NI Massive X 1.2.0 Free Download with Crack Free Activation

Native Instruments Guitar Rig 5 v5.2.2 Update Incl Patched and Keygen-R2R. lets you download, install, activate, and update your Native Instruments. 167, Logic Pro X, 10.7.0 (5535), 2021-10-15 540, To MP3 Converter Free, 1.0.7 (13717), 2015-06-29 623, Download Shuttle, 2.5 (25.2), 2021-07-25. Razdeljevanje dokončana perspektiva Native Instruments Massive X VST Free Download NI Massive X 1.2.0 Free Download with Crack Free Activation | Doload.

NI Massive X 1.2.0 Free Download with Crack Free Activation -

RNG Historical Validation List

1413RSA, The Security Division of EMC
174 Middlesex Turnpike
Bedford, MA 01730
USA

-Rohit Mathur
TEL: +61730325220

ARMv7 (32-bit) w/ Linaro Linux 3.10.68 1/15/2016 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements."

1412Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

-Bob Pittman
TEL: 1-978-264-5211
FAX: 1-978-264-5522

Freescale P2020, 1.0GHz, PowerPC; Freescale P4080, 1.5GHz, PowerPC 12/31/2015 ANSI X9.31
[ AES-128Key  ]

"Comware cryptographic library is a software library that provides cryptographic functions within HP devices."

1411OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD 27101
USA

-Steve Marquess
TEL: 301-874-2571

Intel Atom E3845 (x86) without AES-NI optimizations w/ Linux 3.10 32-bit; Intel Atom E3845 (x86) with AES-NI optimizations w/ Linux 3.10 32-bit 1/22/2016 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/."

08/04/15: Added new tested information;
09/04/15: Added new tested information;
10/22/15: Added new tested information;
10/30/15: Updated implementation information information;

1410Realia Technologies, S.L.
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

-Jesus Rodriguez
TEL: +34 91 449 03 30
FAX: +34 91 579 56 06

-Luis Jesus Hernandez
TEL: +34 91 449 03 30
FAX: +34 91 579 56 06

N/A 12/18/2015 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card."

1409Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

IBM/S390 w/ Red Hat Enterprise Linux 7.1 12/11/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

1408Siemens PLM Software
5800 Granite Parkway
Suite 600
Plano, TX 75024
USA

-Vikas Singh
TEL: 651-855-6176

AMD A4 w/ SUSE Linux 11.2 (x86_64); AMD A4 w/ Windows 7 SP1 (x86); AMD A4 w/ Windows 7 SP1 (x86_64); Intel Core i5 w/ Mac OS X 10.11 (x86_64) 12/11/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Teamcenter powers innovation and productivity by connecting people and processes with knowledge. Teamcenter is the de facto standard for PLM deployment, providing solutions to drive business performance goals."

01/25/16: Updated implementation information;

1407V-Key
72 Bendemeer Road
#02-20 Luzerne
Singapore, Singapore 339941
Singapore

-Joseph Gan
TEL: +65 6471 2524
FAX: +65 6471 2526

ARMv7A w/ VOS 3.6.0 on Android 4.4.2 w/ Android; ARMv8 w/ VOS 3.6.0 on iOS 7.0.4 w/ iOS 12/11/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"A software cryptographic module residing within a trusted virtual machine, V-OS that provides a secure sandboxed operating environment. The Module provides symmetric ciphers including AES and Triple DES, asymmetric cipher RSA, secure hash functions SHA-1 and SHA-256, random number generation, message authentication and key derivation and storage."

1406Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

IBM/S390 w/ Red Hat Enterprise Linux 7.1 12/4/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size."

1405Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

Intel x86 w/ Red Hat Enterprise Linux 7.1 11/30/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size."

1404Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

Intel x86 w/ Red Hat Enterprise Linux 7.1 11/27/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size."

1403Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

Intel x86 w/ Red Hat Enterprise Linux 7.1 11/27/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

1402Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

IBM Power 8E w/ Red Hat Enterprise Linux 7.1 11/27/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size."

1401Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

Intel x86 w/ Red Hat Enterprise Linux 7.1 11/27/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

1400Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

IBM/S390 w/ Red Hat Enterprise Linux 7.1 11/27/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

1399Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

Intel x86 w/ Red Hat Enterprise Linux 7.1 11/27/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

1398Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

IBM Power 8E w/ Red Hat Enterprise Linux 7.1 11/27/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size."

1397Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Jaroslav Reznik

IBM Power 8E w/ Red Hat Enterprise Linux 7.1 11/27/2015 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size."

