Certificate 2699 - Oracle Solaris Userland Cryptographic Framework
intCertNum 2699
strVendorName Oracle Corporation
strURL http://www.oracle.com
strAddress1 500 Oracle Parkway
strAddress2
strAddress3
strCity Redwood Shores
strStateProv CA
strPostalCode 94065
strCountry 94065
strContact Joshua Brickman
strEmail seceval_us@oracle.com
strPhone 781-442-0451
strFax 781-442-0451
strContact2 Linda Gallops
strEmail2 seceval_us@oracle.com
strFax2 980-355-5399
strPhone2 704-972-5018
intCertNum 2699
strModuleName Oracle Solaris Userland Cryptographic Framework
strPartNumber Software Version: 1.3
memModuleNotes When installed, initialized and configured as specified in the Security Policy and operated in FIPS mode
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Software
strValidationDate 08/08/2016
intOverallLevel 1
memIndividualLevelNotes -Physical Security: N/A;-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A;-Operational Environment: Oracle Solaris 11.3 running on an Oracle SPARC T5-1B Server with PAA; Oracle Solaris 11.3 running on an Oracle SPARC T5-1B Server without PAA; Oracle Solaris 11.3 running on an Oracle SPARC T7-2 Server with PAA; Oracle Solaris 11.3 running on an Oracle SPARC T7-2 Server without PAA; Oracle Solaris 11.3 running on an Oracle Server X5-2 with PAA; Oracle Solaris 11.3 running on an Oracle Server X5-2 without PAA (single-user mode)
strFIPSAlgorithms AES (Cert. #3936);
Triple-DES (Cert. #2159);
RSA (Cert. #2011);
DSA (Cert. #1074);
ECDSA (Cert. #862);
SHS (Cert. #3245);
HMAC (Cert. #2558);
DRBG (Cert. #1143)
strOtherAlgorithms AES (non-compliant);
ECDSA (non-compliant);
HMAC (non-compliant);
SHS (non-compliant);
MD4;
MD5;
HMAC-MD5;
RC4;
DES;
Blowfish;
Camelia;
Triple-DES (non-compliant);
RSA (key wrapping;
key establishment methodology provides between 112 and 192 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 192 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength)
strConfiguration Multi-Chip Stand Alone
memModuleDescription The Oracle Solaris Userland Cryptographic Framework module provides cryptographic functionality for any application that calls into it. The module provides encryption, decryption, hashing, secure random number generation, signature generation and verification, certificate generation and verification, message authentication functions, and key pair generation for RSA and DSA. The module can leverage the algorithm acceleration from SPARC and x86 processors when available.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 08/08/16 00:00:00
strLabName CGI Information Systems and Management Consultants
strValidationYear 2016