From 73946634d706178e151fb2442157ca1651485a40 Mon Sep 17 00:00:00 2001 From: J08nY Date: Thu, 23 Dec 2021 19:55:30 +0100 Subject: Add tests for FIPS IUT/MIP stuff. --- .../fips_iut_2020-10-25T06+01:00.html | 1542 +++++++++ .../fips_iut_2021-12-10T06+01:00.html | 1781 ++++++++++ .../fips_mip_2020-10-24T06+02:00.html | 3035 +++++++++++++++++ .../fips_mip_2021-02-19T06+01:00.html | 2301 +++++++++++++ .../fips_mip_2021-12-19T06+01:00.html | 3413 ++++++++++++++++++++ tests/test_fips_iut.py | 24 + tests/test_fips_mip.py | 24 + 7 files changed, 12120 insertions(+) create mode 100644 tests/data/test_fips_iut/fips_iut_2020-10-25T06+01:00.html create mode 100644 tests/data/test_fips_iut/fips_iut_2021-12-10T06+01:00.html create mode 100644 tests/data/test_fips_mip/fips_mip_2020-10-24T06+02:00.html create mode 100644 tests/data/test_fips_mip/fips_mip_2021-02-19T06+01:00.html create mode 100644 tests/data/test_fips_mip/fips_mip_2021-12-19T06+01:00.html create mode 100644 tests/test_fips_iut.py create mode 100644 tests/test_fips_mip.py (limited to 'tests') diff --git a/tests/data/test_fips_iut/fips_iut_2020-10-25T06+01:00.html b/tests/data/test_fips_iut/fips_iut_2020-10-25T06+01:00.html new file mode 100644 index 00000000..3772661a --- /dev/null +++ b/tests/data/test_fips_iut/fips_iut_2020-10-25T06+01:00.html @@ -0,0 +1,1542 @@ + + + + + Cryptographic Module Validation Program | CSRC + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+
+ +

+ Computer Security Resource Center +

+

Computer Security Resource Center

+
+
+ +
+
+
+
+ +
+ + + + + + + +

Cryptographic Module Validation Program CMVP

+ +
+ + +
+ + + +
+
+ +
+
+ + +
+ +
+ +

Implementation Under Test List

+ + +

+ The IUT list is provided as a marketing service for vendors who have a viable contract with an accredited laboratory for the testing of a cryptographic module. The CMVP does not have detailed information about the specific cryptographic module or when the test report will be submitted to the CMVP for validation. When the lab submits the test report to the CMVP, the module will transition from the IUT list to the MIP list. If you would like more information about a specific cryptographic module or its schedule, please contact the vendor.
+  +

+ +

+ Last Updated: 10/23/2020 +

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Module NameVendor NameStandardIUT Date
ADVA CRYPTOMUX (MA-2C2C3LT-A) and CRYPTOMUX+ (MA-B2C3LT-A) encryption modulesADVA Optical Networking SEFIPS 140-27/16/2020
AMD Cryptographic Coprocessor (CCP) ModuleAdvanced Micro DevicesFIPS 140-39/25/2020
APACER SSD Drive SV240Apacer Technology Inc.FIPS 140-26/15/2020
Apple CoreCrypto Kernel Space Module for ARMApple Inc.FIPS 140-39/21/2020
Apple CoreCrypto Kernel Space Module for IntelApple Inc.FIPS 140-39/21/2020
Apple CoreCrypto User Space Module for ARMApple Inc.FIPS 140-39/21/2020
Apple CoreCrypto User Space Module for IntelApple Inc.FIPS 140-39/21/2020
Apple Secure Key Store Cryptographic Module, 11.0Apple Inc.FIPS 140-39/21/2020
Aruba 7280 Mobility Controller with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-211/27/2019
Aruba AP-318, AP-374, AP-375, AP-377 and AP-387 Series Wireless Access Points with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-211/27/2019
Sansec HSMBeijing Sansec Technology Development Co., LtdFIPS 140-23/22/2020
PTP 820C, PTP 820C-HP, PTP 820C 2E2SX, PTP 820S, PTP 820N, PTP 820A, PTP 820G, PTP 820GX, PTP 850ECambium Networks, Ltd.FIPS 140-25/15/2020
FibeAir® IP-20C, FibeAir® IP-20C-HP, FibeAir® IP-20C 2E2SX, FibeAir® IP-20S, FibeAir® IP-20N, FibeAir® IP-20A, FibeAir® IP-20G, FibeAir® IP-20GX, FibeAir® IP-50ECeragon Networks, Ltd.FIPS 140-25/15/2020
Check Point Cryptographic LibraryCheck Point Software TechnologiesFIPS 140-24/2/2020
Cisco Aironet 1562e/i/d/ps, 2802e/i, 3802e/i/p, 4800 & IW6300H-AC/DC/DCW LAN Access pointsCisco Systems, IncFIPS 140-28/6/2020
Cisco 8000 Series RoutersCisco Systems, Inc.FIPS 140-22/9/2020
Cisco Aironet 9115AXI/AXE, 9120AXI/AXE/AXP, 9130 AXI/AXE and 9105 AXI/AXE Wireless LAN Access PointsCisco Systems, Inc.FIPS 140-28/10/2020
Cisco ASR 9000 Aggregated Services RoutersCisco Systems, Inc.FIPS 140-28/17/2020
Cisco Catalyst Embedded Wireless Controller on Access Point IOS XE 16.12Cisco Systems, Inc.FIPS 140-21/23/2020
CliniComp Data Acquisition Cryptographic ModuleCliniComp, Intl.FIPS 140-23/18/2020
CloudGenix Inc. ControllerCloudGenix Inc.FIPS 140-29/26/2019
CloudGenix Inc. Instant-On Networks (ION) devices ION 2000, ION 3000, and ION 7000CloudGenix Inc.FIPS 140-29/26/2019
Ruckus ICX 7150, 7250, 7750 Series Switch/RouterCommScope Technologies LLCFIPS 140-28/20/2020
Ruckus ICX 7450 Series Switch/RouterCommScope Technologies LLCFIPS 140-28/20/2020
Ruckus ICX 7550 Series Switch/RouterCommScope Technologies LLCFIPS 140-28/13/2020
Ruckus ICX 7650 Series Switch/RouterCommScope Technologies LLCFIPS 140-28/20/2020
Ruckus ICX 7850 Series Switch/RouterCommScope Technologies LLCFIPS 140-28/13/2020
Ruckus Networks SmartZone 144 (SZ144) and SmartZone 300 (SZ300) WLAN ControllersCommScope Technologies LLCFIPS 140-28/9/2020
Ruckus Networks Virtual SmartZone - Data Plane (vSZ-D)CommScope Technologies LLCFIPS 140-28/17/2020
Ruckus Networks Virtual SmartZone (vSZ) WLAN ControllerCommScope Technologies LLCFIPS 140-28/17/2020
Ruckus R610 Access Point, R720 Access Point, T610s Access Point, T710s Access Point, R650 Access Point, R750 Access Point and T750se Access PointCommScope Technologies LLCFIPS 140-28/6/2020
Comtech Systems Corporation CS67PLUS Cryptographic Module (CCM)Comtech Systems, Inc.FIPS 140-27/30/2020
Crypto4A QASMCrypto4A Technologies Inc.FIPS 140-27/10/2019
Vocality RoIP and DTECH M3/M3X Multi-Function Gateway AppliancesCubic CorporationFIPS 140-212/2/2019
CyberCogs HSMCyberCogs Inc.FIPS 140-29/30/2020
CYB06445LQI-S3D42 and CYS0644ABZI-S2D44Cypress SemiconductorFIPS 140-22/3/2020
BSAFE Crypto-C Micro EditionDell EMCFIPS 140-27/27/2020
DINAMO CD, XP, and ST Hardware Security ModulesDINAMO Networks, Inc.FIPS 140-212/18/2019
DINAMO Pocket Hardware Security ModuleDINAMO Networks, Inc.FIPS 140-212/18/2019
Distech Java Cryptographic ModuleDistech Controls Inc.FIPS 140-24/3/2020
Distech SSL Cryptographic ModuleDistech Controls Inc.FIPS 140-24/3/2020
DocuSign QSCD ApplianceDocuSign, Inc.FIPS 140-29/4/2020
MS1200eWBMFIPS 140-25/30/2019
Cryptographic Module for BIG-IP (R)F5 NetworksFIPS 140-24/24/2020
F5(R) vCMP Cryptographic ModuleF5 NetworksFIPS 140-24/24/2020
F5(R) Device Cryptographic ModuleF5 Networks, IncFIPS 140-24/24/2020
Annapurna NVMe SSDFADU, Inc.FIPS 140-25/3/2019
FortiAnalyzer 6.2Fortinet, Inc.FIPS 140-28/17/2020
FortiClient 6.4 for WindowsFortinet, Inc.FIPS 140-29/10/2020
FortiGate-600D/1200D/1500D/3000D/3700D and FortiGate-5001D with FortiGate-5144C ChassisFortinet, Inc.FIPS 140-29/25/2019
FortiManager 6.2Fortinet, Inc.FIPS 140-28/17/2020
FortiSandbox-1000F/2000E/3000EFortinet, Inc.FIPS 140-27/6/2020
SafeNet Luna Backup HSM Cryptographic ModuleGemalto, a Thales CompanyFIPS 140-21/29/2020
HUB Multipurpose HSM ArchitectureHUB SecurityFIPS 140-211/15/2019
Hughes HT2010 Satellite TerminalHughes Network Systems, LLCFIPS 140-28/17/2020
Hughes HT2300, HT2500, HT2550, HT2650 Satellite TerminalsHughes Network Systems, LLCFIPS 140-28/17/2020
Hughes IP GatewayHughes Network Systems, LLCFIPS 140-28/17/2020
Hypersecu ServSec HSM Cryptographic ModuleHypersecu Information Systems IncFIPS 140-26/11/2019
HyTrust CloudControl (TM) Cryptographic ModuleHyTrust, Inc.FIPS 140-29/10/2019
HyTrust KeyControl Cryptographic ModuleHyTrust, Inc.FIPS 140-29/10/2019
IBM TS1160 Tape DriveIBM CorporationFIPS 140-28/6/2019
IBM(R) Security QRadar(R) Cryptographic Security KernelIBM CorporationFIPS 140-25/7/2018
Infoblox Trinzic DDI Appliances TE-805, TE-825, TR-805, ND-805, TE-1415, TE-1425, TR-1405, ND-1405, TE-2215, TE-2225, TR-2205, ND-2205, TE-4015, TE-4025, TR-4005, NE-4005InfobloxFIPS 140-210/13/2020
Infoblox Trinzic Virtual DDI applianceInfobloxFIPS 140-210/13/2020
Intel(R) Converged Security Engine for Tiger Lake, Rocket Lake, and Elkhart LakeIntel CorporationFIPS 140-25/27/2020
Intel(R) CSE hybrid module for Tiger Lake, Rocket Lake, and Elkhart LakeIntel CorporationFIPS 140-25/27/2020
Intel® Optane™ SSD DC D5800XIntel CorporationFIPS 140-39/26/2020
IQVIA Java Crypto ModuleIQVIAFIPS 140-24/14/2020
Juniper Networks ACX5448-M RoutersJuniper NetworksFIPS 140-28/31/2020
Juniper Networks EX4650, QFX5120, QFX5200 and QFX5210 Ethernet SwitchesJuniper NetworksFIPS 140-29/25/2020
Juniper Networks NFX350 Network Services PlatformJuniper Networks, Inc.FIPS 140-210/10/2020
LogRhythm 7.4.8 AI EngineLogRhythmFIPS 140-210/21/2020
LogRhythm 7.4.8 Client ConsoleLogRhythmFIPS 140-210/21/2020
LogRhythm 7.4.8 Data ProcessorLogRhythmFIPS 140-210/21/2020
LogRhythm 7.4.8 Platform ManagerLogRhythmFIPS 140-210/21/2020
LogRhythm 7.4.8 System Monitor AgentLogRhythmFIPS 140-210/21/2020
LogRhythm 7.6 Data Indexer (Linux)LogRhythmFIPS 140-210/21/2020
McAfee Core Crypto OpenSSL Module (user)McAfee LLCFIPS 140-28/4/2019
McAfee Core Cryptographic Module (kernel)McAfee LLCFIPS 140-28/4/2019
McAfee Core Cryptographic Module (user)McAfee LLCFIPS 140-28/4/2019
Network Security Platform Sensor NS7500McAfee, LLCFIPS 140-28/23/2020
Microchip Trust Anchor TA100Microchip Technology IncFIPS 140-24/29/2020
NV-2108 Flashtec PCIe NVRAM DriveMicrochip Technology, Inc.FIPS 140-27/23/2020
Code Integrity in Windows 10 and Windows Server version 2004Microsoft CorporationFIPS 140-26/1/2020
Cryptographic Primitives Library in Windows 10 and Windows Server version 2004Microsoft CorporationFIPS 140-26/1/2020
Kernel Mode Cryptographic Primitives Library in Windows 10 and Windows Server version 2004Microsoft CorporationFIPS 140-26/1/2020
Secure Kernel Code Integrity in Windows 10 and Windows Server version 2004Microsoft CorporationFIPS 140-26/1/2020
Command Encryption ModuleMitsubishi Space Software Co., Ltd.FIPS 140-22/10/2020
Monaco Communication Cryptographic Module 1.0Monaco Enterprises Inc.FIPS 140-210/15/2020
NetApp CryptoModNetApp, Inc.FIPS 140-25/15/2020
7705 SAR-OS SAR-A/M Cryptographic Module (SARCM)Nokia CorporationFIPS 140-28/13/2020
SR-OS Cryptographic ModuleNokia CorporationFIPS 140-28/13/2020
Nuvoton Cryptographic Library 2.0Nuvoton Technology CorporationFIPS 140-310/1/2020
OpenSSL FIPS Provider 3.0OpenSSL Software Services Inc.FIPS 140-210/20/2020
Oracle Linux 7 GnuTLS Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 7 libgcrypt Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 7 Libreswan Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 7 NSS Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 7 OpenSSH Client Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 7 OpenSSH Server Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 7 OpenSSL Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 7 Unbreakable Enterprise Kernel (UEK5) Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 8 GnuTLS Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 8 libgcrypt Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 8 NSS Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 8 OpenSSL Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 8 Unbreakable Enterprise Kernel (UEK6) Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Solaris Kernel Cryptographic Framework (kCF)Oracle CorporationFIPS 140-27/10/2019
Oracle Solaris Userland Cryptographic Framework (uCF)Oracle CorporationFIPS 140-27/10/2019
osn_cryptolibOSNexus CorporationFIPS 140-29/10/2019
Capri 1.0Pensando Systems, IncFIPS 140-210/18/2019
Pensando TLS LibraryPensando Systems, IncFIPS 140-210/23/2020
Purity Encryption ModulePure Storage, Inc.FIPS 140-28/19/2020
Qumulo SecureQumulo, Inc.FIPS 140-28/28/2020
CryptoManager Root of Trust (CMRT)Rambus Inc.FIPS 140-25/12/2020
Riverbed Cryptographic module (VN) for BranchRiverbed Technology, Inc.FIPS 140-29/27/2020
Riverbed Cryptographic module (VN) for ControllerRiverbed Technology, Inc.FIPS 140-29/27/2020
SAAB Encrypted Automatic Identification System Cryptographic Module (EAISCM)Saab AB (publ) TransponderTech (SAAB)FIPS 140-210/16/2020
CN Series EncryptorsSenetas Corporation Ltd., distributed by Thales SA (SafeNet)FIPS 140-25/4/2020
CN6000 Series EncryptorsSenetas Corporation Ltd., distributed by Thales SA (SafeNet)FIPS 140-25/4/2020
Taglio PIV Applet on NXP JCOP 3 SecID P60 CS (OSB)TaglioFIPS 140-24/6/2020
Trulink Control Logic Module CL6792-M1Telephonics CorporationFIPS 140-21/2/2020
Trulink Control Logic Module CL6882-M1Telephonics CorporationFIPS 140-21/2/2020
Tera2 PCoIP Zero Client ProcessorsTeradici CorporationFIPS 140-21/28/2020
Thales ProtectServer PCIe HSM 3ThalesFIPS 140-26/23/2020
TW-900/950 TSM Shadow and TW-870/875 TSM GhostTrellisWare Technologies, Inc.FIPS 140-28/8/2019
Trend Micro Endpoint Encryption Cryptographic ModuleTrend Micro, Inc.FIPS 140-26/4/2020
AN/GRC-262Ultra Electronics TCS Inc.FIPS 140-27/8/2019
Uplogix Model 500, 5000, LM80, LM83XUplogix, Inc.FIPS 140-25/18/2020
RAD X-1040 AES-256Vcinity, Inc.FIPS 140-27/30/2020
Versa Networks BranchVersa Networks, Inc.FIPS 140-26/8/2020
Versa Networks ControllerVersa Networks, Inc.FIPS 140-26/8/2020
VirtruCrypto - FIPS JavaScript ModuleVirtru CorporationFIPS 140-26/11/2020
Vocera Cryptographic ModuleVocera Communications, Inc.FIPS 140-26/18/2020
WatchKey ProX USB Token Cryptographic ModuleWatchData Technologies Pte LtdFIPS 140-27/28/2020
Ultrastar® DC HC550 - Western Digital®Western Digital CorporationFIPS 140-26/12/2020
Ultrastar® DC SN840 - Western Digital®Western Digital CorporationFIPS 140-26/12/2020
Ultrastar® He¹² and Ultrastar® DC HC 520 TCG Enterprise HDDWestern Digital CorporationFIPS 140-29/2/2020
Ultrastar® He¹º and Ultrastar® DC HC510 TCG Enterprise HDDWestern Digital CorporationFIPS 140-29/2/2020
XCrypt Full DiskZettaset, Inc.FIPS 140-28/13/2020
Displayed: 140
Not Displayed: 1
Total: 141
+ + +
+ + + + +
+
+ + + +
+ +
+
+ + Created October 11, 2016, Updated October 16, 2020 +
+
+ + + + + + +
+ + + + + + + + + + + + + + diff --git a/tests/data/test_fips_iut/fips_iut_2021-12-10T06+01:00.html b/tests/data/test_fips_iut/fips_iut_2021-12-10T06+01:00.html new file mode 100644 index 00000000..1f2f7200 --- /dev/null +++ b/tests/data/test_fips_iut/fips_iut_2021-12-10T06+01:00.html @@ -0,0 +1,1781 @@ + + + + + Cryptographic Module Validation Program | CSRC + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+ + U.S. flag +   + An official website of the United States government + + +
+
+
+
+
+
+ Dot gov +
+
+

+ Official websites use .gov +
+ A .gov website belongs to an official government organization in the United States. +

+
+
+
+
+
+
+ Https +
+
+

+ Secure .gov websites use HTTPS +
+ A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. +

+
+
+
+
+
+
+
+ + + +
+
+
+
+ +

+ Computer Security Resource Center +

+

Computer Security Resource Center

+
+
+ +
+
+
+
+ +
+ + + + + + + + +

Cryptographic Module Validation Program CMVP

+ +
+ + +
+ + + +
+
+ +
+
+ + +
+ +
+ +

Implementation Under Test List

+ + +

+ The IUT list is provided as a marketing service for vendors who have a viable contract with an accredited laboratory for the testing of a cryptographic module. The CMVP does not have detailed information about the specific cryptographic module or when the test report will be submitted to the CMVP for validation. When the lab submits the test report to the CMVP, the module will transition from the IUT list to the MIP list. If you would like more information about a specific cryptographic module or its schedule, please contact the vendor.
+  +

