intCertNum |
2076 |
strVendorName |
Oracle Corporation |
strURL |
http://www.oracle.com |
strAddress1 |
500 Oracle Parkway |
strAddress2 |
|
strAddress3 |
|
strCity |
Redwood Shores |
strStateProv |
CA |
strPostalCode |
94065 |
strCountry |
94065 |
strContact |
Security Evaluations Manager |
strEmail |
seceval_us@oracle.com |
strPhone |
781-442-0451 |
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
2076 |
strModuleName |
Oracle Solaris Userland Cryptographic Framework with SPARC T4 and SPARC T5 |
strPartNumber |
Hardware Versions: 527-1437-01 and 7043165; Software Versions: 1.0 and 1.1 |
memModuleNotes |
When installed, initialized and configured as specified in the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Software-Hybrid |
strValidationDate |
02/06/2014 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Mitigation of Other Attacks: N/A ;;;-Operational Environment: Tested as meeting Level 1 with Oracle Solaris 11.1 running on a SPARC T4-1 Server; Oracle Solaris 11.1 running on a SPARC T5-2 Server (single-user mode) |
strFIPSAlgorithms |
AES (Cert. #2310 and #2572); Triple-DES (Cert. #1457 and #1558); RSA (Cert. #1193 and #1319); DSA (Cert. #727 and #787); ECDSA (Cert. #375 and #444); SHS (Cert. #1994); HMAC (Cert. #1424 and #1594); RNG (Cert. #1153 and #1224) |
strOtherAlgorithms |
AES-XCBC-MAC (non-compliant); SHA-512/224 (non-compliant); SHA-512/256 (non-compliant); MD4; MD5; RC4; DES; Blowfish; RSA (key wrapping; key establishment methodology provides between 112 and 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The Oracle Solaris OS utilizes two cryptographic modules; one in the Userland space and the second in the Kernel space. The OS uses the Oracle Solaris Userland Cryptographic Framework module for cryptographic functionality for any applications running in user space. It exposes PKCS#11 APIs, uCrypto APIs, and libmd public interfaces to provide cryptography to any application designed to utilize them. The module includes the SPARC T4 and SPARC T5 processor special instruction sets for hardware-accelerated cryptography. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
02/06/14 00:00:00 |
strLabName |
CGI |
strValidationYear |
2014 |