intCertNum |
2699 |
strVendorName |
Oracle Corporation |
strURL |
http://www.oracle.com |
strAddress1 |
500 Oracle Parkway |
strAddress2 |
|
strAddress3 |
|
strCity |
Redwood Shores |
strStateProv |
CA |
strPostalCode |
94065 |
strCountry |
94065 |
strContact |
Joshua Brickman |
strEmail |
seceval_us@oracle.com |
strPhone |
781-442-0451 |
strFax |
781-442-0451 |
strContact2 |
Linda Gallops |
strEmail2 |
seceval_us@oracle.com |
strFax2 |
980-355-5399 |
strPhone2 |
704-972-5018 |
intCertNum |
2699 |
strModuleName |
Oracle Solaris Userland Cryptographic Framework |
strPartNumber |
Software Version: 1.3 |
memModuleNotes |
When installed, initialized and configured as specified in the Security Policy and operated in FIPS mode |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Software |
strValidationDate |
08/08/2016 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Physical Security: N/A;-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A;-Operational Environment: Oracle Solaris 11.3 running on an Oracle SPARC T5-1B Server with PAA; Oracle Solaris 11.3 running on an Oracle SPARC T5-1B Server without PAA; Oracle Solaris 11.3 running on an Oracle SPARC T7-2 Server with PAA; Oracle Solaris 11.3 running on an Oracle SPARC T7-2 Server without PAA; Oracle Solaris 11.3 running on an Oracle Server X5-2 with PAA; Oracle Solaris 11.3 running on an Oracle Server X5-2 without PAA (single-user mode) |
strFIPSAlgorithms |
AES (Cert. #3936); Triple-DES (Cert. #2159); RSA (Cert. #2011); DSA (Cert. #1074); ECDSA (Cert. #862); SHS (Cert. #3245); HMAC (Cert. #2558); DRBG (Cert. #1143) |
strOtherAlgorithms |
AES (non-compliant); ECDSA (non-compliant); HMAC (non-compliant); SHS (non-compliant); MD4; MD5; HMAC-MD5; RC4; DES; Blowfish; Camelia; Triple-DES (non-compliant); RSA (key wrapping; key establishment methodology provides between 112 and 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
strConfiguration |
Multi-Chip Stand Alone |
memModuleDescription |
The Oracle Solaris Userland Cryptographic Framework module provides cryptographic functionality for any application that calls into it. The module provides encryption, decryption, hashing, secure random number generation, signature generation and verification, certificate generation and verification, message authentication functions, and key pair generation for RSA and DSA. The module can leverage the algorithm acceleration from SPARC and x86 processors when available. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
08/08/16 00:00:00 |
strLabName |
CGI Information Systems and Management Consultants |
strValidationYear |
2016 |