+ +

+ Last Updated: 12/9/2021 +

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Module NameVendor NameStandardIUT Date
3e-520 Secure Access Point Cryptographic Module3e Technologies International, Inc.FIPS 140-27/2/2021
3e-636M-HSE CyberFence Cryptographic Module3e Technologies International, Inc.FIPS 140-27/2/2021
ADVA CRYPTOMUX (MA-2C2C3LT-A) and CRYPTOMUX+ (MA-B2C3LT-A) encryption modulesADVA Optical Networking SEFIPS 140-27/16/2020
Infraguard Processor Module (I.P.M.)Advantor Systems L.L.C.FIPS 140-212/18/2020
AWS Cryptographic ModuleAmazon Web Services Inc.FIPS 140-36/3/2021
TuffServ® Encryption ModuleAmpex Data Systems CorporationFIPS 140-33/1/2021
APACER SSD Drive SV240Apacer Technology Inc.FIPS 140-26/15/2020
Apple corecrypto Module v11.1 [Apple silicon, Secure Key Store, Hardware, SL2/PHY3]Apple Inc.FIPS 140-36/2/2021
Apple corecrypto Module v11.1 [Apple silicon, Secure Key Store, Hardware]Apple Inc.FIPS 140-39/21/2020
Apple corecrypto Module v12.0 [Intel, Kernel, Software, SL1]Apple Inc.FIPS 140-34/5/2021
Apple corecrypto Module v12.0 [Intel, User, Software, SL1]Apple Inc.FIPS 140-34/5/2021
Arista CloudEOS Router ModuleArista Networks, Inc.FIPS 140-310/20/2021
Arista CloudVision Portal ModuleArista Networks, Inc.FIPS 140-310/20/2021
Arista MACsec Charlie Hybrid ModuleArista Networks, Inc.FIPS 140-312/30/2020
Aruba AOS-CX Cryptographic ModuleAruba, a Hewlett Packard Enterprise companyFIPS 140-212/11/2020
Aruba Common Crypto ModuleAruba, a Hewlett Packard Enterprise companyFIPS 140-23/10/2021
Aruba IAP-315, IAP-345, IAP-377, IAP-503R, IAP-505H, IAP-504, IAP-505, IAP-514, IAP-515, IAP-534, IAP-535, and IAP-555 Access Points with Aruba Instant FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-24/19/2021
Avaya G430Avaya Inc.FIPS 140-211/23/2020
Avaya G450Avaya Inc.FIPS 140-211/23/2020
Brocade Fabric OS FIPS Cryptographic ModuleBrocade Communications Systems LLCFIPS 140-34/7/2021
PTP 820C, PTP 820C-HP, PTP 820S, PTP 820G, PTP 820N, PTP 820A, PTP 850E, PTP 850C, PTP 850SCambium NetworksFIPS 140-31/27/2021
PTP 700 Point to Point Wireless Ethernet BridgeCambium Networks, Ltd.FIPS 140-310/22/2021
FibeAir® IP-20C, FibeAir® IP-20C-HP, FibeAir® IP-20S, FibeAir® IP-20G, FibeAir® IP-20N, FibeAir® IP-20A, FibeAir® IP-50E, FibeAir® IP-50C, FibeAir® IP-50SCeragon NetworksFIPS 140-31/28/2021
3926-MACSECCiena CorporationFIPS 140-25/4/2021
Ciena WaveLogic 5 Extreme ModemCiena CorporationFIPS 140-34/30/2021
Ciena Waveserver 5 CP ModuleCiena CorporationFIPS 140-34/30/2021
Cisco Linux Kernel FIPS Object Module (KFOM) Cryptographic ModuleCisco System, IncFIPS 140-36/7/2021
Cisco Catalyst 9800 (40/80) Wireless ControllersCisco Systems, IncFIPS 140-212/4/2020
Cisco Catalyst 9800-CL Wireless ControllerCisco Systems, IncFIPS 140-212/4/2020
Cisco Catalyst Embedded Wireless ControllersCisco Systems, IncFIPS 140-212/21/2020
Cisco Adaptive Security Appliance (ASA) Cisco Systems, Inc.FIPS 140-33/12/2021
Cisco Adaptive Security Appliance Virtual (ASAv) Cisco Systems, Inc.FIPS 140-33/12/2021
Cisco ASA Cryptographic Module on 4K/9KCisco Systems, Inc.FIPS 140-33/12/2021
Cisco ASA FX-OS Cryptographic ModuleCisco Systems, Inc.FIPS 140-33/3/2021
Cisco ASR 9000 Aggregated Services RoutersCisco Systems, Inc.FIPS 140-28/17/2020
Cisco Catalyst 8300 Series Edge PlatformsCisco Systems, Inc.FIPS 140-21/14/2021
Cisco Catalyst 8500 Series Edge PlatformsCisco Systems, Inc.FIPS 140-21/14/2021
Cisco FIPS Object ModuleCisco Systems, Inc.FIPS 140-38/31/2021
Cisco Firepower Management Center (FMC) VirtualCisco Systems, Inc.FIPS 140-33/12/2021
Cisco Firepower Next-Generation IPS Virtual (NGIPSv) Cisco Systems, Inc.FIPS 140-33/12/2021
Cisco Firepower Threat Defense (FTD) and FX-OS on the FPR 1K and FPR 2K ApplianceCisco Systems, Inc.FIPS 140-33/5/2021
Cisco Firepower Threat Defense (FTD) on ASA/ISA Cryptographic ModuleCisco Systems, Inc.FIPS 140-35/24/2021
Cisco Firepower Threat Defense (FTD) VirtualCisco Systems, Inc.FIPS 140-33/12/2021
Cisco Firepower Threat Defense on 4K/9K Cryptographic ModuleCisco Systems, Inc.FIPS 140-33/12/2021
Cisco FX-OS Cryptographic Module on 4K/9KCisco Systems, Inc.FIPS 140-33/12/2021
Cisco FX-OS on 4K/9K Cryptographic ModuleCisco Systems, Inc.FIPS 140-33/12/2021
Cloudpath Enrollment Server (ES)CommScope Technologies LLCFIPS 140-27/6/2021
Port Authority SeriesCommunication Devices, Inc.FIPS 140-33/19/2021
Compunetix Evergreen MCUCompunetix, Inc.FIPS 140-212/14/2020
Cryptographic ModuleComtech EF Data CorporationFIPS 140-212/10/2020
Comtech Systems Corporation CS67PLUS Cryptographic Module (CCM)Comtech Systems, Inc.FIPS 140-27/30/2020
CorSSL™ Corsec Security, Inc.FIPS 140-38/7/2021
cVu 16100 Network Packet BrokercPacket Networks, Inc.FIPS 140-26/16/2021
Cradlepoint Cryptographic ModuleCradlepoint, Inc.FIPS 140-310/20/2021
Cradlepoint Kernel Cryptographic ModuleCradlepoint, Inc.FIPS 140-312/1/2021
Cyphre Crypto CoreCyphre Security Solutions LLC (A Rignet Company)FIPS 140-310/29/2020
Dell BSAFE Crypto Module for C, v3.0Dell Inc., BSAFE Product TeamFIPS 140-39/17/2021
Dell BSAFE Crypto Module 2.0Dell Inc., BSAFE Product TeamFIPS 140-311/16/2020
Dell BSAFE Crypto Module for Java, v7.0Dell Inc., BSAFE Product TeamFIPS 140-39/22/2021
Dell Crypto Library for Dell iDRAC, Dell CMC and DellOME-MDell, Inc.FIPS 140-29/22/2021
DocuSign HSM ApplianceDocuSign, Inc.FIPS 140-29/22/2021
DocuSign QSCD ApplianceDocuSign, Inc.FIPS 140-29/4/2020
DocuSign Signature ApplianceDocuSign, Inc.FIPS 140-29/22/2021
Dynatrace Cryptographic ModuleDynatrace LLCFIPS 140-38/27/2021
Kenwood Cryptographic Library (KCL)EF Johnson TechnologiesFIPS 140-35/19/2021
nShield 5s F3 & nShield 5s for nShield 5c and for nShield HSMiEntrustFIPS 140-310/20/2021
ExtraHop Cryptographic ModuleExtraHop NetworksFIPS 140-38/19/2021
Annapurna NVMe SSDFADU, Inc.FIPS 140-211/4/2020
Forcepoint Next Generation FirewallForcepoint FIPS 140-36/22/2021
Forcepoint NGFW Cryptographic Kernel ModuleForcepoint FIPS 140-36/22/2021
Fornetix VaultCoreFornetix LLCFIPS 140-25/11/2021
Fortanix Data Security ManagerFortanix, Inc.FIPS 140-25/27/2021
FortiClient 7.0 for WindowsFortinet, Inc.FIPS 140-29/10/2020
FortiGate 6000 Series with FortiOS 6.4Fortinet, Inc.FIPS 140-26/16/2021
FortiGate Appliances with FortiOS 6.4 & 7.0Fortinet, Inc.FIPS 140-23/29/2021
FortiGate-VM v6.4 & v7.0Fortinet, Inc.FIPS 140-23/29/2021
FortiOS 6.4 & 7.0Fortinet, Inc.FIPS 140-23/29/2021
FortiSwitch E series with OS v7.0Fortinet, Inc.FIPS 140-26/16/2021
FunOS Crypto ModuleFungible Inc.FIPS 140-23/22/2021
Secure EnclaveFungible Inc.FIPS 140-23/22/2021
Raven Cryptographic ModuleGoogle LLC.FIPS 140-32/10/2021
Android Kernel Cryptographic ModuleGoogle, LLCFIPS 140-210/28/2020
Cr50 U2FGoogle, LLCFIPS 140-25/20/2021
Google Tensor UFS Inline Storage EncryptionGoogle, LLCFIPS 140-29/14/2021
iLO 5 Cryptographic ModuleHewlett Packard Enterprise Development LPFIPS 140-210/28/2020
Hughes HT2010 Satellite TerminalHughes Network Systems, LLCFIPS 140-28/17/2020
Hughes HT2300, HT2500, HT2550, HT2650 Satellite TerminalsHughes Network Systems, LLCFIPS 140-28/17/2020
Hypersecu ServSec HSM Cryptographic ModuleHypersecu Information Systems IncFIPS 140-29/8/2021
IBM 4769-001 Enterprise PKCS#11 HSMIBMFIPS 140-28/2/2021
IBM 4770-001 Cryptographic Coprocessor Security ModuleIBMFIPS 140-312/3/2021
IBM 4770-001 Enterprise PKCS#11 HSMIBMFIPS 140-28/2/2021
IBM Cloud Object Storage System’s ™ FIPS Cryptographic ModuleIBMFIPS 140-26/25/2021
Qradar SIEM CoreIBMFIPS 140-24/5/2021
IBM® NVMe FlashCore™ Module 2IBM® CorporationFIPS 140-36/22/2021
UT-125 FIPS #31 and UT-125 FIPS #41 Cryptographic ModulesIcom Inc.FIPS 140-311/24/2020
TRANSEC ModuleiDirect Government, LLCFIPS 140-26/29/2021
SEMPER Secure NOR Flash (S35HS256T, S35HL256T)Infineon Technologies LLC - Memory SolutionsFIPS 140-311/15/2021
Infoblox Trinzic DDI Appliances TE-815, TE-825, TR-805, ND-805, TE-1415, TE-1425, TR-1405, ND-1405, TE-2215, TE-2225, TR-2205, ND-2205, TE-4015, TE-4025, TR-4005, ND-4005InfobloxFIPS 140-210/13/2020
Infoblox Trinzic Virtual DDI applianceInfobloxFIPS 140-210/13/2020
Intel® Optane™ Persistent Memory 300 Series Intel CorporationFIPS 140-310/26/2021
Intel® Optane™ SSD DC D5800XIntel CorporationFIPS 140-39/26/2020
Intel® SSD DC P5316Intel CorporationFIPS 140-33/25/2021
Intel® SSD DC P5520Intel CorporationFIPS 140-33/25/2021
Juniper Networks MX10003 3D Universal Edge Router with MACSec MIC and EX9253 Ethernet Switch with MACSec Line CardJuniper Networks, Inc.FIPS 140-26/22/2021
Juniper Networks MX240, MX480 and MX960 series with Macsec card MPC10E-10C and MPC10E-15CJuniper Networks, Inc.FIPS 140-211/9/2020
Juniper Networks SRX1500, SRX4100, SRX4200, SRX4600, SRX5400, SRX5600 and SRX5800 Services GatewayJuniper Networks, Inc.FIPS 140-25/28/2021
Juniper Networks vSRX 3.0 Virtual FirewallJuniper Networks, Inc.FIPS 140-24/28/2021
MX10003 3D Universal Edge Router with JNP-MIC1-MACSEC MICJuniper Networks, Inc.FIPS 140-210/5/2021
MX2010 ,MX2020 with REMX2K-X8-64G , RE-S-1800 Routing Engines, MPC9E with MIC-MACSEC-MRATEJuniper Networks, Inc.FIPS 140-210/5/2021
MX240, MX480, MX960 3D Universal Edge Routers with RE-S-X6-64G and RE1800 Routing Engines with macsec capable MPC MPC7E-10GEJuniper Networks, Inc.FIPS 140-210/5/2021
NFX150, NFX250, NFX350 Series JUNOS 21.4R1 FIPSJuniper Networks, Inc.FIPS 140-210/5/2021
PTX1000 Packet Transport RouterJuniper Networks, Inc.FIPS 140-210/5/2021
PTX10008 and PTX10016 packet transport routers with routing Engine JNP10K-RE0 and Macsec linecard LC1105-MJuniper Networks, Inc.FIPS 140-210/5/2021
KIOXIA TCG OPAL SSC Self-Encrypting Solid State Drive XD6 SeriesKIOXIA CorporationFIPS 140-32/26/2021
BC-FJA (Bouncy Castle FIPS Java API)Legion of the Bouncy Castle Inc.FIPS 140-33/2/2021
LogRhythm 7.6 Data Indexer (Linux)LogRhythmFIPS 140-210/21/2020
McAfee OpenSSL FIPS Object ModuleMcAfee LLCFIPS 140-26/4/2021
Boot Manager (Windows 10 version 21H1, Windows Server 2022, et al.)Microsoft CorporationFIPS 140-26/10/2021
Cryptographic Primitives Library (Windows 10 and Windows Server version 20H2)Microsoft CorporationFIPS 140-26/10/2021
Cryptographic Primitives Library (Windows 10 version 21H1, Windows Server 2022, et al.)Microsoft CorporationFIPS 140-26/10/2021
Cryptographic Primitives Library (Windows Server 2019 Standard, Windows Server 2019 Datacenter)Microsoft CorporationFIPS 140-26/10/2021
Kernel Mode Cryptographic Primitives Library (Windows 10 and Windows Server version 20H2)Microsoft CorporationFIPS 140-26/10/2021
Kernel Mode Cryptographic Primitives Library (Windows 10 version 21H1, Windows Server 2022, et al.)Microsoft CorporationFIPS 140-26/10/2021
Kernel Mode Cryptographic Primitives Library (Windows Server 2019 Standard, Windows Server 2019 Datacenter)Microsoft CorporationFIPS 140-26/10/2021
Motorola Solutions Cryptographic Firmware ModuleMotorola Solutions, Inc.FIPS 140-310/25/2021
NetApp Cryptographic Security ModuleNetApp, IncFIPS 140-28/24/2021
NextFlex AirGuardianNextFlexFIPS 140-210/28/2021
Digipass GO7OneSpan, Inc.FIPS 140-26/30/2021
Acme Packet 1100, Acme Packet 3900, Acme Packet 3950, and Acme Packet 4900 (v9.0)Oracle CommunicationsFIPS 140-24/15/2021
Acme Packet 4600 and Acme Packet 6350 (v9.0)Oracle CommunicationsFIPS 140-24/15/2021
Acme Packet VME (v9.0)Oracle CommunicationsFIPS 140-24/15/2021
Oracle Linux 7 GnuTLS Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle Linux 7 libgcrypt Cryptographic ModuleOracle CorporationFIPS 140-29/24/2020
Oracle OpenSSL FIPS ProviderOracle CorporationFIPS 140-210/7/2021
Tablo Medical Informatics SystemOutset Medical, Inc.FIPS 140-311/5/2021
Panorama 10.1 running on M-200, M-500 and M-600Palo Alto Networks, Inc.FIPS 140-36/10/2021
Panorama 10.1 Virtual AppliancesPalo Alto Networks, Inc.FIPS 140-36/10/2021
PAN-OS 10.1 running on PA-220, PA-220R, PA-400 Series, PA-800 Series, PA-3200 Series, PA-5200 Series, PA-5450 and PA-7000 Series NGFWsPalo Alto Networks, Inc.FIPS 140-36/10/2021
PAN-OS 10.1 VM-SeriesPalo Alto Networks, Inc.FIPS 140-36/10/2021
WildFire 10.1 running on WF-500Palo Alto Networks, Inc.FIPS 140-36/10/2021
Pensando TLS LibraryPensando Systems, IncFIPS 140-210/23/2020
Privoro SafeCase Cryptographic ModulePrivoro LLCFIPS 140-32/12/2021
FlashBlade Data Encryption ModulePure Storage, Inc.FIPS 140-312/3/2020
Rambus CryptoManager Root of Trust RT-660Rambus Inc.FIPS 140-37/11/2021
Rambus Root of Trust RT-130Rambus Inc.FIPS 140-37/11/2021
SafeZone FIPS Cryptographic Module 2.0 Rambus, Inc.FIPS 140-34/5/2021
SBC Software Edition Session Border Controller v9.2Ribbon Communications, Inc.FIPS 140-39/7/2021
Riverbed Cryptographic module (VN) for BranchRiverbed Technology, Inc.FIPS 140-29/27/2020
Riverbed Cryptographic module (VN) for ControllerRiverbed Technology, Inc.FIPS 140-29/27/2020
CryptoComplySafeLogicFIPS 140-34/2/2021
Samsung NVMe TCG Opal SSC SEDs BM1733a SeriesSamsung Electronics Co., Ltd.FIPS 140-34/8/2021
Seagate Secure™ TCG Enterprise SSC Self-Encrypting HDDSeagate Technology, LLCFIPS 140-31/11/2021
Seagate Secure™ TCG Opal SSC Self-Encrypting HDDSeagate Technology, LLCFIPS 140-31/11/2021
Sepior TSMSepior ApSFIPS 140-310/29/2020
Silver Peak EdgeConnect EC-XS-FIPS, EC-XL-P-FIPS, and EC-XL-P-NM-FIPS 2021Silver Peak Systems Inc.FIPS 140-26/22/2021
SonicWall Network Security Manager ApplianceSonicWall, Inc.FIPS 140-29/9/2021
SPYRUS USB-3 ModuleSPYRUS, Inc.FIPS 140-26/17/2021
Symantec Management CenterVirtual ApplianceSymantec & CA Technologies, a division of BroadcomFIPS 140-27/14/2021
Tera2 PCoIP Zero Client ProcessorsTeradici CorporationFIPS 140-28/31/2021
Luna G7 Cryptographic ModuleThalesFIPS 140-32/23/2021
Thales CipherTrust Application Data Protection CryptoAPI (CADP CryptoAPI) ModuleThalesFIPS 140-22/22/2021
Advanced Configurable Cryptographic Environment (ACCE) v3 HSM Crypto ModuleUltra, Intelligence & CommunicationsFIPS 140-28/16/2021
Advanced Configurable Cryptographic Environment (ACCE) v3 HSM Crypto ModuleUltra, Intelligence & CommunicationsFIPS 140-25/19/2021
Unbound Multi-Party Cryptographic ModuleUnbound Security Inc.FIPS 140-312/15/2020
Unbound Multi-Party Cryptographic ModuleUnbound Security Inc.FIPS 140-312/15/2020
Vehicle Data DeviceVerizon ConnectFIPS 140-22/2/2021
VMware's VMkernel Cryptographic ModuleVMware, Inc.FIPS 140-211/20/2020
Firebox M290, M390, M590, M690, M4800, M5800WatchGuard Technologies, Inc.FIPS 140-38/5/2021
Firebox T20, T20-W, T40, T40-W, T40-CW, T80WatchGuard Technologies, Inc.FIPS 140-38/5/2021
Ultrastar® DC HC550 - Western Digital®Western Digital CorporationFIPS 140-26/12/2020
wolfCryptwolfSSL Inc.FIPS 140-310/30/2020
Zetetic Cryptographic ModuleZetetic, LLCFIPS 140-37/28/2021
XCrypt Full DiskZettaset, Inc.FIPS 140-28/13/2020
Displayed173
Not Displayed2
Total175
+ + +
+ + + + +
+
+ + + +
+ +
+
+ + Created October 11, 2016, Updated December 06, 2021 +
+
+ + + + + + +
+ + + + + + + + + + + + + + + + + + diff --git a/tests/data/test_fips_mip/fips_mip_2020-10-24T06+02:00.html b/tests/data/test_fips_mip/fips_mip_2020-10-24T06+02:00.html new file mode 100644 index 00000000..113017c8 --- /dev/null +++ b/tests/data/test_fips_mip/fips_mip_2020-10-24T06+02:00.html @@ -0,0 +1,3035 @@ + + + + + Cryptographic Module Validation Program | CSRC + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+
+ +

+ Computer Security Resource Center +

+

Computer Security Resource Center

+
+
+ +
+
+
+
+ +
+ + + + + + + + +

Cryptographic Module Validation Program CMVP

+ +
+ + +
+ + + +
+
+ +
+
+ + +
+ +
+ +

Modules In Process List

+ + +

+ The MIP list contains cryptographic modules on which the CMVP is actively working. For a module to transition from Review Pending to In Review, the lab must first pay the NIST Cost Recovery fee, and then the report will be assigned as resources become available. The validation process is a joint effort between the CMVP, the laboratory and the vendor and therefore, for any given module, the action to respond could reside with the CMVP, the lab or the vendor. This list does not provide granularity into which entity has the action. If you would like more information for a specific cryptographic module or its schedule, please contact the vendor.
+  +

