intCertNum |
2077 |
strVendorName |
Oracle Corporation |
strURL |
http://www.oracle.com |
strAddress1 |
500 Oracle Parkway |
strAddress2 |
|
strAddress3 |
|
strCity |
Redwood Shores |
strStateProv |
CA |
strPostalCode |
94065 |
strCountry |
94065 |
strContact |
Security Evaluations Manager |
strEmail |
seceval_us@oracle.com |
strPhone |
781-442-0451 |
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
2077 |
strModuleName |
Oracle Solaris Userland Cryptographic Framework |
strPartNumber |
Software Versions: 1.0 and 1.1 |
memModuleNotes |
When installed, initialized and configured as specified in the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Software |
strValidationDate |
02/06/2014 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Physical Security: N/A ;-Mitigation of Other Attacks: N/A ;;;-Operational Environment: Tested as meeting Level 1 with Oracle Solaris 11.1 running on a M3000 Enterprise Server; Oracle Solaris 11.1 running on a Sun Server X3-2 with PAA; Oracle Solaris 11.1 running on a Sun Server X3-2 without PAA (single-user mode) |
strFIPSAlgorithms |
AES (Certs. #2308 and #2569); Triple-DES (Certs. #1455 and #1556); RSA (Certs. #1191 and #1317); DSA (Certs. #726 and #785); ECDSA (Certs. #373 and #443); SHS (Certs. #1992 and #2165); HMAC (Certs. #1422 and #1586); RNG (Certs. #1150 and #1221) |
strOtherAlgorithms |
AES-XCBC-MAC (non-compliant); SHA-512/224 (non-compliant); SHA-512/256 (non-compliant); MD4; MD5; RC4; DES; Blowfish; RSA (key wrapping; key establishment methodology provides between 112 and 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The Oracle Solaris OS utilizes the Oracle Solaris Userland Cryptographic Framework module for cryptographic functionality for any applications running in user space. It exposes PKCS#11 APIs, uCrypto APIs, and libmd public interfaces to provide cryptography to any application designed to utilize them. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
02/06/14 00:00:00 |
strLabName |
CGI |
strValidationYear |
2014 |