with PAA",
      "Oracle Solaris 11.4 64-bit running on Oracle X9 Server with Intel XEON Gold 6354 without PAA",
      "Oracle Solaris 11.4 64-bit running on SPARC T8 with SPARC M8 with PAA",
      "Oracle Solaris 11.4 64-bit running on SPARC T8 with SPARC M8 without PAA",
      "Windows Server 2019 running on Oracle X9-2C Server with Intel XEON Platinum 8358 with PAA",
      "Windows Server 2019 running on Oracle X9-2C Server with Intel XEON Platinum 8358 without PAA",
      "Windows Server 2022 running on Oracle E4-2C server with AMD EPYC 7J13 with PAA",
      "Windows Server 2022 running on Oracle E4-2C server with AMD EPYC 7J13 without PAA (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-05-03",
        "lab": "ACUMEN SECURITY, LLC",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2025-03-26",
        "lab": "Lightship Security, Inc.",
        "validation_type": "Update"
      }
    ],
    "vendor": "Oracle Corporation",
    "vendor_url": "http://www.oracle.com"
  }
}