+ +

+ Last Updated: 10/23/2020 +

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Module NameVendor NameStandardReview PendingIn ReviewCoordinationFinalization
Thunder Series TH-3040S, TH-5440S, TH-5840S and TH-7440S-11A10 Networks, Inc.FIPS 140-2
Acronis SCS Cryptographic ModuleAcronis SCSFIPS 140-2
ADVA 10TCE-PCN-16GU+AES100G-F encryption moduleADVA Optical Networking SEFIPS 140-2
ADVA 9TCE-PCN-10GU+AES10G-F encryption moduleADVA Optical Networking SEFIPS 140-2
WCC-PCN-AES100GB-F Encryption ModuleADVA Optical Networking SEFIPS 140-2
Advantech SQFlash FIPS Certified SSDAdvantech Co., Ltd.FIPS 140-2
SBx908 GEN2, AT-x950-28XTQm, AT-x550-18XTQ, AT-x550-18XSQ, AT-x550-18XSPQm, and AT-x530-28GTXm Secure Management ModuleAllied TelesisFIPS 140-2
AWS Nitro Card Security EngineAmazon Web Services, Inc.FIPS 140-2
Apple CoreCrypto Kernel Space Module for ARMApple Inc.FIPS 140-2
Apple CoreCrypto Kernel Space Module for IntelApple Inc.FIPS 140-2
Apple CoreCrypto User Space Module for ARMApple Inc.FIPS 140-2
Apple CoreCrypto User Space Module for IntelApple Inc.FIPS 140-2
Apple Secure Key Store Cryptographic Module, 10.0Apple Inc.FIPS 140-2
Aegis Fortress L3 Cryptographic ModuleApricornFIPS 140-2
Aegis Secure Key 3NX Cryptographic ModuleApricornFIPS 140-2
Arista EOS Crypto ModuleArista Networks, Inc.FIPS 140-2
Aruba 9004 Series Gateway with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2
Aruba AP-504, AP-505, AP-514, AP-515, AP-534, AP-535 and AP-555 Wireless Access Points with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2
Aruba IAP-303H, IAP-304, IAP-305, IAP-314, IAP-315, IAP-324, IAP-325, IAP-334, and IAP-335 Wireless Access Points with Aruba Instant FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2
Aruba Mobility Controller Virtual Appliances with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2
Aruba Virtual and Hardware Mobility Master Appliances with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2
TASS Crypto EngineBeijing JN TASS Technology Co., Ltd.FIPS 140-2
BCM58200 Series: BCM58201, BCM58202Broadcom, Inc.FIPS 140-2
Ubuntu 18.04 Kernel Crypto API Cryptographic ModuleCanonical Ltd.FIPS 140-2
Ubuntu 18.04 Libgcrypt Cryptographic ModuleCanonical Ltd.FIPS 140-2
Ubuntu 20.04 Kernel Crypto API Cryptographic ModuleCanonical Ltd.FIPS 140-2
Ubuntu 20.04 Libgcrypt Cryptographic ModuleCanonical Ltd.FIPS 140-2
Ubuntu 20.04 OpenSSL Cryptographic ModuleCanonical Ltd.FIPS 140-2
Cisco Adaptive Security Appliance (ASA) VirtualCisco Systems, Inc.FIPS 140-2
Cisco ASA and ISA Cryptographic ModuleCisco Systems, Inc.FIPS 140-2
Cisco ASA and ISA Firepower Threat Defense Cryptographic ModulesCisco Systems, Inc.FIPS 140-2
Cisco ASA Cryptographic ModuleCisco Systems, Inc.FIPS 140-2
Cisco ASR 1000 Series Routers with MACSECCisco Systems, Inc.FIPS 140-2
Cisco ASR 1000 Series Routers without MACSECCisco Systems, Inc.FIPS 140-2
Cisco Catalyst 9200 Series SwitchesCisco Systems, Inc.FIPS 140-2
Cisco Catalyst 9200L Series SwitchesCisco Systems, Inc.FIPS 140-2
Cisco Catalyst 9300 Series SwitchesCisco Systems, Inc.FIPS 140-2
Cisco Catalyst 9400 Series SwitchesCisco Systems, Inc.FIPS 140-2
Cisco Catalyst 9600 Series SwitchesCisco Systems, Inc.FIPS 140-2
Cisco Catalyst 9800 (40/80/L) Wireless Controllers running IOS-XE 16.12Cisco Systems, Inc.FIPS 140-2
Cisco Catalyst 9800-CL Wireless Controller IOS-XE 16.12Cisco Systems, Inc.FIPS 140-2
Cisco FIPS Object ModuleCisco Systems, Inc.FIPS 140-2
Cisco Firepower 2100 Cryptographic ModuleCisco Systems, Inc.FIPS 140-2
Cisco Firepower 4100 and Cisco Firepower 9300 SeriesCisco Systems, Inc.FIPS 140-2
Cisco Firepower Next-Generation IPS Virtual (NGIPSv) Cryptographic ModuleCisco Systems, Inc.FIPS 140-2
Cisco Firepower Threat Defense on 4K/9K Cryptographic ModuleCisco Systems, Inc.FIPS 140-2
Cisco Firepower Threat Defense Virtual (FTDv) Cryptographic ModuleCisco Systems, Inc.FIPS 140-2
Cisco FTD FX-OS on 4K/9K Cryptographic ModuleCisco Systems, Inc.FIPS 140-2
Cisco ISR 1000 Series Routers without MACSECCisco Systems, Inc.FIPS 140-2
Cisco ISR 4000 Series Routers with MACSECCisco Systems, Inc.FIPS 140-2
Cisco Network Convergence System 1001 Cryptographic ModuleCisco Systems, Inc.FIPS 140-2
Cisco Network Convergence System 1004 Cryptographic ModuleCisco Systems, Inc.FIPS 140-2
Citrix ADC MPXCitrix Systems, Inc.FIPS 140-2
FSM-2 Flash Storage Cryptographic ModuleCurtiss-Wright Controls Defense SolutionsFIPS 140-2
DL4FEDataLocker Inc.FIPS 140-2
VNX 6 Gb/s SAS I/O Module with EncryptionDell EMCFIPS 140-2
DIGISTOR TCG OPAL SSC FIPS SSD SeriesDIGISTORFIPS 140-2
DocuSign HSM ApplianceDocuSign, Inc.FIPS 140-2
DocuSign Signature ApplianceDocuSign, Inc.FIPS 140-2
SOLSDR NETNode Security ModuleDomo Tactical Communications (DTC) LTDFIPS 140-2
DRAEGER WCM9113 802.11ABGN VG2Draeger Medical Systems, Inc.FIPS 140-2
ECI TM200EN Encryption ModuleECI Telecom Ltd.FIPS 140-2
Johnson Encryption Machine 2 (JEM2)EF Johnson TechnologiesFIPS 140-2
Entrust Authority™ Security KernelEntrust Datacard CorporationFIPS 140-2
Envieta QFlex Hardware Security ModuleEnvieta Systems LLCFIPS 140-2
Extreme Networks SLX 9640, SLX 9150 and SLX 9250 SwitchesExtreme Networks, Inc.FIPS 140-2
Extreme® MLXe® Series Ethernet RoutersExtreme Networks, Inc.FIPS 140-2
Extreme® NetIron® CER 2000 Series Ethernet RoutersExtreme Networks, Inc.FIPS 140-2
F5(R) Device Cryptographic ModuleF5 Networks, IncFIPS 140-2
FEITIAN Biometric FIDO Key ModuleFEITIAN TechnologiesFIPS 140-2
OTP TokenFEITIAN TechnologiesFIPS 140-2
FAST C-LIBFescaro Co. Ltd.FIPS 140-2
FireEye CM Series: CM1500V, CM2500V, CM7500VFireEye, Inc.FIPS 140-2
FireEye CM Series: CM4500, CM7500, CM9400, CM9500FireEye, Inc.FIPS 140-2
FireEye EX Series: EX3500, EX5500, EX8400, EX8500FireEye, Inc.FIPS 140-2
FireEye EX Series: EX5500VFireEye, Inc.FIPS 140-2
FireEye HX Series: HX4402, HX4502, HX4502DFireEye, Inc.FIPS 140-2
FireEye HX Series: HX4502VFireEye, Inc.FIPS 140-2
FireEye NX Series: NX1500, NX2500, NX2550, NX3500, NX4500, NX5500, NX6500FireEye, Inc.FIPS 140-2
FireEye NX Series: NX1500V, NX2500V, NX2550V, NX4500V, NX6500VFireEye, Inc.FIPS 140-2
FireEye VX Series: VX5500, VX12500, VX12550FireEye, Inc.FIPS 140-2
FireEye VX Series: VX7690VfipsFireEye, Inc.FIPS 140-2
MonocryptAES Enhanced Crypto LibraryFocus Systems CorporationFIPS 140-2
Fornetix® Key Orchestration(tm)Fornetix LLCFIPS 140-2
Fortanix SDKMS ApplianceFortanix, Inc.FIPS 140-2
Fortanix SDKMS Appliance (FX2200, Version 3.10.16)Fortanix, Inc.FIPS 140-2
FortiAP-U221EV, FortiAP-U223EV, FortiAP-U321EV, FortiAP-U323EV, FortiAP-U421EV, FortiAP-U422EV, FortiAP-U423EV, FortiAP-U431F and FortiAP-U433FFortinet, Inc.FIPS 140-2
FortiGate-1101E/2000E/2201E/2500E/3301EFortinet, Inc.FIPS 140-2
FortiGate-201E/301E/401E/501E/601EFortinet, Inc.FIPS 140-2
FortiGate-3401E/3601E/3960E/3980EFortinet, Inc.FIPS 140-2
FortiGate-5001E1 Blade with FortiGate-5144C ChassisFortinet, Inc.FIPS 140-2
FortiGate-61E/61F/81E/101E/101F and FortiWiFi-61EFortinet, Inc.FIPS 140-2
FortiGate-6300F/6301F/6500F/6501FFortinet, Inc.FIPS 140-2
FortiGate-VMFortinet, Inc.FIPS 140-2
FortiOS 6.0 and 6.2Fortinet, Inc.FIPS 140-2
FortiWLC-50D/500D/1000D/3000DFortinet, Inc.FIPS 140-2
FortiWLM-100D and FortiWLM-1000DFortinet, Inc.FIPS 140-2
NRevenector 2018FP InovoLabs GmbHFIPS 140-2
Postal NRevenector GB 2019FP InovoLabs GmbHFIPS 140-2
1FINITY T600(TM) Transport BladeFujitsu Network Communications, Inc.FIPS 140-2
Standalone IMBGDC Technology (USA) LLCFIPS 140-2
Fortress Mesh PointsGeneral Dynamics Mission SystemsFIPS 140-2
GigaVUE-HC2 Visibility ApplianceGigamon Inc.FIPS 140-2
GigaVUE-HC3 Visibility ApplianceGigamon Inc.FIPS 140-2
BoringCrypto AndroidGoogle, Inc.FIPS 140-2
Titan Security Key, Chip BoundaryGoogle, LLC.FIPS 140-2
Aruba 2930F, 2930M, 3810M and 5400R zl2 Switch SeriesHewlett Packard EnterpriseFIPS 140-2
HPE XP8 Encrypt Backend 4pk NVMe I/O Mod (eDKBN)Hewlett Packard Enterprise CompanyFIPS 140-2
HID Global Applets v3.0 on NXP JCOP 3 SecID P60 CS (OSB)HID GlobalFIPS 140-2
HID Global Applets v3.0 on NXP JCOP 3 SecID P60 CS (OSB)HID GlobalFIPS 140-2
Hitachi Virtual Storage Platform (VSP) Encryption Board for NVMeHitachi, Ltd.FIPS 140-2
Hitachi Virtual Storage Platform (VSP) Encryption Module for NVMeHitachi, Ltd.FIPS 140-2
HUAWEI OptiX OSN 1800 SeriesHuawei Technologies Co., Ltd.FIPS 140-2
IBM 4769 Cryptographic Coprocessor Security ModuleIBM CorporationFIPS 140-2
IBM(R) z/OS(R) Version 2 Release 4 ICSF PKCS #11 Cryptographic ModuleIBM CorporationFIPS 140-2
IBM(R) z/OS(R) Version 2 Release 4 ICSF PKCS #11 Cryptographic ModuleIBM CorporationFIPS 140-2
IBM(R) z/OS(R) Version 2 Release 4 System SSL Cryptographic ModuleIBM CorporationFIPS 140-2
IBM(R) z/OS(R) Version 2 Release 4 System SSL Cryptographic ModuleIBM CorporationFIPS 140-2
IBM(R) z/VM(R) Version 7 Release 2 System SSL Cryptographic ModuleIBM CorporationFIPS 140-2
IBM(R) NVMe FlashCore(TM) Module 2IBM(R) CorporationFIPS 140-2
LifeCare PCA™ Infusion PumpICU Medical, Inc.FIPS 140-2
Trusted Platform Module 2.0 SLI / SLM 9670Infineon Technologies AGFIPS 140-2
mTera Universal Transport PlatformInfinera CorporationFIPS 140-2
Integral AES 256 Bit Crypto SSD Underlying PCBIntegral Memory PlcFIPS 140-2
Integral Crypto AES 256 Bit USB 3.0Integral Memory PlcFIPS 140-2
Cryptographic Module for Intel(R) Converged Security and Manageability Engine(CSME)Intel CorporationFIPS 140-2
Cryptographic Module for Intel® Platforms' Security Engine ChipsetIntel CorporationFIPS 140-2
Cryptographic Module for Intel® Platforms' Security Engine ChipsetIntel CorporationFIPS 140-2
iStorage datAshur BTiStorage Ltd.FIPS 140-2
iStorage datAshur PRO2 Level 3 Secure Storage DriveiStorage Ltd.FIPS 140-2
Juniper Networks EX4650, QFX5120 and QFX5210 Ethernet SwitchesJuniper Networks, IncFIPS 140-2
Juniper Networks SRX300, SRX320, SRX340, SRX345, SRX345-DUAL-AC, SRX550M, SRX5400, SRX5600 and SRX5800 Services GatewaysJuniper Networks, IncFIPS 140-2
Juniper Networks SRX345, SRX345-DUAL-AC, SRX380 and SRX1500 Services GatewayJuniper Networks, IncFIPS 140-2
Juniper Networks EX2300, EX2300-C and EX3400 Ethernet SwitchesJuniper Networks, Inc.FIPS 140-2
Juniper Networks EX4300-48MP Ethernet SwitchJuniper Networks, Inc.FIPS 140-2
Juniper Networks MX10003 3D Universal Edge Router with JNP-MIC1-MACSEC MACSec MIC and EX9253 Ethernet Switch with EX9253-6Q12C-M MACSec Line CardJuniper Networks, Inc.FIPS 140-2
Juniper Networks MX104 3D Universal Edge Router with the Multiservices MICJuniper Networks, Inc.FIPS 140-2
Juniper Networks MX240, MX480, MX960 3D Universal Edge Routers and EX9204, EX9208, EX9214 Ethernet Switches with RE-S-X6-64G/RE-S-X6-128G/EX9200-RE2 Routing Engine and MPC7E-10G/EX9200-40XS MACsec CardJuniper Networks, Inc.FIPS 140-2
Juniper Networks MX240, MX480, MX960 3D Universal Edge Routers with RE1800 Routing Engine and MPC7E-10G MACsec CardJuniper Networks, Inc.FIPS 140-2
Juniper Networks MX240, MX480, MX960 3D Universal Edge Routers with RE1800 Routing Engine and Multiservices MPCJuniper Networks, Inc.FIPS 140-2
Juniper Networks MX240, MX480, MX960 3D Universal Edge Routers with RE-S-X6-64G Routing Engine and Multiservices MPCJuniper Networks, Inc.FIPS 140-2
Juniper Networks NFX250 Network Services PlatformJuniper Networks, Inc.FIPS 140-2
Junos Space Network Management Platform, Network Director & Security Director in JA2500Juniper Networks, Inc.FIPS 140-2
Junos Space Network Management Platform, Network Director & Security Director in Virtual ApplianceJuniper Networks, Inc.FIPS 140-2
KIOXIA TCG Enterprise SSC Crypto Sub-Chip TC58NC1132GTCKIOXIA CorporationFIPS 140-2
KIOXIA TCG OPAL SSC Crypto Sub-Chip TC58NC1132GTCKIOXIA CorporationFIPS 140-2
Laird Linux FIPS Core Crypto ModuleLaird ConnectivityFIPS 140-2
ESCRYPT's CycurLIBLandis+GyrFIPS 140-2
NITROXIII CNN35XX-NFBE HSM FamilyMarvellFIPS 140-2
AEDSMaxar TechnologiesFIPS 140-2
Network Security Platform Sensor NS3100, NS3200, NS5100 and NS5200McAfee, LLCFIPS 140-2
Network Security Platform Sensor NS3500McAfee, LLCFIPS 140-2
Network Security Platform Sensor NS7100, NS7200 and NS7300McAfee, LLCFIPS 140-2
Network Security Platform Sensor NS7150, NS7250 and NS7350McAfee, LLCFIPS 140-2
Network Security Platform Sensor NS9100 and NS9200McAfee, LLCFIPS 140-2
Network Security Platform Sensor NS9300 SMcAfee, LLCFIPS 140-2
Network Security Platform Sensor NS9300PMcAfee, LLCFIPS 140-2
Network Security Platform Sensor NS9500McAfee, LLCFIPS 140-2
Memkor MKD-O2F 2.5"/M.2/U.2 SSDMemkor, Inc.FIPS 140-2
Boot ManagerMicrosoft CorporationFIPS 140-2
Windows OS LoaderMicrosoft CorporationFIPS 140-2
FIPS AP43Mist SystemsFIPS 140-2
µMACEMotorola Solutions, Inc.FIPS 140-2
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 2Motorola Solutions, Inc.FIPS 140-2
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 2Motorola Solutions, Inc.FIPS 140-2
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 3Motorola Solutions, Inc.FIPS 140-2
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 3Motorola Solutions, Inc.FIPS 140-2
Key Variable Loader (KVL) 4000 PIKE2Motorola Solutions, Inc.FIPS 140-2
Key Variable Loader (KVL) 5000 PIKE2Motorola Solutions, Inc.FIPS 140-2
Motorola GGM 8000 GatewayMotorola Solutions, Inc.FIPS 140-2
Motorola Network Router (MNR) S6000Motorola Solutions, Inc.FIPS 140-2
Motorola Solutions Cryptographic Firmware ModuleMotorola Solutions, Inc.FIPS 140-2
Motorola Solutions Cryptographic Firmware ModuleMotorola Solutions, Inc.FIPS 140-2
nShield Solo XC F2nCipher Security LimitedFIPS 140-2
nShield Solo XC F3 and nShield Solo XC F3 for nShield Connect XC and for nShield Issuance HSMnCipher Security LimitedFIPS 140-2
nShield Solo XC F3 and nShield Solo XC F3 for nShield Connect XC and for nShield Issuance HSMnCipher Security LimitedFIPS 140-2
Nokia 1830 Photonic Service Switch (PSS)Nokia CorporationFIPS 140-2
NS361/NS371/NS561 (2.5" & M.2) SSDNovachips Co., Ltd.FIPS 140-2
NPCT7xx TPM 2.0 rev 1.38Nuvoton Technology CorporationFIPS 140-2
FIPS SE051NXP SemiconductorsFIPS 140-2
i.MX 8X SECO HSMNXP SemiconductorsFIPS 140-2
JCOP4 P71NXP SemiconductorsFIPS 140-2
SE050NXP SemiconductorsFIPS 140-2
Acme Packet 4600 and Acme Packet 6300 and Acme Packet 6350Oracle CommunicationsFIPS 140-2
Oracle Linux 7 GnuTLS Cryptographic ModuleOracle CorporationFIPS 140-2
Oracle Linux Unbreakable Enterprise Kernel (UEK 5) Cryptographic ModuleOracle CorporationFIPS 140-2
Oracle Linux Unbreakable Enterprise Kernel (UEK) Cryptographic ModuleOracle CorporationFIPS 140-2
GlobalProtect AppPalo Alto NetworksFIPS 140-2
Palo Alto Networks Cortex XSOAR ModulePalo Alto NetworksFIPS 140-2
Panorama 9.0 M-100, M-200, M-500 and M-600Palo Alto Networks, Inc.FIPS 140-2
Panorama Virtual Appliance 9.0Palo Alto Networks, Inc.FIPS 140-2
PAN-OS 9.0 Firewalls PA-220, PA-220R, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 SeriesPalo Alto Networks, Inc.FIPS 140-2
PAN-OS 9.0 VM-SeriesPalo Alto Networks, Inc.FIPS 140-2
WildFire 9.0 WF-500Palo Alto Networks, Inc.FIPS 140-2
Pavilion Cryptographic ModulePavilion Data SystemsFIPS 140-2
Phison TCG OPAL SSC SSD SeriesPhison Electronics CorporationFIPS 140-2
X4i Hardware Security Module (HSM)Pitney Bowes, Inc.FIPS 140-2
Poly Unified Communications Cryptographic ModulePlantronics, Inc.FIPS 140-2
PreVeil Cryptographic ModulePreVeil, Inc.FIPS 140-2
ENFORCER R1Private Machines Inc.FIPS 140-2
CMS-5000QSC, LLCFIPS 140-2
Quadient Postal Security Device (PSD)Quadient Technologies FranceFIPS 140-2
Qualcomm(R) Crypto Engine CoreQualcomm Technologies, Inc.FIPS 140-2
Qualcomm(R) Secure Processing Unit (SPU)Qualcomm Technologies, Inc.FIPS 140-2
Qualcomm(R) Trusted Execution Environment Software Cryptographic LibraryQualcomm Technologies, Inc.FIPS 140-2
Quantum Xchange FIPS ModuleQuantum XchangeFIPS 140-2
Red Hat Enterprise Linux 7 Kernel Crypto API Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 7 NSS Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 7 OpenSSH Client Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 7 OpenSSH Server Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 7 OpenSSL Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 8 GnuTLS Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 8 GnuTLS Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 8 Kernel Crypto API Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 8 Kernel Crypto API Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 8 libgcrypt Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 8 NSS Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 8 NSS Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 8 OpenSSL Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
Red Hat Enterprise Linux 8 OpenSSL Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2
RS9113Redpine Signals, Inc.FIPS 140-2
SBC 5400 Session Border ControllerRibbon Communications, Inc.FIPS 140-2
RSA BSAFE(R) Crypto ModuleRSAFIPS 140-2
RSA BSAFE(R) Crypto-C Micro EditionRSAFIPS 140-2
RSA BSAFE(R) Crypto-J JSAFE and JCE Software Module 6.2.5RSA Security LLCFIPS 140-2
RSA BSAFE(R) Crypto-J JSAFE and JCE Software Module 6.2.5RSA Security LLCFIPS 140-2
R610-F Access Point, R710 Access Point, R720 Access Point, T610 Access Point, T610s Access Point, T710 Access Point, T710s Access Point, E510 Access PointRuckus Wireless, Inc.FIPS 140-2
Ruckus Networks Virtual Smart Zone (vSZ)Ruckus Wireless, Inc.FIPS 140-2
Ruckus Networks Virtual SmartZone - Data Plane (vSZ-D)Ruckus Wireless, Inc.FIPS 140-2
Virtual SmartZone (vSZ) WLAN ControllerRuckus Wireless, Inc.FIPS 140-2
Samsung BoringSSL Cryptographic ModuleSamsung Electronics Co., Ltd.FIPS 140-2
Samsung Flash Memory Protector V2.0Samsung Electronics Co., Ltd.FIPS 140-2
Samsung Kernel Cryptographic ModuleSamsung Electronics Co., Ltd.FIPS 140-2
Samsung NVMe TCG Opal SSC SEDs PM1733 SeriesSamsung Electronics Co., Ltd.FIPS 140-2
Samsung NVMe TCG Opal SSC SEDs PM983 SeriesSamsung Electronics Co., Ltd.FIPS 140-2
Samsung SAS 12G TCG Enterprise SSC SEDs PM1643a/PM1645a SeriesSamsung Electronics Co., Ltd.FIPS 140-2
Samsung SCrypto Cryptographic ModuleSamsung Electronics Co., Ltd.FIPS 140-2
CN Series EncryptorsSenetas Corporation Ltd., distributed by Thales SA (SafeNet)FIPS 140-2
CN6000 Series EncryptorsSenetas Corporation Ltd., distributed by Thales SA (SafeNet)FIPS 140-2
Silver Peak Unity EdgeConnect EC-XS-FIPS, EC-M-P-FIPS, EC-XL-P-FIPS and EC-XL-P-NM-FIPSSilver Peak Systems, Inc.FIPS 140-2
SUSE Linux Enterprise Kernel Crypto API Cryptographic ModuleSUSE, LLCFIPS 140-2
SUSE Linux Enterprise Server GnuTLS Cryptographic ModuleSUSE, LLCFIPS 140-2
SUSE Linux Enterprise Server Kernel Crypto API Cryptographic ModuleSUSE, LLCFIPS 140-2
SUSE Linux Enterprise Server libgcrypt Cryptographic ModuleSUSE, LLCFIPS 140-2
SUSE Linux Enterprise Server libgcrypt Cryptographic ModuleSUSE, LLCFIPS 140-2
SUSE Linux Enterprise Server Libica Cryptographic ModuleSUSE, LLCFIPS 140-2
SUSE Linux Enterprise Server NSS Cryptographic ModuleSUSE, LLCFIPS 140-2
SUSE Linux Enterprise Server OpenSSL Cryptographic ModuleSUSE, LLCFIPS 140-2
SUSE Linux Enterprise Server OpenSSL Cryptographic ModuleSUSE, LLCFIPS 140-2
Taglio PIV Applet v2.1 on NXP JCOP 3 SecID P60 CS (OSB)TaglioFIPS 140-2
Thales Luna K7 Cryptographic ModuleThalesFIPS 140-2
Vormetric Transparent Encryption Cryptographic ModuleThalesFIPS 140-2
Luna T7 Cryptographic ModuleThales Trusted Cyber TechnologiesFIPS 140-2
TippingPoint Crypto Core OpenSSLTrend Micro Inc.FIPS 140-2
UD info DA-series FIPS SSDUD info Corp.FIPS 140-2
Unisys Linux Kernel Cryptographic API ModuleUnisys CorporationFIPS 140-2
Unisys Linux strongSwan Cryptographic ModuleUnisys CorporationFIPS 140-2
Unisys OpenSSL Linux Cryptographic ModuleUnisys CorporationFIPS 140-2
Suite B Cryptographic ModuleUnited States Special Operations Command (USSOCOM)FIPS 140-2
CryptoServer CSe-SeriesUtimaco IS GmbHFIPS 140-2
CryptoServer Se-Series Gen2Utimaco IS GmbHFIPS 140-2
VaultIPVerimatrixFIPS 140-2
Vidyo Cryptographic Security KernelVidyo, Inc.FIPS 140-2
VMware’s Linux Cryptographic ModuleVMware, Inc.FIPS 140-2
VMware's SD-WAN VPN Crypto ModuleVMware, Inc.FIPS 140-2
VMware's SD-WAN VPN Hybrid Crypto ModuleVMware, Inc.FIPS 140-2
Vocera Smartbadge Cryptographic ModuleVocera Communications, Inc.FIPS 140-2
WatchGuard Firebox M270[1], M370[2], M470[3], M570[4], M670[5]WatchGuard Technologies, Inc.FIPS 140-2
WatchGuard Firebox T15[1], T15-W[2], T35[3], T35-W[4], T55[5], T55-W[6], T70[7]WatchGuard Technologies, Inc.FIPS 140-2
Ultrastar® DC HC330 TCG Enterprise HDDWestern Digital CorporationFIPS 140-2
Ultrastar® DC SS540 TCG Enterprise SSDWestern Digital CorporationFIPS 140-2
YubiHSM 2 Cryptographic Module (Level 3)Yubico, Inc.FIPS 140-2
YubiKey 5 Cryptographic Module (Level 1)Yubico, Inc.FIPS 140-2
YubiKey 5 Cryptographic Module (Level 2)Yubico, Inc.FIPS 140-2
DHSSL Cryptographic ModuleZhejiang Dahua Technology Co., Ltd.FIPS 140-2
Displayed: 27516446623
Not Displayed: 2610871
Total: 30117454694
+ +
+ +
+ + +
+
+ + Created October 11, 2016, Updated October 16, 2020 +
+
+ + + + +
+ + + + + + + + + + + + + + diff --git a/tests/data/test_fips_mip/fips_mip_2021-02-19T06+01:00.html b/tests/data/test_fips_mip/fips_mip_2021-02-19T06+01:00.html new file mode 100644 index 00000000..698915b5 --- /dev/null +++ b/tests/data/test_fips_mip/fips_mip_2021-02-19T06+01:00.html @@ -0,0 +1,2301 @@ + + + + + Cryptographic Module Validation Program | CSRC + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+
+ +

