Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #3079

Details

Module Name
Datrium FIPS Object Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
186-2 transition
Overall Level
1
Caveat
When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module.
Security Level Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Module Type
Software
Embodiment
Multi-Chip Stand Alone
Description
The Datrium FIPS Object Module is a general purpose cryptographic module delivered as open source code. It is designed for ease of use with the popular OpenSSL cryptographic library and toolkit and is available for use without charge for a wide variety of platforms. The basic validation can also be extended quickly and affordably to accommodate new platforms and many types of modifications.
Tested Configuration(s)
  • AIX 6.1 32-bit running on IBM POWER 7 (PPC) (IBM XL C/C++ for AIX Compiler Version V13.1), AIX 6.1 32-bit running on IBM POWER 7 (PPC) with optimizations (IBM XL C/C++ for AIX Compiler Version V10.1), AIX 6.1 64-bit running on IBM POWER 7 (PPC) (IBM XL C/C++ for AIX Compiler Version V13.1), AIX 6.1 64-bit running on IBM POWER 7 (PPC) with optimizations (IBM XL C/C++ for AIX Compiler Version V10.1), AIX 7.1 32-bit running on IBM POWER 7 (PPC) (IBM XL C/C++ for AIX Compiler Version V13.1), AIX 7.1 64-bit running on IBM POWER 7 (PPC) (IBM XL C/C++ for AIX Compiler Version V13.1), Android 5.0 32-bit running on Qualcomm APQ8084 (ARMv7) with NEON (gcc Compiler Version 4.9), Android 5.0 32-bit running on Qualcomm APQ8084 (ARMv7) without NEON (gcc Compiler Version 4.9), Android 5.0 64-bit running on SAMSUNG Exynos7420 (ARMv8) with NEON and Crypto Extensions (gcc Compiler Version 4.9), Android 5.0 64-bit running on SAMSUNG Exynos7420 (ARMv8) without NEON and Crypto Extensions (gcc Compiler Version 4.9), DataGravity Discovery Series OS V2.0 running on Intel Xeon E5-2420 (x86) with PAA (gcc Compiler Version 4.7.2), DataGravity Discovery Series OS V2.0 running on Intel Xeon E5-2420 (x86) without PAA (gcc Compiler Version 4.7.2), iOS 8.1 32¬bit running on Apple A7 (ARMv8) with NEON (clang Compiler Version 600.0.56), iOS 8.1 32¬bit running on Apple A7 (ARMv8) without NEON (clang Compiler Version 600.0.56), iOS 8.1 64¬bit running on Apple A7 (ARMv8) with NEON and Crypto Extensions (clang Compiler Version 600.0.56), iOS 8.1 64¬bit running on Apple A7 (ARMv8) without NEON and Crypto Extensions (clang Compiler Version 600.0.56), Linux 3.10 running on Datrium F12X2 Data Node with Intel Xeon E5-2618L v4 (x86-64) CPU and with PAA (gcc Compiler Version 4.4.6), Linux 3.10 32-bit running on Intel Atom E3845 (x86) with PAA (gcc Compiler Version 4.8.1), Linux 3.10 32-bit running on Intel Atom E3845 (x86) without PAA (gcc Compiler Version 4.8.1), Red Hat Enterprise Linux 7.3 running on Datrium CN2100-SYS-1 Compute Node with Intel Xeon Gold 6148 (x86-64) CPU and with PAA (gcc Compiler Version 4.4.6), TS-Linux 2.4 running on Arm920Tid (ARMv4) (gcc Compiler Version 4.3.2), Ubuntu 12.04 running on Intel Xeon E5-2430L (x86) with PAA (gcc Compiler Version 4.6.3), Ubuntu 12.04 running on Intel Xeon E5-2430L (x86) without PAA (gcc Compiler Version 4.6.3), VMWare ESXi 6.5.0 u1 running on Datrium CN2100-SYS-1 Compute Node with Intel Xeon Gold 6148 (x86-64) CPU and with PAA (gcc Compiler Version 4.6.3), VxWorks 6.7 running on Intel Core 2 Duo (x86) (gcc Compiler Version 4.1.2), VxWorks 6.9 running on Freescale P2020 (PPC) (gcc Compiler Version 4.3.3) (single-user mode)
Approved Algorithms
AES Certs. #3090, #3264, #3451, #3751 and #5178
CVL Certs. #372, #472, #534, #699 and #1680
DRBG Certs. #607, #723, #845, #1027 and #1953
DSA Certs. #896, #933, #970, #1040 and #1343
ECDSA Certs. #558, #620, #698, #801 and #1342
HMAC Certs. #1937, #2063, #2197, #2452 and #3434
RSA Certs. #1581, #1664, #1766, #1928 and #2780
SHS Certs. #2553, #2702, #2847, #3121 and #4182
Triple-DES Certs. #1780, #1853, #1942, #2086 and #2635
Allowed Algorithms
EC Diffie-Hellman; RSA (encrypt/decrypt)
Software Versions
2.0.9, 2.0.10, 2.0.11 or 2.0.12

Vendor

Datrium
385 Moffett Park Drive, Suite 205
Sunnyvale, CA 94089
USA

R. Hugo Patterson
info@datrium.com
Phone: 669-721-9444

Validation History

Date Type Lab
12/11/2017 Initial UL VERIFICATION SERVICES INC
2/15/2018 Update UL VERIFICATION SERVICES INC