+ Computer Security Resource Center +

+

Computer Security Resource Center

+
+
+ +
+
+
+
+ +
+ + + + + + + + +

Cryptographic Module Validation Program CMVP

+ +
+ + +
+ + + +
+
+ +
+
+ + +
+ +
+ +

Modules In Process List

+ + +

+ The MIP list contains cryptographic modules on which the CMVP is actively working. For a module to transition from Review Pending to In Review, the lab must first pay the NIST Cost Recovery fee, and then the report will be assigned as resources become available. The validation process is a joint effort between the CMVP, the laboratory and the vendor and therefore, for any given module, the action to respond could reside with the CMVP, the lab or the vendor. This list does not provide granularity into which entity has the action. If you would like more information for a specific cryptographic module or its schedule, please contact the vendor.
+  +

+ +

+ Last Updated: 2/18/2021 +

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Module NameVendor NameStandardStatus
Thunder Series TH-3040S, TH-5440S, TH-5840S and TH-7440S-11A10 Networks, Inc.FIPS 140-2Review Pending
ADVA 10TCE-PCN-16GU+AES100G-F encryption moduleADVA Optical Networking SEFIPS 140-2Review Pending
ADVA 9TCE-PCN-10GU+AES10G-F encryption moduleADVA Optical Networking SEFIPS 140-2Review Pending
Advantech SQFlash FIPS Certified SSDAdvantech Co., Ltd.FIPS 140-2Review Pending
AT-SBx908 Gen2, AT-x950, AT-x550, AT-x530 Secure Management ModuleAllied TelesisFIPS 140-2Coordination
AWS Key Management Service HSMAmazon Web Services, Inc.FIPS 140-2Review Pending
Apple corecrypto Kernel Space Module for ARMApple Inc.FIPS 140-2Coordination
Apple corecrypto Kernel Space Module for IntelApple Inc.FIPS 140-2Coordination
Apple corecrypto Module v11.1 [Intel, Kernel, Software]Apple Inc.FIPS 140-3Review Pending
Apple corecrypto Module v11.1 [Intel, User, Software]Apple Inc.FIPS 140-3Review Pending
Apple corecrypto User Space Module for ARMApple Inc.FIPS 140-2Coordination
Apple corecrypto User Space Module for IntelApple Inc.FIPS 140-2Coordination
Aegis Fortress L3 Cryptographic ModuleApricornFIPS 140-2Review Pending
Aegis Secure Key 3NX Cryptographic ModuleApricornFIPS 140-2Review Pending
Apricorn FIPS 140-2 Encryption System Gen 2ApricornFIPS 140-2Review Pending
Arista EOS Crypto ModuleArista Networks, Inc.FIPS 140-2Review Pending
Aruba 7280 Controller with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2Review Pending
Aruba 9004 Series Gateway with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2In Review
Aruba AP-318, AP-344, AP-345, AP-374, AP-375, AP-377 and AP-387 Outdoor Access Points with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2Review Pending
Aruba AP-504, AP-505, AP-514, AP-515, AP-534, AP-535 and AP-555 Wireless Access Points with ArubaOS FIPS FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2Coordination
Aruba IAP-303H, IAP-304, IAP-305, IAP-314, IAP-315, IAP-324, IAP-325, IAP-334, and IAP-335 Wireless Access Points with Aruba Instant FirmwareAruba, a Hewlett Packard Enterprise companyFIPS 140-2Coordination
CRATON2/SECTON embedded V2X HSMAutotalks Ltd.FIPS 140-2Review Pending
TASS Crypto EngineBeijing JN TASS Technology Co., Ltd.FIPS 140-2Coordination
Cryptographic Server HSMBeijing Lianshi Networks Technology Co.,Ltd.FIPS 140-2Review Pending
BCM58200 Series: BCM58201, BCM58202Broadcom, Inc.FIPS 140-2Review Pending
Ubuntu 18.04 Kernel Crypto API Cryptographic ModuleCanonical Ltd.FIPS 140-2Review Pending
Ubuntu 18.04 OpenSSL Cryptographic ModuleCanonical Ltd.FIPS 140-2Review Pending
Ubuntu 20.04 Kernel Crypto API Cryptographic ModuleCanonical Ltd.FIPS 140-2Review Pending
Ubuntu 20.04 Libgcrypt Cryptographic ModuleCanonical Ltd.FIPS 140-2Review Pending
Ubuntu 20.04 OpenSSL Cryptographic ModuleCanonical Ltd.FIPS 140-2Review Pending
Ubuntu 20.04 Strongswan Cryptographic ModuleCanonical Ltd.FIPS 140-2Review Pending
Check Point Cryptographic LibraryCheck Point Software Technologies Ltd.FIPS 140-2Review Pending
Radio Internet-Protocol Communications Module Z (RIC-Mz)Christine Wireless, Inc.FIPS 140-2Review Pending
Tactical Key Management Device (TKMD)Christine Wireless, Inc.FIPS 140-2Review Pending
Cisco 8200 Series RoutersCisco Systems, Inc.FIPS 140-2Review Pending
Cisco 8800 Series RoutersCisco Systems, Inc.FIPS 140-2Review Pending
Cisco Adaptive Security Appliance (ASA) VirtualCisco Systems, Inc.FIPS 140-2Coordination
Cisco Aironet 1562e/i/d/ps, 2802e/i, 3802e/i/p, 4800, IW6300H-AC/DC/DCW Wireless LAN Access Points, Version IOS-XE 17.3Cisco Systems, Inc.FIPS 140-2Review Pending
Cisco Aironet 9115AXI/AXE, 9120AXI/AXE/AXP, 9130AXI/AXE, and 9105AXI/AXW Wireless LAN Access PointsCisco Systems, Inc.FIPS 140-2Review Pending
Cisco ASA and ISA Firepower Threat Defense Cryptographic ModulesCisco Systems, Inc.FIPS 140-2Coordination
Cisco ASR 1000 Series Routers without MACSECCisco Systems, Inc.FIPS 140-2Coordination
Cisco Catalyst 9200 Series SwitchesCisco Systems, Inc.FIPS 140-2Coordination
Cisco Catalyst 9200L Series SwitchesCisco Systems, Inc.FIPS 140-2Coordination
Cisco Catalyst 9300 Series SwitchesCisco Systems, Inc.FIPS 140-2Coordination
Cisco Catalyst 9400 Series SwitchesCisco Systems, Inc.FIPS 140-2Coordination
Cisco Catalyst 9600 Series SwitchesCisco Systems, Inc.FIPS 140-2Coordination
Cisco Catalyst 9800 (40/80/L) Wireless Controllers running IOS-XE 16.12Cisco Systems, Inc.FIPS 140-2Coordination
Cisco Catalyst 9800-CL Wireless ControllerCisco Systems, Inc.FIPS 140-2Coordination
Cisco Firepower 2100 Cryptographic ModuleCisco Systems, Inc.FIPS 140-2Coordination
Cisco Firepower Threat Defense on 4K/9K Cryptographic ModuleCisco Systems, Inc.FIPS 140-2Coordination
Cisco FTD FX-OS on 4K/9K Cryptographic ModuleCisco Systems, Inc.FIPS 140-2Coordination
Cisco ISR 1000 Series Routers without MACSECCisco Systems, Inc.FIPS 140-2Coordination
Citrix ADC MPXCitrix Systems, Inc.FIPS 140-2Review Pending
Citrix ADC VPXCitrix Systems, Inc.FIPS 140-2Review Pending
CliniComp Data Acquisition Cryptographic ModuleCliniComp, Intl.FIPS 140-2Review Pending
R650-US Access Point, R650-WW Access Point, R750 Access Point, R850 Access Point, T750SE Access Point, and T750 Access PointCommScope Technologies LLCFIPS 140-2Review Pending
Ruckus Networks SmartZone 144 (SZ-144) and SmartZone 300 (SZ-300) WLAN ControllersCommScope Technologies LLCFIPS 140-2Review Pending
Ruckus Networks Virtual SmartZone - Data Plane (vSZ-D)CommScope Technologies LLCFIPS 140-2Review Pending
Ruckus Networks Virtual SmartZone (vSZ)CommScope Technologies LLCFIPS 140-2Review Pending
Vocality RoIP and DTECH M3-SE Multi-Function Gateway AppliancesCubic CorporationFIPS 140-2Review Pending
FSM-2 Flash Storage Cryptographic ModuleCurtiss-Wright Controls Defense SolutionsFIPS 140-2Review Pending
DL4FEDataLocker Inc.FIPS 140-2Review Pending
K350DataLocker Inc.FIPS 140-2Review Pending
RSA BSAFE(R) Crypto-C Micro EditionDell Inc, BSAFE Product TeamFIPS 140-2Review Pending
RSA BSAFE(R) Crypto-C Micro EditionDell Inc, BSAFE Product TeamFIPS 140-2Review Pending
DIGISTOR TCG OPAL SSC FIPS SSD SeriesDIGISTORFIPS 140-2Review Pending
DINAMO CD, XP, and ST Hardware Security ModulesDINAMO Networks, Inc.FIPS 140-2Review Pending
DINAMO Pocket Hardware Security ModuleDINAMO Networks, Inc.FIPS 140-2Review Pending
DocuSign HSM ApplianceDocuSign, Inc.FIPS 140-2Coordination
DocuSign Signature ApplianceDocuSign, Inc.FIPS 140-2Coordination
ECI TM200EN Encryption ModuleECI Telecom Ltd.FIPS 140-2Coordination
Johnson Encryption Machine 2 (JEM2)EF Johnson TechnologiesFIPS 140-2In Review
Envieta QFlex Hardware Security ModuleEnvieta Systems LLCFIPS 140-2Review Pending
MS1201 Security Sub-systemeWBMFIPS 140-2Review Pending
Extreme Networks SLX 9640, SLX 9150 and SLX 9250 SwitchesExtreme Networks, Inc.FIPS 140-2Review Pending
Extreme® MLXe® Series Ethernet RoutersExtreme Networks, Inc.FIPS 140-2Coordination
Extreme® NetIron® CER 2000 Series Ethernet RoutersExtreme Networks, Inc.FIPS 140-2Review Pending
F5(R) Device Cryptographic ModuleF5 Networks, IncFIPS 140-2Coordination
FEITIAN Biometric FIDO Key ModuleFEITIAN TechnologiesFIPS 140-2Review Pending
OTP TokenFEITIAN TechnologiesFIPS 140-2Review Pending
FAST C-LIBFescaro Co. Ltd.FIPS 140-2Review Pending
FireEye CM Series: CM1500V, CM2500V, CM7500VFireEye, Inc.FIPS 140-2In Review
FireEye CM Series: CM4500, CM7500, CM9400, CM9500FireEye, Inc.FIPS 140-2In Review
FireEye EX Series: EX3500, EX5500, EX8400, EX8500FireEye, Inc.FIPS 140-2Review Pending
FireEye EX Series: EX5500VFireEye, Inc.FIPS 140-2In Review
FireEye HX Series: HX4402, HX4502, HX4502DFireEye, Inc.FIPS 140-2Review Pending
FireEye HX Series: HX4502VFireEye, Inc.FIPS 140-2In Review
FireEye NX Series: NX1500, NX2500, NX2550, NX3500, NX4500, NX5500, NX6500FireEye, Inc.FIPS 140-2Review Pending
FireEye NX Series: NX1500V, NX2500V, NX2550V, NX4500V, NX6500VFireEye, Inc.FIPS 140-2In Review
FireEye VX Series: VX5500, VX12500, VX12550FireEye, Inc.FIPS 140-2Review Pending
FireEye VX Series: VX7690VfipsFireEye, Inc.FIPS 140-2In Review
MonocryptAES Enhanced Crypto LibraryFocus Systems CorporationFIPS 140-2Coordination
Fortanix SDKMS ApplianceFortanix, Inc.FIPS 140-2In Review
Fortanix SDKMS Appliance (FX2200, Version 3.10.16)Fortanix, Inc.FIPS 140-2Coordination
FortiAnalyzer 6.2Fortinet, Inc.FIPS 140-2Review Pending
FortiAP-U221EV, FortiAP-U223EV, FortiAP-U321EV, FortiAP-U323EV, FortiAP-U421EV, FortiAP-U422EV, FortiAP-U423EV, FortiAP-U431F and FortiAP-U433FFortinet, Inc.FIPS 140-2Review Pending
FortiGate-1101E/2000E/2201E/2500E/3301EFortinet, Inc.FIPS 140-2Coordination
FortiGate-201E/301E/401E/501E/601EFortinet, Inc.FIPS 140-2Review Pending
FortiGate-3401E/3601E/3960E/3980EFortinet, Inc.FIPS 140-2Coordination
FortiGate-5001E1 Blade with FortiGate-5144C ChassisFortinet, Inc.FIPS 140-2Review Pending
FortiGate-600D/1200D/1500D/3000D/3700D and FortiGate-5001D with FortiGate-5144C ChassisFortinet, Inc.FIPS 140-2Review Pending
FortiGate-61E/61F/81E/101E/101F and FortiWiFi-61EFortinet, Inc.FIPS 140-2In Review
FortiGate-6300F/6301F/6500F/6501FFortinet, Inc.FIPS 140-2Review Pending
FortiGate-VMFortinet, Inc.FIPS 140-2Review Pending
FortiManager 6.2Fortinet, Inc.FIPS 140-2Review Pending
FortiSandbox-1000F/2000E/3000EFortinet, Inc.FIPS 140-2Review Pending
FortiWLC-50D/500D/1000D/3000DFortinet, Inc.FIPS 140-2Coordination
FortiWLM-100D and FortiWLM-1000DFortinet, Inc.FIPS 140-2Coordination
EXP1000 Hardware Security ModuleFuturexFIPS 140-2Review Pending
GSP3000 Hardware Security ModuleFuturexFIPS 140-2Review Pending
Fortress Mesh PointsGeneral Dynamics Mission SystemsFIPS 140-2Coordination
GigaVUE-HC2 Visibility ApplianceGigamon Inc.FIPS 140-2Coordination
GigaVUE-HC3 Visibility ApplianceGigamon Inc.FIPS 140-2Coordination
Titan Security Key, Chip BoundaryGoogle, LLC.FIPS 140-2In Review
HID Global Applets v3.0 on NXP JCOP 3 SecID P60 CS (OSB)HID GlobalFIPS 140-2Coordination
HID Global Applets v3.0 on NXP JCOP 3 SecID P60 CS (OSB)HID GlobalFIPS 140-2Coordination
Hitachi Virtual Storage Platform (VSP) Encryption Board for NVMeHitachi, Ltd.FIPS 140-2Review Pending
HUAWEI OptiX OSN 1800 SeriesHuawei Technologies Co., Ltd.FIPS 140-2Coordination
Hub Security Cryptographic ModuleHub Security LTDFIPS 140-2Review Pending
HyTrust KeyControl Cryptographic ModuleHyTrust, Inc.FIPS 140-2Review Pending
IBM 4769-001 Cryptographic Coprocessor Security ModuleIBM CorporationFIPS 140-2Coordination
IBM(R) Security QRadar(R) Cryptographic Security KernelIBM CorporationFIPS 140-2Coordination
IBM(R) z/OS(R) Version 2 Release 4 ICSF PKCS #11 Cryptographic ModuleIBM CorporationFIPS 140-2Review Pending
IBM(R) z/OS(R) Version 2 Release 4 ICSF PKCS #11 Cryptographic ModuleIBM CorporationFIPS 140-2Coordination
IBM(R) z/OS(R) Version 2 Release 4 System SSL Cryptographic ModuleIBM CorporationFIPS 140-2Review Pending
IBM(R) z/OS(R) Version 2 Release 4 System SSL Cryptographic ModuleIBM CorporationFIPS 140-2Coordination
IBM(R) z/VM(R) Version 7 Release 2 System SSL Cryptographic ModuleIBM CorporationFIPS 140-2Review Pending
IBM(R) NVMe FlashCore(TM) Module 2IBM(R) CorporationFIPS 140-2Coordination
mTera 8-slot Universal Transport PlatformInfinera CorporationFIPS 140-2Coordination
Integral AES 256 Bit Crypto SSD Underlying PCBIntegral Memory PlcFIPS 140-2Coordination
Integral Crypto AES 256 Bit USB 3.0Integral Memory PlcFIPS 140-2Coordination
Cryptographic Module for Intel(R) Converged Security and Manageability Engine (CSME) for Intel Tiger Point PCHIntel CorporationFIPS 140-2Review Pending
Cryptographic Module for Intel(R) Converged Security and Manageability Engine(CSME)Intel CorporationFIPS 140-2Review Pending
Cryptographic Module for Intel® Platforms' Security Engine ChipsetIntel CorporationFIPS 140-2Coordination
Cryptographic Module for Intel® Platforms' Security Engine ChipsetIntel CorporationFIPS 140-2Coordination
Intel(R) Offload and Crypto Subsystem (OCS)Intel CorporationFIPS 140-2Review Pending
IQVIA Java Crypto ModuleIQVIAFIPS 140-2Review Pending
iStorage datAshur BTiStorage Ltd.FIPS 140-2Review Pending
Juniper Kernel Crypto Cryptographic ModuleJuniper NetworksFIPS 140-2Review Pending
Juniper OpenSSL Cryptographic ModuleJuniper NetworksFIPS 140-2Review Pending
Juniper Networks ACX5448-M RouterJuniper Networks, IncFIPS 140-2Review Pending
Juniper Networks EX4650, QFX5120 and QFX5210 Ethernet SwitchesJuniper Networks, IncFIPS 140-2Review Pending
Juniper Networks SRX345, SRX345-DUAL-AC, SRX380 and SRX1500 Services GatewayJuniper Networks, IncFIPS 140-2Review Pending
Juniper Networks EX4300-48MP Ethernet SwitchJuniper Networks, Inc.FIPS 140-2Coordination
Juniper Networks MX10003 3D Universal Edge Router with JNP-MIC1-MACSEC MACSec MIC and EX9253 Ethernet Switch with EX9253-6Q12C-M MACSec Line CardJuniper Networks, Inc.FIPS 140-2Coordination
Juniper Networks MX104 3D Universal Edge Router with the Multiservices MICJuniper Networks, Inc.FIPS 140-2Coordination
Juniper Networks MX240, MX480, MX960 3D Universal Edge Routers and EX9204, EX9208, EX9214 Ethernet Switches with RE-S-X6-64G/RE-S-X6-128G/EX9200-RE2 Routing Engine and MPC7E-10G/EX9200-40XS MACsec CardJuniper Networks, Inc.FIPS 140-2Coordination
Juniper Networks MX240, MX480, MX960 3D Universal Edge Routers with RE1800 Routing Engine and MPC7E-10G MACsec CardJuniper Networks, Inc.FIPS 140-2Coordination
Juniper Networks MX240, MX480, MX960 3D Universal Edge Routers with RE1800 Routing Engine and Multiservices MPCJuniper Networks, Inc.FIPS 140-2Coordination
Juniper Networks MX240, MX480, MX960 3D Universal Edge Routers with RE-S-X6-64G Routing Engine and Multiservices MPCJuniper Networks, Inc.FIPS 140-2Coordination
Juniper Networks NFX250 Network Services PlatformJuniper Networks, Inc.FIPS 140-2In Review
Defender HDD 300Kanguru SolutionsFIPS 140-2Review Pending
KIOXIA TCG Enterprise SSC Crypto Sub-Chip TC58NC1132GTCKIOXIA CorporationFIPS 140-3Review Pending
KIOXIA TCG Enterprise SSC Crypto Sub-Chip TC58NC1132GTCKIOXIA CorporationFIPS 140-2Review Pending
KIOXIA TCG OPAL SSC Crypto Sub-Chip TC58NC1132GTCKIOXIA CorporationFIPS 140-2Review Pending
MFP Cryptographic Module(A)Kyocera Document Solutions Inc.FIPS 140-2Review Pending
RF-7800W Broadband Ethernet RadioL3Harris Technologies, Inc.FIPS 140-2Review Pending
ESCRYPT's CycurLIBLandis+GyrFIPS 140-2Coordination
Macronix ArmorFlash MX78 seriesMacronix International Co., Ltd.FIPS 140-2Review Pending
AEDSMaxar TechnologiesFIPS 140-2Review Pending
Network Security Platform Sensor NS3100, NS3200, NS5100 and NS5200McAfee, LLCFIPS 140-2Coordination
Network Security Platform Sensor NS7100, NS7200 and NS7300McAfee, LLCFIPS 140-2Coordination
Network Security Platform Sensor NS7150, NS7250 and NS7350McAfee, LLCFIPS 140-2Coordination
Network Security Platform Sensor NS7500McAfee, LLCFIPS 140-2Review Pending
Network Security Platform Sensor NS9100 and NS9200McAfee, LLCFIPS 140-2Coordination
Network Security Platform Sensor NS9300 SMcAfee, LLCFIPS 140-2Coordination
Network Security Platform Sensor NS9300PMcAfee, LLCFIPS 140-2Coordination
NV-2108 Flashtec(TM) PCIe NVRAM DriveMicrochip Technology, Inc.FIPS 140-2Review Pending
BitLocker Dump FilterMicrosoft CorporationFIPS 140-2Review Pending
BitLocker Dump FilterMicrosoft CorporationFIPS 140-2Review Pending
Boot ManagerMicrosoft CorporationFIPS 140-2Review Pending
Boot ManagerMicrosoft CorporationFIPS 140-2Coordination
Code IntegrityMicrosoft CorporationFIPS 140-2Review Pending
Code IntegrityMicrosoft CorporationFIPS 140-2Review Pending
Cryptographic Primitives LibraryMicrosoft CorporationFIPS 140-2Review Pending
Cryptographic Primitives LibraryMicrosoft CorporationFIPS 140-2Review Pending
Kernel Mode Cryptographic Primitives LibraryMicrosoft CorporationFIPS 140-2Review Pending
Secure Kernel Code IntegrityMicrosoft CorporationFIPS 140-2Review Pending
Secure Kernel Code IntegrityMicrosoft CorporationFIPS 140-2Review Pending
TCB LauncherMicrosoft CorporationFIPS 140-2Review Pending
Virtual TPMMicrosoft CorporationFIPS 140-2Review Pending
Virtual TPMMicrosoft CorporationFIPS 140-2Review Pending
Windows OS LoaderMicrosoft CorporationFIPS 140-2Review Pending
Windows OS LoaderMicrosoft CorporationFIPS 140-2Review Pending
Windows ResumeMicrosoft CorporationFIPS 140-2Review Pending
FIPS AP43Mist SystemsFIPS 140-2Coordination
Command Encryption ModuleMitsubishi Space Software Co., Ltd.FIPS 140-2Review Pending
Mocana Cryptographic Loadable Kernel ModuleMocana CorporationFIPS 140-2Review Pending
Mocana Cryptographic Suite B ModuleMocana CorporationFIPS 140-2Review Pending
Mocana Cryptographic Suite B ModuleMocana CorporationFIPS 140-2Review Pending
µMACEMotorola Solutions, Inc.FIPS 140-2Review Pending
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 2Motorola Solutions, Inc.FIPS 140-2Review Pending
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 2Motorola Solutions, Inc.FIPS 140-2Coordination
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 3Motorola Solutions, Inc.FIPS 140-2Review Pending
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 3Motorola Solutions, Inc.FIPS 140-2Coordination
Motorola GGM 8000 GatewayMotorola Solutions, Inc.FIPS 140-2Review Pending
Motorola Network Router (MNR) S6000Motorola Solutions, Inc.FIPS 140-2Review Pending
Motorola Solutions Cryptographic Firmware ModuleMotorola Solutions, Inc.FIPS 140-2Review Pending
Motorola Solutions Cryptographic Firmware ModuleMotorola Solutions, Inc.FIPS 140-2Coordination
Motorola Solutions Cryptographic Firmware ModuleMotorola Solutions, Inc.FIPS 140-2Coordination
NetApp CryptoModNetApp, Inc.FIPS 140-2Review Pending
NETSCOUT FIPS Object ModuleNETSCOUT Systems, Inc.FIPS 140-2Review Pending
7705 SAR-OS SAR-18/8/X/Ax/Wx/W/H/Hc Control Plane Cryptographic Module (SARCPCM)Nokia CorporationFIPS 140-2Review Pending
7705 SAR-OS SAR-18/8/X/Ax/Wx/W/H/Hc Data Plane Cryptographic Module (SARDPCM)Nokia CorporationFIPS 140-2Review Pending
7705 SAR-OS SAR-A/M Cryptographic Module (SARCM)Nokia CorporationFIPS 140-2Review Pending
Nokia 1830 Photonic Service Switch (PSS)Nokia CorporationFIPS 140-2Coordination
SR-OS Cryptographic ModuleNokia CorporationFIPS 140-2Review Pending
NPCT7xx TPM 2.0 rev 1.38Nuvoton Technology CorporationFIPS 140-2Coordination
FIPS SE051NXP SemiconductorsFIPS 140-2Review Pending
i.MX 8X SECO HSMNXP SemiconductorsFIPS 140-2Review Pending
SE050NXP SemiconductorsFIPS 140-2Coordination
Acme Packet 4600 and Acme Packet 6300 and Acme Packet 6350Oracle CommunicationsFIPS 140-2Review Pending
Oracle Linux Unbreakable Enterprise Kernel (UEK 5) Cryptographic ModuleOracle CorporationFIPS 140-2Coordination
Oracle Linux Unbreakable Enterprise Kernel (UEK) Cryptographic ModuleOracle CorporationFIPS 140-2Coordination
Oracle Solaris Kernel Cryptographic FrameworkOracle CorporationFIPS 140-2Review Pending
Oracle Solaris Userland Cryptographic FrameworkOracle CorporationFIPS 140-2Review Pending
OSNEXUS Crypto LibraryOSNEXUS CorporationFIPS 140-2Review Pending
GlobalProtect AppPalo Alto NetworksFIPS 140-2Review Pending
Instant-On Networks (ION) devices ION 1000, ION 2000, ION 3000, ION 7000, and ION 9000Palo Alto Networks, Inc.FIPS 140-2Review Pending
Panorama 9.0 M-100, M-200, M-500 and M-600Palo Alto Networks, Inc.FIPS 140-2Coordination
Panorama Virtual Appliance 9.0Palo Alto Networks, Inc.FIPS 140-2Coordination
PAN-OS 9.0 Firewalls PA-220, PA-220R, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 SeriesPalo Alto Networks, Inc.FIPS 140-2Coordination
PAN-OS 9.0 VM-SeriesPalo Alto Networks, Inc.FIPS 140-2Coordination
WildFire 9.0 WF-500Palo Alto Networks, Inc.FIPS 140-2Coordination
Pavilion Cryptographic ModulePavilion Data SystemsFIPS 140-2Review Pending
X4i Hardware Security Module (HSM)Pitney Bowes, Inc.FIPS 140-2Coordination
X4i Postal Security Device (PSD)Pitney Bowes, Inc.FIPS 140-2Review Pending
Poly Unified Communications Cryptographic ModulePlantronics, Inc.FIPS 140-2Coordination
ENFORCER R1Private Machines Inc.FIPS 140-2Coordination
Purity Encryption ModulePure Storage, Inc.FIPS 140-2Review Pending
CMS-5000QSC, LLCFIPS 140-2Coordination
Quadient Postal Security Device (PSD)Quadient Technologies FranceFIPS 140-2Review Pending
Qualcomm(R) Crypto Engine CoreQualcomm Technologies, Inc.FIPS 140-2Review Pending
Qualcomm(R) Secure Processing Unit (SPU) Random Number Generator (RNG)Qualcomm Technologies, Inc.FIPS 140-2Review Pending
VaultIPRambus Inc.FIPS 140-2Coordination
Red Hat Enterprise Linux 7 Kernel Crypto API Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Coordination
Red Hat Enterprise Linux 7 NSS Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Coordination
Red Hat Enterprise Linux 7 OpenSSH Client Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Coordination
Red Hat Enterprise Linux 7 OpenSSH Server Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Coordination
Red Hat Enterprise Linux 7 OpenSSL Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Coordination
Red Hat Enterprise Linux 8 GnuTLS Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 Kernel Crypto API Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 NSS Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 NSS Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Coordination
Red Hat Enterprise Linux 8 OpenSSL Cryptographic ModuleRed Hat(R), Inc.FIPS 140-2Coordination
SBC 5400 Session Border ControllerRibbon Communications, Inc.FIPS 140-2Coordination
RSA BSAFE(R) Crypto ModuleRSAFIPS 140-2In Review
RSA BSAFE(R) Crypto-C Micro EditionRSA Security, LLCFIPS 140-2Coordination
Ruckus Networks Virtual Smart Zone (vSZ)Ruckus Wireless, Inc.FIPS 140-2Coordination
Ruckus Networks Virtual SmartZone - Data Plane (vSZ-D)Ruckus Wireless, Inc.FIPS 140-2Coordination
Samsung NVMe TCG Opal SSC SEDs PM1733 SeriesSamsung Electronics Co., Ltd.FIPS 140-2Review Pending
Samsung SAS 12G TCG Enterprise SSC SEDs PM1643a SeriesSamsung Electronics Co., Ltd.FIPS 140-2Review Pending
CN Series EncryptorsSenetas Corporation Ltd., distributed by Thales SA (SafeNet)FIPS 140-2Coordination
CN6000 Series EncryptorsSenetas Corporation Ltd., distributed by Thales SA (SafeNet)FIPS 140-2Coordination
SX-590-1402silex technology, Inc.FIPS 140-2Review Pending
Silver Peak ECOS Cryptographic LibrarySilver Peak Systems Inc.FIPS 140-2Review Pending
SonicWall Network Security Virtual AppliancesSonicWall, Inc.FIPS 140-2Review Pending
SonicWALL NSsp 14700 and NSsp 15700SonicWall, Inc.FIPS 140-2Review Pending
SonicWALL TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670 and NSa 2700SonicWall, Inc.FIPS 140-2Review Pending
SUSE Linux Enterprise Kernel Crypto API Cryptographic ModuleSUSE, LLCFIPS 140-2Review Pending
SUSE Linux Enterprise Kernel Crypto API Cryptographic ModuleSUSE, LLCFIPS 140-2Review Pending
SUSE Linux Enterprise OpenSSL Cryptographic ModuleSUSE, LLCFIPS 140-2Review Pending
SUSE Linux Enterprise Server GnuTLS Cryptographic ModuleSUSE, LLCFIPS 140-2Review Pending
SUSE Linux Enterprise Server libgcrypt Cryptographic ModuleSUSE, LLCFIPS 140-2Coordination
SUSE Linux Enterprise Server libgcrypt Cryptographic ModuleSUSE, LLCFIPS 140-2Coordination
SUSE Linux Enterprise Server Libica Cryptographic ModuleSUSE, LLCFIPS 140-2Review Pending
SUSE Linux Enterprise Server NSS Cryptographic ModuleSUSE, LLCFIPS 140-2Coordination
SUSE Linux Enterprise Server OpenSSL Cryptographic ModuleSUSE, LLCFIPS 140-2Coordination
Taglio PIV Applet v2.1 on NXP JCOP 3 SecID P60 CS (OSB)TaglioFIPS 140-2Review Pending
ProtectServer Internal Express 2 (PSI-E2)ThalesFIPS 140-2Review Pending
ProtectServer PCIe HSM 3ThalesFIPS 140-2Review Pending
Thales Luna Backup HSM Cryptographic ModuleThalesFIPS 140-2Review Pending
Thales Luna K7 Cryptographic ModuleThalesFIPS 140-2Coordination
Vormetric Transparent Encryption Cryptographic ModuleThalesFIPS 140-2Coordination
Thales Alenia Space cryptographic module for Microsemi RTAX FPGAThales Alenia SpaceFIPS 140-2Review Pending
Luna T7 Cryptographic ModuleThales Trusted Cyber TechnologiesFIPS 140-2Coordination
TW-900/950 TSM Shadow and TW-870/875 TSM GhostTrellisWare Technologies, Inc.FIPS 140-2Review Pending
TippingPoint Crypto Core OpenSSLTrend Micro Inc.FIPS 140-2Coordination
UD info DA-series FIPS SSDUD info Corp.FIPS 140-2Review Pending
Unisys Linux Kernel Cryptographic API ModuleUnisys CorporationFIPS 140-2Coordination
Unisys Linux strongSwan Cryptographic ModuleUnisys CorporationFIPS 140-2Coordination
Unisys OpenSSL Linux Cryptographic ModuleUnisys CorporationFIPS 140-2In Review
CERDEC Cryptographic ModuleUS Army CERDECFIPS 140-2Review Pending
CryptoServer CSe-SeriesUtimaco IS GmbHFIPS 140-2Coordination
CryptoServer Se-Series Gen2Utimaco IS GmbHFIPS 140-2Coordination
u.trust ANCHOR CSARUtimaco IS GmbHFIPS 140-2Review Pending
RAD X-1040 AES-256Vcinity, Inc.FIPS 140-2Review Pending
Vidyo Cryptographic Security KernelVidyo, Inc.FIPS 140-2Coordination
Virtru JavaScript Cryptographic LibraryVirtru CorporationFIPS 140-2Review Pending
VMware’s Linux Cryptographic ModuleVMware, Inc.FIPS 140-2Coordination
VMware's SD-WAN VPN Crypto ModuleVMware, Inc.FIPS 140-2Review Pending
VMware's SD-WAN VPN Hybrid Crypto ModuleVMware, Inc.FIPS 140-2Review Pending
Vocera Cryptographic Module v3.1Vocera Communications, Inc.FIPS 140-2Review Pending
Vocera Smartbadge Cryptographic ModuleVocera Communications, Inc.FIPS 140-2Coordination
WatchKey ProX USB Token Cryptographic ModuleWatchData Technologies Pte LtdFIPS 140-2Review Pending
Ultrastar® DC HC330 TCG Enterprise HDDWestern Digital CorporationFIPS 140-2Coordination
Ultrastar® DC HC550 TCG Enterprise HDDWestern Digital CorporationFIPS 140-2Review Pending
Ultrastar® He¹° and Ultrastar® DC HC510 TCG Enterprise HDDWestern Digital CorporationFIPS 140-2Review Pending
Ultrastar® He¹² and Ultrastar® DC HC520 TCG Enterprise HDDWestern Digital CorporationFIPS 140-2Review Pending
YubiHSM 2 Cryptographic Module (Level 3)Yubico, Inc.FIPS 140-2Coordination
YubiKey 5 Cryptographic ModuleYubico, Inc.FIPS 140-2Coordination
YubiKey 5 Cryptographic ModuleYubico, Inc.FIPS 140-2Coordination
DHSSL Cryptographic ModuleZhejiang Dahua Technology Co., Ltd.FIPS 140-2Review Pending
Displayed303
Not Displayed27
Total330
+ +
+ +
+ + +
+
+ + Created October 11, 2016, Updated January 26, 2021 +
+
+ + + + +
+ + + + + + + + + + + + + + diff --git a/tests/data/test_fips_mip/fips_mip_2021-12-19T06+01:00.html b/tests/data/test_fips_mip/fips_mip_2021-12-19T06+01:00.html new file mode 100644 index 00000000..423b7cc6 --- /dev/null +++ b/tests/data/test_fips_mip/fips_mip_2021-12-19T06+01:00.html @@ -0,0 +1,3413 @@ + + + + + Cryptographic Module Validation Program | CSRC + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+ + U.S. flag +   + An official website of the United States government + + +
+
+
+
+
+
+ Dot gov +
+
+

+ Official websites use .gov +
+ A .gov website belongs to an official government organization in the United States. +

+
+
+
+
+
+
+ Https +
+
+

+ Secure .gov websites use HTTPS +
+ A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. +

+
+
+
+
+
+
+
+ + + +
+
+
+
+ +

+ Computer Security Resource Center +

+

Computer Security Resource Center

+
+
+ +
+
+
+
+ +
+ + + + + + + + +

Cryptographic Module Validation Program CMVP

+ +
+ + +
+ + + +
+
+ +
+
+ + +
+ +
+ +

Modules In Process List

+ + +

+ The MIP list contains cryptographic modules on which the CMVP is actively working. For a module to transition from Review Pending to In Review, the lab must first pay the NIST Cost Recovery fee, and then the report will be assigned as resources become available. The validation process is a joint effort between the CMVP, the laboratory and the vendor and therefore, for any given module, the action to respond could reside with the CMVP, the lab or the vendor. This list does not provide granularity into which entity has the action. If you would like more information for a specific cryptographic module or its schedule, please contact the vendor.
+  +

+ +

+ Last Updated: 12/18/2021 +

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Module NameVendor NameStandardStatus
Thunder Series TH3040S, TH5440S, TH5840S and TH7440S-11 + A10 Networks, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
ADVA 10TCE-PCN-16GU+AES100G-F encryption module + ADVA Optical Networking SE + + View Contacts + +
+
FIPS 140-2Review Pending
AMD Ryzen PRO 4000 Series PSP Cryptographic CoProcessor + Advanced Micro Devices + + View Contacts + +
+
FIPS 140-3Review Pending
AMD Ryzen PRO 5000 Series PSP Cryptographic CoProcessor + Advanced Micro Devices + + View Contacts + +
+
FIPS 140-3Review Pending
AT-x220, AT-x320, AT-x950 Secure Management Module + Allied Telesis + + View Contacts + +
+
FIPS 140-2Review Pending
AWS Key Management Service HSM + Amazon Web Services, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
AWS Key Management Service HSM + Amazon Web Services, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Apacer TCG SSD SV240 Series + Apacer Technology Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Apple corecrypto Module v11.1 [Apple silicon, User, Software] + Apple + + View Contacts + +
+
FIPS 140-3In Review
Apple corecrypto Module v11.1 [Apple silicon, Kernel, Software] + Apple Inc. + + View Contacts + +
+
FIPS 140-3In Review
Apple corecrypto Module v11.1 [Intel, Kernel, Software] + Apple Inc. + + View Contacts + +
+
FIPS 140-3In Review
Apple corecrypto Module v11.1 [Intel, User, Software] + Apple Inc. + + View Contacts + +
+
FIPS 140-3In Review
Aegis Secure Key 3Z and Aegis Secure Key 3NX Cryptographic Module + Apricorn + + View Contacts + +
+
FIPS 140-2Review Pending
CHR Cryptographic Module + Atos + + View Contacts + +
+
FIPS 140-2Coordination
CRATON2/SECTON embedded V2X HSM + Autotalks Ltd. + + View Contacts + +
+
FIPS 140-2Coordination
Aviat Networks Eclipse Cryptographic Module + Aviat Networks, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Barracuda KTINA FIPS Crypto Module + Barracuda Networks + + View Contacts + +
+
FIPS 140-2Review Pending
Alaris™ PC Unit Model 8015 + BD + + View Contacts + +
+
FIPS 140-2Review Pending
Cryptographic Server HSM + Beijing Lianshi Networks Technology Co.,Ltd. + + View Contacts + +
+
FIPS 140-2Coordination
Security Builder® FIPS Module + BlackBerry Limited + + View Contacts + +
+
FIPS 140-2Review Pending
PTP 700 Point to Point Wireless Ethernet Bridge + Cambium Networks, Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
Ubuntu 20.04 Kernel Crypto API Cryptographic Module + Canonical Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
Ubuntu 20.04 OpenSSL Cryptographic Module + Canonical Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
LenelS2 OnGuard Access Control Cryptographic Module + Carrier Fire & Security Americas Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Check Point Cryptographic Library + Check Point Software Technologies Ltd. + + View Contacts + +
+
FIPS 140-2Coordination
Radio Internet-Protocol Communications Module Z (RIC-Mz) + Christine Wireless, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Tactical Key Management Device (TKMD) + Christine Wireless, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Cisco 8800 Series Routers + Cisco Systems, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Cisco Aironet 1562e/i/d/ps, 2802e/i, 3802e/i/p, 4800 and IW6300H-AC/DC/DCW Wireless LAN Access Points, Version IOS-XE 17.3 + Cisco Systems, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Cisco Catalyst 9115AXI/AXE, 9120AXI/AXE/AXP, 9130AXI/AXE and 9105AXI/AXW Wireless LAN Access Points + Cisco Systems, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
R650-US Access Point, R650-WW Access Point, R750 Access Point, R850 Access Point, T750SE Access Point, T750 Access Point, and T750-WW Access Point + CommScope Technologies LLC + + View Contacts + +
+
FIPS 140-2Coordination
QASM Cryptographic Module + Crypto4A Technologies Inc. + + View Contacts + +
+
FIPS 140-2In Review
Vocality RoIP and DTECH M3-SE Multi-Function Gateway Appliances + Cubic Corporation + + View Contacts + +
+
FIPS 140-2Coordination
CyberCogs Hardware Security Module + CyberCogs, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
RSA BSAFE(R) Crypto Module + Dell Inc, BSAFE Product Team + + View Contacts + +
+
FIPS 140-2Coordination
RSA BSAFE(R) Crypto-C Micro Edition + Dell Inc, BSAFE Product Team + + View Contacts + +
+
FIPS 140-2Coordination
DINAMO CD, XP, and ST Hardware Security Modules + DINAMO Networks, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
ECI TM200EN Encryption Module + ECI Telecom Ltd. + + View Contacts + +
+
FIPS 140-2Coordination
Eclypses Cryptographic Library + Eclypses, Inc. + + View Contacts + +
+
FIPS 140-3Review Pending
MiniHSM & MiniHSM for nShield Edge F2 + Entrust, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
MiniHSM & MiniHSM for nShield Edge F3 + Entrust, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
nShield F2 500+ & nShield F2 1500+ & nShield F2 6000+ + Entrust, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
nShield F3 10+ 500+ 6000+ & nShield F3 500+ 1500+ 6000+ for nShield Connect+ and Connect CLX + Entrust, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
nShield F3 10+ 500+ 6000+ & nShield F3 500+ 1500+ 6000+ for nShield Connect+ and Connect CLX + Entrust, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
nShield Solo XC F2 + Entrust, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
nShield Solo XC F3 & nShield Solo XC F3 for nShield Connect XC and for nShield HSMi + Entrust, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
nShield Solo XC F3 & nShield Solo XC F3 for nShield Connect XC and for nShield HSMi + Entrust, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Extreme Networks SLX 9540 and SLX 9740 Switches + Extreme Networks, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Extreme® MLXe® Series Ethernet Routers + Extreme Networks, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Extreme® NetIron® CER 2000 Series Ethernet Routers + Extreme Networks, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Cryptographic Module for BIG-IP (R) + F5 Networks, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Cryptographic Module for BIG-IP (R) + F5 Networks, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
F5(R) Device Cryptographic Module + F5 Networks, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
F5(R) vCMP Cryptographic Module + F5 Networks, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Fortanix SDKMS Appliance + Fortanix, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
FortiAnalyzer 6.2 + Fortinet, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
FortiManager 6.2 + Fortinet, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
FortiSandbox-1000F/2000E/3000E + Fortinet, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Inline Crypto Engine (ICE) + Google, LLC + + View Contacts + +
+
FIPS 140-2Review Pending
Integrated Management Complex (IMC) and B227 True Random Number Generator (TRNG) Firmware-Hybrid Cryptographic Module + Google, LLC + + View Contacts + +
+
FIPS 140-2Review Pending
Look-aside Cryptography and Compression Engine (LCE) + Google, LLC + + View Contacts + +
+
FIPS 140-2Review Pending
Non-Volatile Memory express (NVMe) Data Path Security Cluster (DPSC) Module + Google, LLC + + View Contacts + +
+
FIPS 140-2Review Pending
BoringCrypto + Google, LLC. + + View Contacts + +
+
FIPS 140-2Review Pending
BoringCrypto Android + Google, LLC. + + View Contacts + +
+
FIPS 140-2Coordination
BoringCrypto SoC + Google, LLC. + + View Contacts + +
+
FIPS 140-2Review Pending
Titan-D Chip + Google, LLC. + + View Contacts + +
+
FIPS 140-2Review Pending
Black Lantern Cryptographic Module + Guardtime Federal + + View Contacts + +
+
FIPS 140-2Review Pending
Hitachi Virtual Storage Platform (VSP) Encryption Board for NVMe + Hitachi, Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
Hitachi Virtual Storage Platform (VSP) Encryption Module + Hitachi, Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
HSSD_V6 Series + Huawei Technologies CO., Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
Huawei EulerOS 2.0 OpenSSH Client Cryptographic Module + Huawei Technologies CO., Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
Huawei EulerOS 2.0 OpenSSH Server Cryptographic Module + Huawei Technologies CO., Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
Huawei EulerOS 2.0 OpenSSL Cryptographic Module + Huawei Technologies CO., Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
Hub Security Cryptographic Module + Hub Security LTD + + View Contacts + +
+
FIPS 140-2Coordination
Hughes HT2010 Satellite Terminal + Hughes Network Systems, LLC + + View Contacts + +
+
FIPS 140-2Review Pending
Hughes HT2300, HT2500, HT2550, HT2650 Satellite Terminals + Hughes Network Systems, LLC + + View Contacts + +
+
FIPS 140-2Review Pending
Hughes IPsec IP Gateway Server + Hughes Network Systems, LLC + + View Contacts + +
+
FIPS 140-2Review Pending
HyTrust KeyControl Cryptographic Module + HyTrust, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
ICU Medical CE3.0 OpenSSL Cryptographic Module + ICU Medical, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
SLS37CSAUS V2X + Infineon Technologies AG + + View Contacts + +
+
FIPS 140-2Review Pending
Trusted Platform Module 2.0 SLB 9672 + Infineon Technologies AG + + View Contacts + +
+
FIPS 140-2Coordination
Infinera Groove? G30 DCI Platform + Infinera Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Cryptographic Module for Intel(R) Converged Security and Manageability Engine (CSME) + Intel Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Cryptographic Module for Intel® Platforms' Security Engine Chipset + Intel Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Intel(R) Converged Security and Manageability Engine (CSME) Crypto Module for Tiger Point PCH, Mule Creek Canyon PCH, and Rocket Lake PCH + Intel Corporation + + View Contacts + +
+
FIPS 140-2Coordination
IQVIA Java Crypto Module + IQVIA + + View Contacts + +
+
FIPS 140-2Coordination
Juniper Networks ACX5448-M Router + Juniper Networks, Inc + + View Contacts + +
+
FIPS 140-2Coordination
Juniper Networks EX4650, QFX5120 and QFX5210 Ethernet Switches + Juniper Networks, Inc + + View Contacts + +
+
FIPS 140-2Coordination
Juniper Networks SRX345, SRX345-DUAL-AC, SRX380 and SRX1500 Services Gateway + Juniper Networks, Inc + + View Contacts + +
+
FIPS 140-2Coordination
Juniper Kernel Crypto Cryptographic Module + Juniper Networks, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Juniper OpenSSL Cryptographic Module + Juniper Networks, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Secure Cryptographic Module (SCM) + JVCKENWOOD Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Defender HDD 300 + Kanguru Solutions + + View Contacts + +
+
FIPS 140-2Coordination
KIOXIA TCG Enterprise SSC Crypto Sub-Chip TC58NC1040GTB + KIOXIA Corporation + + View Contacts + +
+
FIPS 140-3In Review
KIOXIA TCG Enterprise SSC Crypto Sub-Chip TC58NC1132GTC + KIOXIA Corporation + + View Contacts + +
+
FIPS 140-3In Review
KIOXIA TCG OPAL SSC Crypto Sub-Chip TC58NC1132GTC + KIOXIA Corporation + + View Contacts + +
+
FIPS 140-3In Review
Harris AES Load Module + L3Harris Technologies, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
RF-7800W Broadband Ethernet Radio + L3Harris Technologies, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Summit Linux FIPS Core Crypto Module + Laird Connectivity + + View Contacts + +
+
FIPS 140-2Review Pending
BC-FNA (Bouncy Castle FIPS .NET API) + Legion of the Bouncy Castle Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
LogRhythm 7.4.8 Console + LogRhythm + + View Contacts + +
+
FIPS 140-2Review Pending
LogRhythm 7.4.8 Data Processor + LogRhythm + + View Contacts + +
+
FIPS 140-2Review Pending
LogRhythm 7.4.8 Platform Manager + LogRhythm + + View Contacts + +
+
FIPS 140-2Review Pending
LogRhythm 7.4.8 System Monitor Agent + LogRhythm + + View Contacts + +
+
FIPS 140-2Review Pending
LogRhythm 7.4.8 AI Engine Server + LogRhythm Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Macronix ArmorFlash MX78 series + Macronix International Co., Ltd. + + View Contacts + +
+
FIPS 140-2Coordination
Marvell LS2 HSM Family + Marvell Semiconductor, Inc. + + View Contacts + +
+
FIPS 140-3Review Pending
NITROXIII CNN35XX-NFBE HSM Family + Marvell Semiconductor, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
NITROXIII CNN35XX-NFBE HSM Family + Marvell Semiconductor, Inc. + + View Contacts + +
+
FIPS 140-3In Review
McAfee Core Cryptographic Module (kernel) + McAfee, LLC + + View Contacts + +
+
FIPS 140-2Review Pending
McAfee Core Cryptographic Module (user) + McAfee, LLC + + View Contacts + +
+
FIPS 140-2Review Pending
Microchip Trust Anchor TA100 + Microchip Technology Inc + + View Contacts + +
+
FIPS 140-2Review Pending
CBL-Mariner Kernel Crypto API + Microsoft Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
CBL-Mariner OpenSSL Cryptographic Module + Microsoft Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
FIPS AP43 + Mist Systems + + View Contacts + +
+
FIPS 140-2Review Pending
Command Encryption Module + Mitsubishi Space Software Co., Ltd. + + View Contacts + +
+
FIPS 140-2Coordination
Mocana Cryptographic Loadable Kernel Module + Mocana Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Mocana Cryptographic Suite B Module + Mocana Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Mocana Cryptographic Suite B Module + Mocana Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Monaco Communication Cryptographic Module 1.0 + Monaco Enterprises Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 2 + Motorola Solutions, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Astro Subscriber Motorola Advanced Crypto Engine (MACE) - Security Level 3 + Motorola Solutions, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
KMF/Wave/Traffic CryptR + Motorola Solutions, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Motorola Solutions Cryptographic Firmware Module + Motorola Solutions, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Motorola Solutions Cryptographic Software Module + Motorola Solutions, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Voice Processing Module Cryptographic Module (VPMCM) / Telephone Media Gateway Cryptographic Module (TMGCM) + Motorola Solutions, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
NEC Storage Encryption Board for NVMe + NEC Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
NetApp CryptoMod + NetApp, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
NETSCOUT FIPS Object Module + NETSCOUT Systems, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
7705 SAR-OS SAR-18/8/X/Ax/Wx/W/H/Hc Control Plane Cryptographic Module (SARCPCM) + Nokia Corporation + + View Contacts + +
+
FIPS 140-2Coordination
7705 SAR-OS SAR-18/8/X/Ax/Wx/W/H/Hc Data Plane Cryptographic Module (SARDCM) + Nokia Corporation + + View Contacts + +
+
FIPS 140-2Coordination
7705 SAR-OS SAR-A/M Cryptographic Module (SARCM) + Nokia Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Nokia 1830 Photonic Service Switch (PSS) + Nokia Corporation + + View Contacts + +
+
FIPS 140-2Coordination
SR-OS Cryptographic Module + Nokia Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Nutanix Cryptographic Module for OpenSSH Client + Nutanix, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Nutanix Cryptographic Module for OpenSSH Server + Nutanix, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Nutanix Cryptographic Module for OpenSSL + Nutanix, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
NPCT7xx TPM 2.0 rev 1.59 + Nuvoton Technology Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Nuvoton Cryptographic Library 2.0 + Nuvoton Technology Corporation + + View Contacts + +
+
FIPS 140-3In Review
i.MX 8X SECO HSMv2 + NXP Semiconductors + + View Contacts + +
+
FIPS 140-2In Review
Oracle Linux 7 Libreswan Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Oracle Linux 7 NSS Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2In Review
Oracle Linux 7 OpenSSH Client Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Oracle Linux 7 OpenSSH Server Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Oracle Linux 7 OpenSSL Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2In Review
Oracle Linux 7 Unbreakable Enterprise Kernel (UEK6) Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Oracle Linux 8 GnuTLS Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Oracle Linux 8 libgcrypt Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Oracle Linux 8 NSS Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Oracle Linux 8 OpenSSL Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Oracle Linux 8 Unbreakable Enterprise Kernel (UEK6) Cryptographic Module + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Oracle Solaris Userland Cryptographic Framework + Oracle Corporation + + View Contacts + +
+
FIPS 140-2Coordination
OSNEXUS Crypto Library + OSNEXUS Corporation + + View Contacts + +
+
FIPS 140-2Coordination
Instant-On Networks (ION) devices ION 1000, ION 2000, ION 3000, ION 7000, and ION 9000 + Palo Alto Networks, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Cryptographic Module for DSC2-2Q200 + Pensando Systems, Inc + + View Contacts + +
+
FIPS 140-2Review Pending
X4i Hardware Security Module (HSM) + Pitney Bowes, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Qualcomm(R) Crypto Engine Core + Qualcomm Technologies, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Qualcomm(R) Secure Processing Unit + Qualcomm Technologies, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Qualcomm(R) Trusted Execution Environment (TEE) Software Cryptographic Library + Qualcomm Technologies, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Qumulo Secure + Qumulo, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
CryptoManager Root of Trust (CMRT) + Rambus Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 GnuTLS Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 GnuTLS Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 Kernel Crypto API Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 Kernel Crypto API Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 Kernel Crypto API Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2In Review
Red Hat Enterprise Linux 8 libgcrypt Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 libgcrypt Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 NSS Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 NSS Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 OpenSSL Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Red Hat Enterprise Linux 8 OpenSSL Cryptographic Module + Red Hat(R), Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
SAAB Encrypted Automatic Identification System Cryptographic Module (EAISCM) + Saab AB (publ) TransponderTech (SAAB) + + View Contacts + +
+
FIPS 140-2Coordination
Samsung NVMe TCG Opal SSC SEDs PM1733 Series + Samsung Electronics Co., Ltd. + + View Contacts + +
+
FIPS 140-2Coordination
Samsung NVMe TCG Opal SSC SEDs PM1733/PM1735 Series + Samsung Electronics Co., Ltd. + + View Contacts + +
+
FIPS 140-2Review Pending
Samsung NVMe TCG Opal SSC SEDs PM9A3 Series + Samsung Electronics Co., Ltd. + + View Contacts + +
+
FIPS 140-3Review Pending
Samsung SCrypto Cryptographic Module + Samsung Electronics Co., Ltd. + + View Contacts + +
+
FIPS 140-2In Review
SecHSM V2-1 (AC) and SecHSM V2-1 (DC) + Sansec Technology Co., Ltd. + + View Contacts + +
+
FIPS 140-2Coordination
Seagate Secure(R) TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module + Seagate Technology LLC + + View Contacts + +
+
FIPS 140-2Review Pending
Seagate Secure(R) Self-Encrypting Drive + Seagate Technology, LLC + + View Contacts + +
+
FIPS 140-3Review Pending
SecureData Engine + SecureAge Technology + + View Contacts + +
+
FIPS 140-2Review Pending
AxioCrypto-M235x + Security Platform Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
CN Series Encryptors + Senetas Corporation Ltd., distributed by Thales SA (SafeNet) + + View Contacts + +
+
FIPS 140-2Review Pending
CN6000 Series Encryptors + Senetas Corporation Ltd., distributed by Thales SA (SafeNet) + + View Contacts + +
+
FIPS 140-2Review Pending
GM01 + Shanghai Muge Technology Co., Ltd + + View Contacts + +
+
FIPS 140-2Review Pending
SX-590-1402 + silex technology, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Silver Peak ECOS Cryptographic Library + Silver Peak Systems Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Silver Peak Unity EdgeConnect EC-XS-FIPS, EC-M-P-FIPS, EC-XL-P-FIPS and EC-XL-P-NM-FIPS + Silver Peak Systems, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
SK hynix PE8010 and PE8030 NVMe Opal SEDs + SK hynix Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
SK hynix PE8110 M.2 22110D NVMe TCG Opal SSC SED + SK hynix Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
SK hynix PE8111 E1.L NVMe TCG Opal SSC SED + SK hynix Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
SonicWall Capture Security Appliance (CSa) 1000 + SonicWall + + View Contacts + +
+
FIPS 140-2Review Pending
SonicWall Network Security Virtual Appliances + SonicWall, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
SonicWALL NSsp 14700 and NSsp 15700 + SonicWall, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
SonicWALL SMA Series v12.4 SMA 6210, SMA 7210, SMA 7200 + SonicWall, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
SonicWALL SMA Series v12.4 SMA 8200v + SonicWall, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
SonicWALL TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700 and NSa 3700 + SonicWall, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Trusted Platform Module ST33TPHF2XSPI [A], ST33TPHF2XI2C [B], ST33GTPMASPI [C], ST33GTPMAI2C [D], ST33GTPMISPI [E] & ST33GTPMII2C [F] + STMicroelectronics + + View Contacts + +
+
FIPS 140-2Review Pending
Symantec Content Analysis Virtual Appliance + Symantec, A Division of Broadcom + + View Contacts + +
+
FIPS 140-2Review Pending
Symantec Integrated Secure Gateway + Symantec, A Division of Broadcom + + View Contacts + +
+
FIPS 140-2Review Pending
TruLink Control Logic Module CL6792-M1 + Telephonics Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
TruLink Control Logic Module CL6882-M1 + Telephonics Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Tera2 PCoIP Zero Client Processors + Teradici Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
IDPrime 3930 FIDO + Thales + + View Contacts + +
+
FIPS 140-2Review Pending
ProtectServer Internal Express 2 (PSI-E2) + Thales + + View Contacts + +
+
FIPS 140-2Coordination
ProtectServer PCIe HSM 3 + Thales + + View Contacts + +
+
FIPS 140-2Coordination
Thales CipherTrust Manager Core Security Module + Thales + + View Contacts + +
+
FIPS 140-2Review Pending
Thales Luna K7 Cryptographic Module + Thales + + View Contacts + +
+
FIPS 140-3Review Pending
OpenSSL FIPS Provider + The OpenSSL Project + + View Contacts + +
+
FIPS 140-2Review Pending
Titaniam Core Engine + Titaniam, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Toshiba Secure TCG Opal SSC Self-Encrypting Drive Series MG09ACP18TA and MG09ACP16TA + Toshiba Electronic Devices & Storage Corporation + + View Contacts + +
+
FIPS 140-3Review Pending
Toshiba Secure TCG Opal SSC Self-Encrypting Drive Series MG09SCP18TA and MG09SCP16TA + Toshiba Electronic Devices & Storage Corporation + + View Contacts + +
+
FIPS 140-3Review Pending
TW-900/950 TSM Shadow and TW-870/875 TSM Ghost + TrellisWare Technologies, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
AN/GRC-262 + Ultra Electronics - TCS + + View Contacts + +
+
FIPS 140-2Review Pending
u.trust Anchor + Utimaco IS GmbH + + View Contacts + +
+
FIPS 140-2Coordination
RAD X-1040 AES-256 + Vcinity, Inc. + + View Contacts + +
+
FIPS 140-2Coordination
Versa Networks Branch + Versa Networks, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Versa Networks Controller + Versa Networks, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Virtru JavaScript Cryptographic Library + Virtru Corporation + + View Contacts + +
+
FIPS 140-2Coordination
VMware’s Linux Cryptographic Module + VMware, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
VMware's ESXboot Cryptographic Module + VMware, Inc. + + View Contacts + +
+
FIPS 140-3Review Pending
VMware's VPN Crypto Module + VMware, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Vocera Cryptographic Module + Vocera Communications, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
WatchKey ProX USB Token Cryptographic Module + WatchData Technologies Pte Ltd + + View Contacts + +
+
FIPS 140-2Coordination
Ultrastar® DC HC550 and DC HC650 TCG Opal Self-Encrypting Drive + Western Digital Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Ultrastar® DC SN540 NVMe™ PCIe 3.0 Self Encrypting Drive + Western Digital Corporation + + View Contacts + +
+
FIPS 140-2In Review
Ultrastar® DC SN640 NVMe™ PCIe 3.0 Self-Encrypting Drive + Western Digital Technologies, Inc. + + View Contacts + +
+
FIPS 140-2Review Pending
Ultrastar® DC SN840 NVMe™ PCIe 3.0 Self Encrypting Drive + Western Digital Technologies, Inc. + + View Contacts + +
+
FIPS 140-2In Review
SecureDoc® Cryptographic Engine for macOS/Linux + WinMagic Corp + + View Contacts + +
+
FIPS 140-2Review Pending
SecureDoc® Cryptographic Engine for Windows + WinMagic Corp + + View Contacts + +
+
FIPS 140-2Review Pending
KeyVault Hardware Security Module (kvHSM) + WiSECURE Technologies + + View Contacts + +
+
FIPS 140-2Review Pending
VaultIC™ 405 1.2.6 + WISeKey Semiconductors + + View Contacts + +
+
FIPS 140-2Review Pending
VaultIC™ 405 1.2.6 + WISeKey Semiconductors + + View Contacts + +
+
FIPS 140-2Review Pending
ZBR-88W8887-WLAN + Zebra Technologies Corporation + + View Contacts + +
+
FIPS 140-2Review Pending
Zebra DCS Cryptographic Library + Zebra Technologies Corporation + + View Contacts + +
+
FIPS 140-3Review Pending
DHSSL Cryptographic Module + Zhejiang Dahua Technology Co., Ltd. + + View Contacts + +
+
FIPS 140-2Coordination
Displayed236
Not Displayed34
Total270
+ +
+ +
+ +
+
+ + Created October 11, 2016, Updated December 14, 2021 +
+
+ + + + + + + +
+ + + + + + + + + + + + + + + + diff --git a/tests/test_fips_iut.py b/tests/test_fips_iut.py new file mode 100644 index 00000000..3464ee41 --- /dev/null +++ b/tests/test_fips_iut.py @@ -0,0 +1,24 @@ +from pathlib import Path +from unittest import TestCase + +from sec_certs.dataset.fips_iut import IUTDataset +from sec_certs.sample.fips_iut import IUTSnapshot + + +class TestFIPSIUT(TestCase): + def setUp(self): + self.test_data_dir = Path(__file__).parent / "data" / "test_fips_iut" + self.test_data_dump = self.test_data_dir / "fips_iut_2020-10-25T06+01:00.html" + + def test_from_dumps(self): + dset = IUTDataset.from_dumps(self.test_data_dir) + self.assertIsNotNone(dset) + self.assertEqual(len(dset), 2) + + def test_from_dump(self): + snap = IUTSnapshot.from_dump(self.test_data_dump) + self.assertIsNotNone(snap) + + def test_from_web(self): + snap = IUTSnapshot.from_web() + self.assertIsNotNone(snap) diff --git a/tests/test_fips_mip.py b/tests/test_fips_mip.py new file mode 100644 index 00000000..bfd22bb2 --- /dev/null +++ b/tests/test_fips_mip.py @@ -0,0 +1,24 @@ +from pathlib import Path +from unittest import TestCase + +from sec_certs.dataset.fips_mip import MIPDataset +from sec_certs.sample.fips_mip import MIPSnapshot + + +class TestFIPSMIP(TestCase): + def setUp(self): + self.test_data_dir = Path(__file__).parent / "data" / "test_fips_mip" + self.test_data_dump = self.test_data_dir / "fips_mip_2021-02-19T06+01:00.html" + + def test_from_dumps(self): + dset = MIPDataset.from_dumps(self.test_data_dir) + self.assertIsNotNone(dset) + self.assertEqual(len(dset), 3) + + def test_from_dump(self): + snap = MIPSnapshot.from_dump(self.test_data_dump) + self.assertIsNotNone(snap) + + def test_from_web(self): + snap = MIPSnapshot.from_web() + self.assertIsNotNone(snap) -- cgit v1.3 From 699ae4babc3de9c71596a77d97453fac138af14f Mon Sep 17 00:00:00 2001 From: J08nY Date: Thu, 23 Dec 2021 21:17:06 +0100 Subject: Use dgst field for FIPS instead of cert_id. Fixes #125. --- sec_certs/dataset/fips.py | 54 +++++++++++--------- sec_certs/helpers.py | 4 ++ sec_certs/sample/fips.py | 10 ++-- tests/test_fips_oop.py | 125 ++++++++++++++++++++++++---------------------- 4 files changed, 104 insertions(+), 89 deletions(-) (limited to 'tests') diff --git a/sec_certs/dataset/fips.py b/sec_certs/dataset/fips.py index d1ce2dea..6a664544 100644 --- a/sec_certs/dataset/fips.py +++ b/sec_certs/dataset/fips.py @@ -15,6 +15,7 @@ from sec_certs import parallel_processing as cert_processing from sec_certs.config.configuration import config from sec_certs.dataset.dataset import Dataset from sec_certs.dataset.fips_algorithm import FIPSAlgorithmDataset +from sec_certs.helpers import fips_dgst from sec_certs.sample.certificate import Certificate from sec_certs.sample.fips import FIPSCertificate from sec_certs.serialization.json import ComplexSerializableType, serialize @@ -111,7 +112,7 @@ class FIPSDataset(Dataset, ComplexSerializableType): raise RuntimeError("You need to provide cert ids to FIPS download PDFs functionality.") for cert_id in cert_ids: if not (self.policies_dir / f"{cert_id}.pdf").exists() or ( - cert_id in self.certs and not self.certs[cert_id].state.txt_state + cert_id in self.certs and not self.certs[fips_dgst(cert_id)].state.txt_state ): sp_urls.append( f"https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp{cert_id}.pdf" @@ -221,20 +222,21 @@ class FIPSDataset(Dataset, ComplexSerializableType): return entries @serialize - def web_scan(self, cert_ids: Set[str], redo: bool = False): + def web_scan(self, cert_ids: Set[int], redo: bool = False): logger.info("Entering web scan.") for cert_id in cert_ids: - self.certs[cert_id] = FIPSCertificate.html_from_file( + dgst = fips_dgst(cert_id) + self.certs[dgst] = FIPSCertificate.html_from_file( self.web_dir / f"{cert_id}.html", FIPSCertificate.State( - (self.policies_dir / cert_id).with_suffix(".pdf"), - (self.web_dir / cert_id).with_suffix(".html"), - (self.fragments_dir / cert_id).with_suffix(".txt"), + (self.policies_dir / str(cert_id)).with_suffix(".pdf"), + (self.web_dir / str(cert_id)).with_suffix(".html"), + (self.fragments_dir / str(cert_id)).with_suffix(".txt"), False, None, False, ), - self.certs[cert_id] if cert_id in self.certs else None, + self.certs.get(dgst), redo=redo, ) @@ -356,7 +358,8 @@ class FIPSDataset(Dataset, ComplexSerializableType): # returns True if candidates should _not_ be matched def _compare_certs(self, current_certificate: "FIPSCertificate", other_id: str): - other_cert = self.certs[other_id] + other_dgst = fips_dgst(other_id) + other_cert = self.certs[other_dgst] if ( current_certificate.web_scan.date_validation is None or other_cert is None @@ -395,29 +398,30 @@ class FIPSDataset(Dataset, ComplexSerializableType): and cert_id != current_cert.cert_id ] - def _validate_id(self, processed_cert: FIPSCertificate, cert_candidate: str) -> bool: - if cert_candidate not in self.certs or not cert_candidate.isdecimal(): + def _validate_id(self, processed_cert: FIPSCertificate, cert_candidate_id: str) -> bool: + candidate_dgst = fips_dgst(cert_candidate_id) + if candidate_dgst not in self.certs or not cert_candidate_id.isdecimal(): return False # "< number" still needs to be used, because of some old certs being revalidated - if int(cert_candidate) < config.smallest_certificate_id_to_connect or self._compare_certs( - processed_cert, cert_candidate + if int(cert_candidate_id) < config.smallest_certificate_id_to_connect or self._compare_certs( + processed_cert, cert_candidate_id ): return False if self.algorithms is None: raise RuntimeError("Dataset was probably not built correctly - this should not be happening.") - if cert_candidate not in self.algorithms.certs: + if cert_candidate_id not in self.algorithms.certs: return True for cert_alg in processed_cert.heuristics.algorithms: for certificate in cert_alg["Certificate"]: curr_id = "".join(filter(str.isdigit, certificate)) - if curr_id == cert_candidate: + if curr_id == cert_candidate_id: return False - algs = self.algorithms.certs[cert_candidate] + algs = self.algorithms.certs[candidate_dgst] for current_alg in algs: if current_alg.vendor is None or processed_cert.web_scan.vendor is None: raise RuntimeError("Dataset was probably not built correctly - this should not be happening.") @@ -476,8 +480,8 @@ class FIPSDataset(Dataset, ComplexSerializableType): self.compute_cpe_heuristics() self.compute_related_cves(use_nist_cpe_matching_dict=use_nist_cpe_matching_dict) - def _highlight_vendor_in_dot(self, dot: Digraph, current_key: str, highlighted_vendor: str): - current_cert = self.certs[current_key] + def _highlight_vendor_in_dot(self, dot: Digraph, current_dgst: str, highlighted_vendor: str): + current_cert = self.certs[current_dgst] if current_cert.web_scan.vendor != highlighted_vendor: return @@ -488,24 +492,24 @@ class FIPSDataset(Dataset, ComplexSerializableType): if current_cert.web_scan.status == "Historical": dot.attr("node", color="gold3") - def _add_colored_node(self, dot: Digraph, current_key: str, highlighted_vendor: str): - current_cert = self.certs[current_key] + def _add_colored_node(self, dot: Digraph, current_dgst: str, highlighted_vendor: str): + current_cert = self.certs[current_dgst] dot.attr("node", color="lightgreen") if current_cert.web_scan.status == "Revoked": dot.attr("node", color="lightgrey") if current_cert.web_scan.status == "Historical": dot.attr("node", color="gold") - self._highlight_vendor_in_dot(dot, current_key, highlighted_vendor) + self._highlight_vendor_in_dot(dot, current_dgst, highlighted_vendor) dot.node( - current_key, - label=current_key + " " + current_cert.web_scan.vendor + str(current_cert.cert_id), + label=str(current_cert.cert_id) + " " + current_cert.web_scan.vendor if current_cert.web_scan.vendor is not None else "" + " " + (current_cert.web_scan.module_name if current_cert.web_scan.module_name else ""), ) - def _get_processed_list(self, connection_list: str, key: str): + def _get_processed_list(self, connection_list: str, dgst: str): attr = {"pdf": "pdf_scan", "web": "web_scan", "heuristics": "heuristics"}[connection_list] - return getattr(self.certs[key], attr).connections + return getattr(self.certs[dgst], attr).connections def get_dot_graph( self, @@ -537,6 +541,7 @@ class FIPSDataset(Dataset, ComplexSerializableType): for key in self.certs: cert = self.certs[key] + # TODO: What? How can a key from self.certs be "Not Found"? if key == "Not found" or not cert.state.file_status: continue @@ -558,6 +563,7 @@ class FIPSDataset(Dataset, ComplexSerializableType): for key in self.certs: cert = self.certs[key] + # TODO: What? How can a key from self.certs be "Not Found"? if key == "Not found" or not cert.state.file_status: continue processed = self._get_processed_list(connection_list, key) diff --git a/sec_certs/helpers.py b/sec_certs/helpers.py index 3637fe38..1cc60368 100644 --- a/sec_certs/helpers.py +++ b/sec_certs/helpers.py @@ -71,6 +71,10 @@ def download_parallel(items: Sequence[Tuple[str, Path]], num_threads: int) -> Se return responses +def fips_dgst(cert_id: Union[int, str]): + return get_first_16_bytes_sha256(str(cert_id)) + + def get_first_16_bytes_sha256(string: str) -> str: return hashlib.sha256(string.encode("utf-8")).hexdigest()[:16] diff --git a/sec_certs/sample/fips.py b/sec_certs/sample/fips.py index b66d11df..5c47c4d7 100644 --- a/sec_certs/sample/fips.py +++ b/sec_certs/sample/fips.py @@ -16,7 +16,7 @@ from sec_certs.cert_rules import REGEXEC_SEP, fips_common_rules, fips_rules from sec_certs.config.configuration import config from sec_certs.constants import LINE_SEPARATOR from sec_certs.dataset.cpe import CPEDataset -from sec_certs.helpers import load_cert_file, normalize_match_string, save_modified_cert_file +from sec_certs.helpers import fips_dgst, load_cert_file, normalize_match_string, save_modified_cert_file from sec_certs.model.cpe_matching import CPEClassifier from sec_certs.sample.certificate import Certificate, logger from sec_certs.sample.cpe import CPE @@ -193,7 +193,7 @@ class FIPSCertificate(Certificate, ComplexSerializableType): @property def dgst(self) -> str: - return self.cert_id + return fips_dgst(self.cert_id) @property def label_studio_title(self): @@ -219,7 +219,7 @@ class FIPSCertificate(Certificate, ComplexSerializableType): def __init__( self, - cert_id: str, + cert_id: int, web_scan: "FIPSCertificate.WebScan", pdf_scan: "FIPSCertificate.PdfScan", heuristics: "FIPSCertificate.FIPSHeuristics", @@ -440,7 +440,7 @@ class FIPSCertificate(Certificate, ComplexSerializableType): } if not initialized: items_found = FIPSCertificate.initialize_dictionary() - items_found["cert_id"] = file.stem + items_found["cert_id"] = int(file.stem) else: items_found = initialized.web_scan.__dict__ items_found["cert_id"] = initialized.cert_id @@ -454,7 +454,7 @@ class FIPSCertificate(Certificate, ComplexSerializableType): if redo: items_found = FIPSCertificate.initialize_dictionary() - items_found["cert_id"] = file.stem + items_found["cert_id"] = int(file.stem) text = helpers.load_cert_html_file(file) soup = BeautifulSoup(text, "html.parser") diff --git a/tests/test_fips_oop.py b/tests/test_fips_oop.py index 17b3325a..bb592e08 100644 --- a/tests/test_fips_oop.py +++ b/tests/test_fips_oop.py @@ -8,6 +8,7 @@ import tests.data.test_fips_oop from sec_certs.config.configuration import config from sec_certs.dataset.fips import FIPSDataset from sec_certs.dataset.fips_algorithm import FIPSAlgorithmDataset +from sec_certs.helpers import fips_dgst from tests.fips_test_utils import generate_html @@ -112,84 +113,88 @@ class TestFipsOOP(TestCase): with TemporaryDirectory() as tmp_dir: dataset = _set_up_dataset_for_full(tmp_dir, certs, self.cpe_dset_path, self.cve_dset_path) - self.assertEqual(set(dataset.certs["3095"].heuristics.connections), {"3093", "3096", "3094"}) - self.assertEqual(set(dataset.certs["3651"].heuristics.connections), {"3615"}) - self.assertEqual(set(dataset.certs["3093"].heuristics.connections), {"3090", "3091"}) - self.assertEqual(set(dataset.certs["3090"].heuristics.connections), {"3089"}) + self.assertEqual(set(dataset.certs[fips_dgst("3095")].heuristics.connections), {"3093", "3096", "3094"}) + self.assertEqual(set(dataset.certs[fips_dgst("3651")].heuristics.connections), {"3615"}) + self.assertEqual(set(dataset.certs[fips_dgst("3093")].heuristics.connections), {"3090", "3091"}) + self.assertEqual(set(dataset.certs[fips_dgst("3090")].heuristics.connections), {"3089"}) self.assertEqual( - set(dataset.certs["3197"].heuristics.connections), {x for x in ["3195", "3096", "3196", "3644", "3651"]} + set(dataset.certs[fips_dgst("3197")].heuristics.connections), + {x for x in ["3195", "3096", "3196", "3644", "3651"]}, ) self.assertEqual( - set(dataset.certs["3196"].heuristics.connections), {x for x in ["3194", "3091", "3480", "3615"]} + set(dataset.certs[fips_dgst("3196")].heuristics.connections), + {x for x in ["3194", "3091", "3480", "3615"]}, ) - self.assertEqual(set(dataset.certs["3089"].heuristics.connections), set()) - self.assertEqual(set(dataset.certs["3195"].heuristics.connections), {"3194", "3091", "3480"}) - self.assertEqual(set(dataset.certs["3480"].heuristics.connections), {"3089"}) - self.assertEqual(set(dataset.certs["3615"].heuristics.connections), {"3089"}) - self.assertEqual(set(dataset.certs["3194"].heuristics.connections), {"3089"}) - self.assertEqual(set(dataset.certs["3091"].heuristics.connections), {"3089"}) - self.assertEqual(set(dataset.certs["3690"].heuristics.connections), {"3644", "3196", "3651"}) - self.assertEqual(set(dataset.certs["3644"].heuristics.connections), {"3615"}) - self.assertEqual(set(dataset.certs["3527"].heuristics.connections), {"3090", "3091"}) - self.assertEqual(set(dataset.certs["3094"].heuristics.connections), {"3090", "3091"}) - self.assertEqual(set(dataset.certs["3544"].heuristics.connections), {"3093", "3096", "3527"}) - self.assertEqual(set(dataset.certs["3096"].heuristics.connections), {"3090", "3194", "3091", "3480"}) + self.assertEqual(set(dataset.certs[fips_dgst("3089")].heuristics.connections), set()) + self.assertEqual(set(dataset.certs[fips_dgst("3195")].heuristics.connections), {"3194", "3091", "3480"}) + self.assertEqual(set(dataset.certs[fips_dgst("3480")].heuristics.connections), {"3089"}) + self.assertEqual(set(dataset.certs[fips_dgst("3615")].heuristics.connections), {"3089"}) + self.assertEqual(set(dataset.certs[fips_dgst("3194")].heuristics.connections), {"3089"}) + self.assertEqual(set(dataset.certs[fips_dgst("3091")].heuristics.connections), {"3089"}) + self.assertEqual(set(dataset.certs[fips_dgst("3690")].heuristics.connections), {"3644", "3196", "3651"}) + self.assertEqual(set(dataset.certs[fips_dgst("3644")].heuristics.connections), {"3615"}) + self.assertEqual(set(dataset.certs[fips_dgst("3527")].heuristics.connections), {"3090", "3091"}) + self.assertEqual(set(dataset.certs[fips_dgst("3094")].heuristics.connections), {"3090", "3091"}) + self.assertEqual(set(dataset.certs[fips_dgst("3544")].heuristics.connections), {"3093", "3096", "3527"}) self.assertEqual( - set(dataset.certs["3092"].heuristics.connections), {"3093", "3195", "3096", "3644", "3651"} + set(dataset.certs[fips_dgst("3096")].heuristics.connections), {"3090", "3194", "3091", "3480"} + ) + self.assertEqual( + set(dataset.certs[fips_dgst("3092")].heuristics.connections), {"3093", "3195", "3096", "3644", "3651"} ) def test_connections_redhat(self): certs = self.certs_to_parse["redhat"] with TemporaryDirectory() as tmp_dir: dataset = _set_up_dataset_for_full(tmp_dir, certs, self.cpe_dset_path, self.cve_dset_path) - self.assertEqual(set(dataset.certs["2630"].heuristics.connections), {"2441"}) - self.assertEqual(set(dataset.certs["2633"].heuristics.connections), {"2441"}) - self.assertEqual(set(dataset.certs["2441"].heuristics.connections), set()) - self.assertEqual(set(dataset.certs["2997"].heuristics.connections), {"2711"}) - self.assertEqual(set(dataset.certs["2446"].heuristics.connections), {"2441"}) - self.assertEqual(set(dataset.certs["2447"].heuristics.connections), {"2441"}) - self.assertEqual(set(dataset.certs["3733"].heuristics.connections), {"2441"}) - self.assertEqual(set(dataset.certs["2441"].heuristics.connections), set()) - self.assertEqual(set(dataset.certs["2711"].heuristics.connections), set()) - self.assertEqual(set(dataset.certs["2908"].heuristics.connections), {"2711"}) - self.assertEqual(set(dataset.certs["3613"].heuristics.connections), {"2997"}) - self.assertEqual(set(dataset.certs["2721"].heuristics.connections), {"2441", "2711"}) - self.assertEqual(set(dataset.certs["2798"].heuristics.connections), {"2721", "2711"}) - self.assertEqual(set(dataset.certs["2711"].heuristics.connections), set()) - self.assertEqual(set(dataset.certs["2997"].heuristics.connections), {"2711"}) - self.assertEqual(set(dataset.certs["2742"].heuristics.connections), {"2721", "2711"}) - self.assertEqual(set(dataset.certs["2721"].heuristics.connections), {"2441", "2711"}) + self.assertEqual(set(dataset.certs[fips_dgst("2630")].heuristics.connections), {"2441"}) + self.assertEqual(set(dataset.certs[fips_dgst("2633")].heuristics.connections), {"2441"}) + self.assertEqual(set(dataset.certs[fips_dgst("2441")].heuristics.connections), set()) + self.assertEqual(set(dataset.certs[fips_dgst("2997")].heuristics.connections), {"2711"}) + self.assertEqual(set(dataset.certs[fips_dgst("2446")].heuristics.connections), {"2441"}) + self.assertEqual(set(dataset.certs[fips_dgst("2447")].heuristics.connections), {"2441"}) + self.assertEqual(set(dataset.certs[fips_dgst("3733")].heuristics.connections), {"2441"}) + self.assertEqual(set(dataset.certs[fips_dgst("2441")].heuristics.connections), set()) + self.assertEqual(set(dataset.certs[fips_dgst("2711")].heuristics.connections), set()) + self.assertEqual(set(dataset.certs[fips_dgst("2908")].heuristics.connections), {"2711"}) + self.assertEqual(set(dataset.certs[fips_dgst("3613")].heuristics.connections), {"2997"}) + self.assertEqual(set(dataset.certs[fips_dgst("2721")].heuristics.connections), {"2441", "2711"}) + self.assertEqual(set(dataset.certs[fips_dgst("2798")].heuristics.connections), {"2721", "2711"}) + self.assertEqual(set(dataset.certs[fips_dgst("2711")].heuristics.connections), set()) + self.assertEqual(set(dataset.certs[fips_dgst("2997")].heuristics.connections), {"2711"}) + self.assertEqual(set(dataset.certs[fips_dgst("2742")].heuristics.connections), {"2721", "2711"}) + self.assertEqual(set(dataset.certs[fips_dgst("2721")].heuristics.connections), {"2441", "2711"}) def test_docusign_chunk(self): certs = self.certs_to_parse["docusign"] with TemporaryDirectory() as tmp_dir: dataset = _set_up_dataset_for_full(tmp_dir, certs, self.cpe_dset_path, self.cve_dset_path) - self.assertEqual(set(dataset.certs["3850"].heuristics.connections), {"3518", "1883"}) - self.assertEqual(set(dataset.certs["2779"].heuristics.connections), {"1883"}) - self.assertEqual(set(dataset.certs["2860"].heuristics.connections), {"1883"}) - self.assertEqual(set(dataset.certs["2665"].heuristics.connections), {"1883"}) - self.assertEqual(set(dataset.certs["1883"].heuristics.connections), set()) - self.assertEqual(set(dataset.certs["3518"].heuristics.connections), {"1883"}) - self.assertEqual(set(dataset.certs["3141"].heuristics.connections), {"1883"}) - self.assertEqual(set(dataset.certs["2590"].heuristics.connections), {"1883"}) + self.assertEqual(set(dataset.certs[fips_dgst("3850")].heuristics.connections), {"3518", "1883"}) + self.assertEqual(set(dataset.certs[fips_dgst("2779")].heuristics.connections), {"1883"}) + self.assertEqual(set(dataset.certs[fips_dgst("2860")].heuristics.connections), {"1883"}) + self.assertEqual(set(dataset.certs[fips_dgst("2665")].heuristics.connections), {"1883"}) + self.assertEqual(set(dataset.certs[fips_dgst("1883")].heuristics.connections), set()) + self.assertEqual(set(dataset.certs[fips_dgst("3518")].heuristics.connections), {"1883"}) + self.assertEqual(set(dataset.certs[fips_dgst("3141")].heuristics.connections), {"1883"}) + self.assertEqual(set(dataset.certs[fips_dgst("2590")].heuristics.connections), {"1883"}) def test_openssl_chunk(self): certs = self.certs_to_parse["referencing_openssl"] with TemporaryDirectory() as tmp_dir: dataset = _set_up_dataset_for_full(tmp_dir, certs, self.cpe_dset_path, self.cve_dset_path) - self.assertEqual(set(dataset.certs["3493"].heuristics.connections), {"2398"}) - self.assertEqual(set(dataset.certs["3495"].heuristics.connections), {"2398"}) - self.assertEqual(set(dataset.certs["3711"].heuristics.connections), {"3220"}) - self.assertEqual(set(dataset.certs["3176"].heuristics.connections), {"2398"}) - self.assertEqual(set(dataset.certs["3488"].heuristics.connections), {"2398"}) - self.assertEqual(set(dataset.certs["3126"].heuristics.connections), {"3126", "2398"}) - self.assertEqual(set(dataset.certs["3269"].heuristics.connections), {"3269", "3220"}) - self.assertEqual(set(dataset.certs["3524"].heuristics.connections), {"3220"}) - self.assertEqual(set(dataset.certs["3220"].heuristics.connections), {"3220", "2398"}) - self.assertEqual(set(dataset.certs["2398"].heuristics.connections), set()) - self.assertEqual(set(dataset.certs["3543"].heuristics.connections), {"2398"}) - self.assertEqual(set(dataset.certs["2676"].heuristics.connections), {"2398"}) - self.assertEqual(set(dataset.certs["3313"].heuristics.connections), {"3313", "3220"}) - self.assertEqual(set(dataset.certs["3363"].heuristics.connections), set()) - self.assertEqual(set(dataset.certs["3608"].heuristics.connections), {"2398"}) - self.assertEqual(set(dataset.certs["3158"].heuristics.connections), {"2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("3493")].heuristics.connections), {"2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("3495")].heuristics.connections), {"2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("3711")].heuristics.connections), {"3220"}) + self.assertEqual(set(dataset.certs[fips_dgst("3176")].heuristics.connections), {"2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("3488")].heuristics.connections), {"2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("3126")].heuristics.connections), {"3126", "2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("3269")].heuristics.connections), {"3269", "3220"}) + self.assertEqual(set(dataset.certs[fips_dgst("3524")].heuristics.connections), {"3220"}) + self.assertEqual(set(dataset.certs[fips_dgst("3220")].heuristics.connections), {"3220", "2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("2398")].heuristics.connections), set()) + self.assertEqual(set(dataset.certs[fips_dgst("3543")].heuristics.connections), {"2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("2676")].heuristics.connections), {"2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("3313")].heuristics.connections), {"3313", "3220"}) + self.assertEqual(set(dataset.certs[fips_dgst("3363")].heuristics.connections), set()) + self.assertEqual(set(dataset.certs[fips_dgst("3608")].heuristics.connections), {"2398"}) + self.assertEqual(set(dataset.certs[fips_dgst("3158")].heuristics.connections), {"2398"}) -- cgit v1.3 From b06937c4dbe03685dff34ac6d67d9f3b7b68f849 Mon Sep 17 00:00:00 2001 From: J08nY Date: Thu, 23 Dec 2021 21:33:21 +0100 Subject: Add regression test for #125. --- tests/test_fips_oop.py | 7 +++++++ 1 file changed, 7 insertions(+) (limited to 'tests') diff --git a/tests/test_fips_oop.py b/tests/test_fips_oop.py index bb592e08..0f56b1e6 100644 --- a/tests/test_fips_oop.py +++ b/tests/test_fips_oop.py @@ -102,6 +102,13 @@ class TestFipsOOP(TestCase): def setUpClass(cls) -> None: config.load(cls.data_dir.parent / "settings_test.yaml") + def test_regress_125(self): + with TemporaryDirectory() as tmp_dir: + dst = _set_up_dataset(tmp_dir, ["3493", "3495"]) + self.assertEqual(set(dst.certs), {fips_dgst("3493"), fips_dgst("3495")}) + self.assertIsInstance(dst.certs[fips_dgst("3493")].cert_id, int) + self.assertEqual(dst.certs[fips_dgst("3493")].cert_id, 3493) + def test_size(self): for certs in self.certs_to_parse.values(): with TemporaryDirectory() as tmp_dir: -- cgit v1.3 From 593642c878c91c34183a003c2212ee4a932a99af Mon Sep 17 00:00:00 2001 From: J08nY Date: Sat, 25 Dec 2021 18:33:27 +0100 Subject: Fix typehints and naming. --- sec_certs/dataset/fips_iut.py | 6 +++--- sec_certs/dataset/fips_mip.py | 6 +++--- sec_certs/helpers.py | 15 ++++++++------- sec_certs/sample/fips_iut.py | 8 ++++---- sec_certs/sample/fips_mip.py | 8 ++++---- tests/test_fips_iut.py | 6 +++--- tests/test_fips_mip.py | 6 +++--- 7 files changed, 28 insertions(+), 27 deletions(-) (limited to 'tests') diff --git a/sec_certs/dataset/fips_iut.py b/sec_certs/dataset/fips_iut.py index a9fcf6f3..a9a4da40 100644 --- a/sec_certs/dataset/fips_iut.py +++ b/sec_certs/dataset/fips_iut.py @@ -1,6 +1,6 @@ from dataclasses import dataclass from pathlib import Path -from typing import List, Mapping, Union +from typing import Dict, Iterator, List, Mapping, Union from sec_certs.dataset.dataset import logger from sec_certs.helpers import tqdm @@ -12,7 +12,7 @@ from sec_certs.serialization.json import ComplexSerializableType class IUTDataset(ComplexSerializableType): snapshots: List[IUTSnapshot] - def __iter__(self): + def __iter__(self) -> Iterator[IUTSnapshot]: yield from self.snapshots def __getitem__(self, item: int) -> IUTSnapshot: @@ -33,7 +33,7 @@ class IUTDataset(ComplexSerializableType): logger.error(e) return cls(snapshots) - def to_dict(self): + def to_dict(self) -> Dict[str, List[IUTSnapshot]]: return {"snapshots": list(self.snapshots)} @classmethod diff --git a/sec_certs/dataset/fips_mip.py b/sec_certs/dataset/fips_mip.py index 64b9388e..e014d15b 100644 --- a/sec_certs/dataset/fips_mip.py +++ b/sec_certs/dataset/fips_mip.py @@ -1,6 +1,6 @@ from dataclasses import dataclass from pathlib import Path -from typing import List, Mapping, Union +from typing import Dict, Iterator, List, Mapping, Union from sec_certs.dataset.dataset import logger from sec_certs.helpers import tqdm @@ -12,7 +12,7 @@ from sec_certs.serialization.json import ComplexSerializableType class MIPDataset(ComplexSerializableType): snapshots: List[MIPSnapshot] - def __iter__(self): + def __iter__(self) -> Iterator[MIPSnapshot]: yield from self.snapshots def __getitem__(self, item: int) -> MIPSnapshot: @@ -33,7 +33,7 @@ class MIPDataset(ComplexSerializableType): logger.error(e) return cls(snapshots) - def to_dict(self): + def to_dict(self) -> Dict[str, List[MIPSnapshot]]: return {"snapshots": list(self.snapshots)} @classmethod diff --git a/sec_certs/helpers.py b/sec_certs/helpers.py index 231cd552..5e28bde4 100644 --- a/sec_certs/helpers.py +++ b/sec_certs/helpers.py @@ -5,7 +5,7 @@ import os import re import subprocess import time -from datetime import date +from datetime import date, datetime from enum import Enum from multiprocessing.pool import ThreadPool from pathlib import Path @@ -224,12 +224,13 @@ def extract_pdf_metadata(filepath: Path): return constants.RETURNCODE_OK, metadata -def to_utc(dt): - if dt.utcoffset() is None: - return dt - dt -= dt.utcoffset() - dt = dt.replace(tzinfo=None) - return dt +def to_utc(timestamp: datetime) -> datetime: + offset = timestamp.utcoffset() + if offset is None: + return timestamp + timestamp -= offset + timestamp = timestamp.replace(tzinfo=None) + return timestamp # TODO: Please, refactor me. I reallyyyyyyyyyyyyy need it!!!!!! diff --git a/sec_certs/sample/fips_iut.py b/sec_certs/sample/fips_iut.py index b26f6458..207ea637 100644 --- a/sec_certs/sample/fips_iut.py +++ b/sec_certs/sample/fips_iut.py @@ -1,7 +1,7 @@ from dataclasses import dataclass from datetime import date, datetime from pathlib import Path -from typing import Iterator, Mapping, Optional, Set, Union +from typing import Dict, Iterator, List, Mapping, Optional, Set, Union import requests from bs4 import BeautifulSoup, Tag @@ -17,7 +17,7 @@ class IUTEntry(ComplexSerializableType): standard: str iut_date: date - def to_dict(self): + def to_dict(self) -> Dict[str, str]: return {**self.__dict__, "iut_date": self.iut_date.isoformat()} @classmethod @@ -39,13 +39,13 @@ class IUTSnapshot(ComplexSerializableType): not_displayed: Optional[int] total: Optional[int] - def __len__(self): + def __len__(self) -> int: return len(self.entries) def __iter__(self) -> Iterator[IUTEntry]: yield from self.entries - def to_dict(self): + def to_dict(self) -> Dict[str, Union[Optional[int], List[IUTEntry], str]]: return { "entries": list(self.entries), "timestamp": self.timestamp.isoformat(), diff --git a/sec_certs/sample/fips_mip.py b/sec_certs/sample/fips_mip.py index 1ab31b62..acbe7e26 100644 --- a/sec_certs/sample/fips_mip.py +++ b/sec_certs/sample/fips_mip.py @@ -3,7 +3,7 @@ from dataclasses import dataclass from datetime import date, datetime from enum import Enum from pathlib import Path -from typing import Iterator, Mapping, Optional, Set, Union +from typing import Dict, Iterator, List, Mapping, Optional, Set, Union import requests from bs4 import BeautifulSoup, Tag @@ -28,7 +28,7 @@ class MIPEntry(ComplexSerializableType): standard: str status: Optional[MIPStatus] - def to_dict(self): + def to_dict(self) -> Dict[str, Union[str, Optional[MIPStatus]]]: return {**self.__dict__, "status": self.status.value if self.status else None} @classmethod @@ -50,13 +50,13 @@ class MIPSnapshot(ComplexSerializableType): not_displayed: int total: int - def __len__(self): + def __len__(self) -> int: return len(self.entries) def __iter__(self) -> Iterator[MIPEntry]: yield from self.entries - def to_dict(self): + def to_dict(self) -> Dict[str, Union[int, str, List[MIPEntry]]]: return { "entries": list(self.entries), "timestamp": self.timestamp.isoformat(), diff --git a/tests/test_fips_iut.py b/tests/test_fips_iut.py index 3464ee41..7aeeba12 100644 --- a/tests/test_fips_iut.py +++ b/tests/test_fips_iut.py @@ -1,4 +1,5 @@ from pathlib import Path +from typing import ClassVar from unittest import TestCase from sec_certs.dataset.fips_iut import IUTDataset @@ -6,9 +7,8 @@ from sec_certs.sample.fips_iut import IUTSnapshot class TestFIPSIUT(TestCase): - def setUp(self): - self.test_data_dir = Path(__file__).parent / "data" / "test_fips_iut" - self.test_data_dump = self.test_data_dir / "fips_iut_2020-10-25T06+01:00.html" + test_data_dir: ClassVar[Path] = Path(__file__).parent / "data" / "test_fips_iut" + test_data_dump: ClassVar[Path] = test_data_dir / "fips_iut_2020-10-25T06+01:00.html" def test_from_dumps(self): dset = IUTDataset.from_dumps(self.test_data_dir) diff --git a/tests/test_fips_mip.py b/tests/test_fips_mip.py index bfd22bb2..82c7ead1 100644 --- a/tests/test_fips_mip.py +++ b/tests/test_fips_mip.py @@ -1,4 +1,5 @@ from pathlib import Path +from typing import ClassVar from unittest import TestCase from sec_certs.dataset.fips_mip import MIPDataset @@ -6,9 +7,8 @@ from sec_certs.sample.fips_mip import MIPSnapshot class TestFIPSMIP(TestCase): - def setUp(self): - self.test_data_dir = Path(__file__).parent / "data" / "test_fips_mip" - self.test_data_dump = self.test_data_dir / "fips_mip_2021-02-19T06+01:00.html" + test_data_dir: ClassVar[Path] = Path(__file__).parent / "data" / "test_fips_mip" + test_data_dump: ClassVar[Path] = test_data_dir / "fips_mip_2021-02-19T06+01:00.html" def test_from_dumps(self): dset = MIPDataset.from_dumps(self.test_data_dir) -- cgit v1.3 From ae7d1873f227177b895c475fad4a5d387538e7e8 Mon Sep 17 00:00:00 2001 From: J08nY Date: Sun, 26 Dec 2021 17:14:56 +0100 Subject: Add slots to CVE and CPE objects. Fixes #109. Also adds a test loading the CVE database from the web. --- pyproject.toml | 8 +++++++- sec_certs/sample/cpe.py | 3 +++ sec_certs/sample/cve.py | 9 +++++++-- tests/test_cve.py | 14 ++++++++++++++ 4 files changed, 31 insertions(+), 3 deletions(-) create mode 100644 tests/test_cve.py (limited to 'tests') diff --git a/pyproject.toml b/pyproject.toml index 031110f1..53b1f9bd 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -26,4 +26,10 @@ skip=["certsvenv", "build"] [tool.mypy] plugins = ["numpy.typing.mypy_plugin"] ignore_missing_imports = true -exclude="build/" \ No newline at end of file +exclude="build/" + +[tool.pytest.ini_options] +markers = [ + "slow: marks tests as slow (deselect with '-m \"not slow\"')" +] +addopts = "--cov sec_certs" diff --git a/sec_certs/sample/cpe.py b/sec_certs/sample/cpe.py index aeab6dc9..88dd27d6 100644 --- a/sec_certs/sample/cpe.py +++ b/sec_certs/sample/cpe.py @@ -15,6 +15,8 @@ class CPE(PandasSerializableType, ComplexSerializableType): start_version: Optional[Tuple[str, str]] end_version: Optional[Tuple[str, str]] + __slots__ = ["uri", "title", "version", "vendor", "item_name", "start_version", "end_version"] + pandas_columns: ClassVar[List[str]] = [ "uri", "vendor", @@ -32,6 +34,7 @@ class CPE(PandasSerializableType, ComplexSerializableType): start_version: Optional[Tuple[str, str]] = None, end_version: Optional[Tuple[str, str]] = None, ): + super().__init__() self.uri = uri self.title = title self.start_version = start_version diff --git a/sec_certs/sample/cve.py b/sec_certs/sample/cve.py index 2bc28c4a..a19a3373 100644 --- a/sec_certs/sample/cve.py +++ b/sec_certs/sample/cve.py @@ -16,9 +16,11 @@ class CVE(PandasSerializableType, ComplexSerializableType): class Impact(ComplexSerializableType): base_score: float severity: str - explotability_score: float + exploitability_score: float impact_score: float + __slots__ = ["base_score", "severity", "exploitability_score", "impact_score"] + @classmethod def from_nist_dict(cls, dct: Dict): """ @@ -46,6 +48,8 @@ class CVE(PandasSerializableType, ComplexSerializableType): impact: Impact published_date: Optional[datetime.datetime] + __slots__ = ["cve_id", "vulnerable_cpes", "impact", "published_date"] + pandas_columns: ClassVar[List[str]] = [ "cve_id", "vulnerable_cpes", @@ -57,6 +61,7 @@ class CVE(PandasSerializableType, ComplexSerializableType): ] def __init__(self, cve_id: str, vulnerable_cpes: List[CPE], impact: Impact, published_date: str): + super().__init__() self.cve_id = cve_id self.vulnerable_cpes = vulnerable_cpes self.impact = impact @@ -87,7 +92,7 @@ class CVE(PandasSerializableType, ComplexSerializableType): self.vulnerable_cpes, self.impact.base_score, self.impact.severity, - self.impact.explotability_score, + self.impact.exploitability_score, self.impact.impact_score, self.published_date, ) diff --git a/tests/test_cve.py b/tests/test_cve.py new file mode 100644 index 00000000..3bf9c4bb --- /dev/null +++ b/tests/test_cve.py @@ -0,0 +1,14 @@ +from unittest import TestCase + +import pytest + +from sec_certs.dataset.cve import CVEDataset + + +class TestCVE(TestCase): + @pytest.mark.slow + def test_from_web(self): + dset = CVEDataset.from_web() + assert dset is not None + assert "CVE-2019-15809" in dset.cves + assert "CVE-2017-15361" in dset.cves -- cgit v1.3 From 62847616bd4d13c3d2e60e0b5c9ce67bd787d8e2 Mon Sep 17 00:00:00 2001 From: J08nY Date: Sun, 26 Dec 2021 17:52:05 +0100 Subject: Add pytest-monitor and pytest-profiling to dev deps. --- .gitignore | 2 ++ dev_requirements.txt | 4 ++++ tests/test_cve.py | 5 ++--- 3 files changed, 8 insertions(+), 3 deletions(-) (limited to 'tests') diff --git a/.gitignore b/.gitignore index f6054f09..3176de71 100644 --- a/.gitignore +++ b/.gitignore @@ -54,6 +54,8 @@ coverage.xml *.cover .hypothesis/ .pytest_cache/ +prof/ +.pymon # Translations *.mo diff --git a/dev_requirements.txt b/dev_requirements.txt index edb5f93a..f2cceafd 100644 --- a/dev_requirements.txt +++ b/dev_requirements.txt @@ -2,6 +2,10 @@ mypy types-PyYAML types-python-dateutil types-requests +pytest==6.2.5 +pytest-cov==3.0.0 +pytest-monitor==1.6.3 +pytest-profiling==1.7.0 black isort==5.10.1 flake8==4.0.1 diff --git a/tests/test_cve.py b/tests/test_cve.py index 3bf9c4bb..6c84ace3 100644 --- a/tests/test_cve.py +++ b/tests/test_cve.py @@ -1,12 +1,11 @@ -from unittest import TestCase - import pytest from sec_certs.dataset.cve import CVEDataset -class TestCVE(TestCase): +class TestCVE: @pytest.mark.slow + @pytest.mark.monitor_test def test_from_web(self): dset = CVEDataset.from_web() assert dset is not None -- cgit v1.3 From 3338b04b6c95a26ca0a66c3764afb3efefce0dce Mon Sep 17 00:00:00 2001 From: J08nY Date: Sun, 26 Dec 2021 18:43:28 +0100 Subject: Add CPE dataset test. --- tests/test_cpe.py | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 tests/test_cpe.py (limited to 'tests') diff --git a/tests/test_cpe.py b/tests/test_cpe.py new file mode 100644 index 00000000..e2f1fdb9 --- /dev/null +++ b/tests/test_cpe.py @@ -0,0 +1,16 @@ +from pathlib import Path +from tempfile import TemporaryDirectory + +import pytest + +from sec_certs.dataset.cpe import CPEDataset + + +class TestCPE: + @pytest.mark.slow + @pytest.mark.monitor_test + def test_from_web(self): + with TemporaryDirectory() as tmpdir: + dset = CPEDataset.from_web(Path(tmpdir) / "cpe.json") + assert dset is not None + assert "cpe:2.3:o:infineon:trusted_platform_firmware:6.40:*:*:*:*:*:*:*" in dset.cpes -- cgit v1.3 From 35b77a2f1cd891d18c5984068c2f45fdcc1656ce Mon Sep 17 00:00:00 2001 From: J08nY Date: Mon, 3 Jan 2022 20:19:04 +0100 Subject: Fix broken serialization of CVE and CPE objects. --- sec_certs/sample/cve.py | 8 ++++++++ sec_certs/serialization/json.py | 6 ++++++ tests/test_cpe.py | 14 ++++++++++++++ tests/test_cve.py | 27 +++++++++++++++++++++++++++ 4 files changed, 55 insertions(+) (limited to 'tests') diff --git a/sec_certs/sample/cve.py b/sec_certs/sample/cve.py index 080a4e51..e6332785 100644 --- a/sec_certs/sample/cve.py +++ b/sec_certs/sample/cve.py @@ -97,6 +97,14 @@ class CVE(PandasSerializableType, ComplexSerializableType): self.published_date, ) + def to_dict(self): + return { + "cve_id": self.cve_id, + "impact": self.impact, + "vulnerable_cpes": self.vulnerable_cpes, + "published_date": self.published_date.isoformat(), + } + @classmethod def from_nist_dict(cls, dct: Dict) -> "CVE": """ diff --git a/sec_certs/serialization/json.py b/sec_certs/serialization/json.py index 8c229f65..c64c2fc8 100644 --- a/sec_certs/serialization/json.py +++ b/sec_certs/serialization/json.py @@ -10,9 +10,15 @@ class ComplexSerializableType: # to achieve without using metaclasses. Not to complicate the code, we choose instance variable. @property def serialized_attributes(self) -> List[str]: + if hasattr(self, "__slots__") and self.__slots__: + return list(self.__slots__) return list(self.__dict__.keys()) def to_dict(self): + if hasattr(self, "__slots__") and self.__slots__: + return { + key: copy.deepcopy(getattr(self, key)) for key in self.__slots__ if key in self.serialized_attributes + } return {key: val for key, val in copy.deepcopy(self.__dict__).items() if key in self.serialized_attributes} @classmethod diff --git a/tests/test_cpe.py b/tests/test_cpe.py index e2f1fdb9..aebde5e8 100644 --- a/tests/test_cpe.py +++ b/tests/test_cpe.py @@ -4,6 +4,7 @@ from tempfile import TemporaryDirectory import pytest from sec_certs.dataset.cpe import CPEDataset +from sec_certs.sample.cpe import CPE class TestCPE: @@ -14,3 +15,16 @@ class TestCPE: dset = CPEDataset.from_web(Path(tmpdir) / "cpe.json") assert dset is not None assert "cpe:2.3:o:infineon:trusted_platform_firmware:6.40:*:*:*:*:*:*:*" in dset.cpes + + def test_from_to_dict(self): + data = { + "uri": "cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*", + "title": None, + "start_version": None, + "end_version": None, + } + cpe = CPE.from_dict(data) + ret = cpe.to_dict() + assert data == ret + other_cpe = CPE.from_dict(ret) + assert cpe == other_cpe diff --git a/tests/test_cve.py b/tests/test_cve.py index 6c84ace3..f64d6754 100644 --- a/tests/test_cve.py +++ b/tests/test_cve.py @@ -1,6 +1,7 @@ import pytest from sec_certs.dataset.cve import CVEDataset +from sec_certs.sample.cve import CVE class TestCVE: @@ -11,3 +12,29 @@ class TestCVE: assert dset is not None assert "CVE-2019-15809" in dset.cves assert "CVE-2017-15361" in dset.cves + + def test_from_to_dict(self): + data = { + "cve_id": "CVE-1999-0001", + "vulnerable_cpes": [ + { + "uri": "cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*", + "title": None, + "start_version": None, + "end_version": None, + } + ], + "impact": { + "_type": "Impact", + "base_score": 5, + "severity": "MEDIUM", + "explotability_score": 10, + "impact_score": 2.9, + }, + "published_date": "1999-12-30T05:00:00+00:00", + } + cve = CVE.from_dict(data) + ret = cve.to_dict() + assert ret == data + other_cve = CVE.from_dict(ret) + assert cve == other_cve -- cgit v1.3 From 7a4fed73fa1bf77e9affc8ca2adde9d807adafb0 Mon Sep 17 00:00:00 2001 From: J08nY Date: Wed, 5 Jan 2022 01:02:56 +0100 Subject: Fix from_dict ordering issue. --- sec_certs/sample/certificate.py | 2 +- sec_certs/serialization/json.py | 2 +- .../test_cc_heuristics/auxillary_datasets/cve_dataset.json | 8 ++++---- tests/data/test_cc_heuristics/dependency_dataset.json | 3 --- tests/data/test_cc_oop/fictional_cert.json | 8 ++++---- tests/test_cc_oop.py | 10 ++++++---- 6 files changed, 16 insertions(+), 17 deletions(-) (limited to 'tests') diff --git a/sec_certs/sample/certificate.py b/sec_certs/sample/certificate.py index b020bffb..c9eeccca 100644 --- a/sec_certs/sample/certificate.py +++ b/sec_certs/sample/certificate.py @@ -51,7 +51,7 @@ class Certificate(ABC, ComplexSerializableType): @classmethod def from_dict(cls: Type[T], dct: dict) -> T: dct.pop("dgst") - return cls(*(tuple(dct.values()))) + return cls(**dct) def to_json(self, output_path: Optional[Union[str, Path]] = None): if output_path is None: diff --git a/sec_certs/serialization/json.py b/sec_certs/serialization/json.py index c64c2fc8..e8fc4976 100644 --- a/sec_certs/serialization/json.py +++ b/sec_certs/serialization/json.py @@ -24,7 +24,7 @@ class ComplexSerializableType: @classmethod def from_dict(cls, dct: Dict): try: - return cls(*(tuple(dct.values()))) + return cls(**dct) except TypeError as e: raise TypeError(f"Dict: {dct} on {cls.__mro__}") from e diff --git a/tests/data/test_cc_heuristics/auxillary_datasets/cve_dataset.json b/tests/data/test_cc_heuristics/auxillary_datasets/cve_dataset.json index 6bdd4dc7..c74cd5cb 100644 --- a/tests/data/test_cc_heuristics/auxillary_datasets/cve_dataset.json +++ b/tests/data/test_cc_heuristics/auxillary_datasets/cve_dataset.json @@ -17,10 +17,10 @@ "_type": "Impact", "base_score": 5.3, "severity": "MEDIUM", - "explotability_score": 3.9, + "exploitability_score": 3.9, "impact_score": 1.4 }, - "publishedDate": "2021-05-26T04:15Z" + "published_date": "2021-05-26T04:15Z" }, "CVE-2019-4513": { "_type": "CVE", @@ -38,10 +38,10 @@ "_type": "Impact", "base_score": 8.2, "severity": "HIGH", - "explotability_score": 3.9, + "exploitability_score": 3.9, "impact_score": 4.2 }, - "publishedDate": "2000-05-26T04:15Z" + "published_date": "2000-05-26T04:15Z" } } } diff --git a/tests/data/test_cc_heuristics/dependency_dataset.json b/tests/data/test_cc_heuristics/dependency_dataset.json index 8e106a03..7e226577 100644 --- a/tests/data/test_cc_heuristics/dependency_dataset.json +++ b/tests/data/test_cc_heuristics/dependency_dataset.json @@ -325,7 +325,6 @@ "10.1.5" ], "cpe_matches": null, - "labeled": false, "verified_cpe_matches": null, "related_cves": null, "cert_lab": [ @@ -676,7 +675,6 @@ "9.1.6" ], "cpe_matches": null, - "labeled": false, "verified_cpe_matches": null, "related_cves": null, "cert_lab": [ @@ -1028,7 +1026,6 @@ "8.1.10" ], "cpe_matches": null, - "labeled": false, "verified_cpe_matches": null, "related_cves": null, "cert_lab": [ diff --git a/tests/data/test_cc_oop/fictional_cert.json b/tests/data/test_cc_oop/fictional_cert.json index 45c1b5a4..56bea187 100644 --- a/tests/data/test_cc_oop/fictional_cert.json +++ b/tests/data/test_cc_oop/fictional_cert.json @@ -11,9 +11,6 @@ ], "not_valid_before": "1900-01-02", "not_valid_after": "1900-01-03", - "report_link": "https://path.to/report/link", - "st_link": "https://path.to/st/link", - "cert_link": "https://path.to/cert/link", "manufacturer_web": "https://path.to/manufacturer/web", "protection_profiles": [ { @@ -63,5 +60,8 @@ "indirectly_affected_by": null, "directly_affecting": null, "indirectly_affecting": null - } + }, + "report_link": "https://path.to/report/link", + "st_link": "https://path.to/st/link", + "cert_link": "https://path.to/cert/link" } \ No newline at end of file diff --git a/tests/test_cc_oop.py b/tests/test_cc_oop.py index 2426476d..e4bb4482 100644 --- a/tests/test_cc_oop.py +++ b/tests/test_cc_oop.py @@ -1,4 +1,5 @@ import filecmp +import json import os import shutil import tempfile @@ -157,10 +158,11 @@ class TestCommonCriteriaOOP(TestCase): def test_cert_to_json(self): with NamedTemporaryFile("w") as tmp: self.fictional_cert.to_json(tmp.name) - self.assertTrue( - filecmp.cmp(self.test_data_dir / "fictional_cert.json", tmp.name), - "The sample serialized to json differs from a template.", - ) + with open(tmp.name) as f: + out = json.load(f) + with open(self.test_data_dir / "fictional_cert.json") as f: + template = json.load(f) + assert out == template def test_dataset_to_json(self): with NamedTemporaryFile("w") as tmp: -- cgit v1.3 From 9ab303782d468a96116ab393615f31c6389d9ab6 Mon Sep 17 00:00:00 2001 From: Adam Janovsky Date: Wed, 5 Jan 2022 11:14:38 +0100 Subject: fix assert in test --- tests/test_cc_oop.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'tests') diff --git a/tests/test_cc_oop.py b/tests/test_cc_oop.py index e4bb4482..c2a9223b 100644 --- a/tests/test_cc_oop.py +++ b/tests/test_cc_oop.py @@ -162,7 +162,7 @@ class TestCommonCriteriaOOP(TestCase): out = json.load(f) with open(self.test_data_dir / "fictional_cert.json") as f: template = json.load(f) - assert out == template + self.assertEqual(out, template, "Serialized cert differs from cert json template.") def test_dataset_to_json(self): with NamedTemporaryFile("w") as tmp: -- cgit v1.3