1396MobileIron
415 East Middlefield Road
Mountain View, CA 94043
USA

-Brian Mansfield
TEL: 415-596-4677

Samsung Galaxy Note 4 - SM-N910A w/ Android 5.1; Samsung S4 - SGH-I337 w/ Android 4.4.4; Samsung S5 - SM-G900H w/ Android 4.4.2; Samsung Galaxy Note 3 - SM-N900 w/ Android 4.4.2; Samsung S6 - SM-G920A w/ Android 5.0.2 11/27/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

""General purpose cryptographic services available for Android used by the Mobile@Work client to provide secure cryptography"

1395Cleversafe, Inc.
222 South Riverside Plaza
Suite 1700
Chicago, Illinois 60606
US

-Mark Seaborn
TEL: (312) 423-6640

-Jason Resch
TEL: (312) 423-6640

Intel Xeon without AES-NI w/ ClevOS 3.8.0-FIPS-EDITION 11/27/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''s ClevOS™ FIPS Edition, the underlying technology for dsNet® Appliances."

12/04/15: Updated implementation information;

1394Cleversafe, Inc.
222 South Riverside Plaza
Suite 1700
Chicago, Illinois 60606
US

-Mark Seaborn
TEL: 312.423.6640

-Jason Resch
TEL: (312) 423-6640

Intel Xeon with AES-NI w/ ClevOS 3.8.0-FIPS-EDITION 11/27/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''s ClevOS™ FIPS Edition, the underlying technology for dsNet® Appliances."

12/04/15: Updated implementation information;

1393RSA, The Security Division of EMC
174 Middlesex Turnpike
Bedford, MA 01730
USA

-Rohit Mathur
TEL: +61730325220

11 on vCenter SUSE 11; Intel x86 with AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 5.11 on vCenter SUSE 11; Intel x86 without AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11; Intel x86 without AES-NI w/ Red Hat Enterprise Linux 7.1 on vCenter SUSE 11; Intel x86 without AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11; Intel x86 without AES-NI w/ SUSE Linux Enterprise Server 12 on vCenter SUSE 11; Intel x86 with AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11; Intel x86 with AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11; Intel x86 with AES-NI w/ SUSE Linux Enterprise Server 12 on vCenter SUSE 11; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 7.1 on vCenter SUSE 11; Intel x64 without AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11; Intel x64 without AES-NI w/ SUSE Linux Enterprise Server 12 on vCenter SUSE 11; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 6.7 on vCenter SUSE 11; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 7.1 on vCenter SUSE 11; Intel x64 with AES-NI w/ SUSE Linux Enterprise Server 11 on vCenter SUSE 11; Itanium 2 w/ Red Hat Enterprise Linux 5.11; PowerPC 32-bit w/ Red Hat Enterprise Linux 5.11 on PowerVM 2.2; PowerPC 32-bit w/ SUSE Linux Enterprise Server 11 on PowerVM 2.2; PowerPC 64-bit w/ Red Hat Enterprise Linux 5.11 on PowerVM 2.2; PowerPC 64-bit w/ SUSE Linux Enterprise Server 11 on PowerVM 2.2; Intel x64 without AES-NI w/ FreeBSD 10.2 on vCenter SUSE 11; Intel x64 with AES-NI w/ FreeBSD 10.2 on vCenter SUSE 11; Intel x64 without AES-NI w/ Mac OSX 10.10 on vCenter SUSE 11; Intel x64 with AES-NI w/ Mac OSX 10.10 on vCenter SUSE 11; SPARC v8 w/ Solaris 10; SPARC v8+ w/ Solaris 11; SPARC v9 (T2) w/ Solaris 11; SPARC v9 (T4) without T4 accelerator w/ Solaris 11; Intel x86 without AES-NI w/ Solaris 10 on vCenter SUSE 11; Intel x86 with AES-NI w/ Solaris 10 on vCenter SUSE 11; Intel x64 without AES-NI w/ Solaris 10 on vCenter SUSE 11; Intel x64 with AES-NI w/ Solaris 10 on vCenter SUSE 11; Itanium 2 32-bit w/ HPUX 11.31; Itanium 2 64-bit w/ HPUX 11.31; PA-RISC 2.0 32-bit w/ HPUX 11.31; PA-RISC 2.0W 64-bit w/ HPUX 11.31; PowerPC 32-bit w/ AIX 6.1 on PowerVM 2.2; PowerPC 64-bit w/ AIX 6.1 on PowerVM 2.2; PowerPC 32-bit w/ AIX 7.1 on PowerVM 2.2; PowerPC 64-bit w/ AIX 7.1 on PowerVM 2.2; IBM z196 31/32-bit w/ Red Hat Enterprise Linux 5.11 on z/VM 6.2; IBM z196 64-bit w/ Red Hat Enterprise Linux 5.11 on z/VM 6.2; ARMv7 w/ Fedora Core 20; ARMv7 w/ Ubuntu 12.04 LTS; ARMv8 w/ Fedora Core 22; Intel x86 w/ Android 4.1; ARMv7 w/ Android 4.4; ARMv7 w/ Android 5.1; ARMv8 w/ Android 5.1; PPC 604 w/ VxWorks 6.4; PPC 604 w/ VxWorks 6.7; ARMv4 w/ VxWorks 6.8; SPARC v9 (T4) with T4 accelerator w/ Solaris 11; Intel x64 w/ CentOS 6.6 11/20/2015 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements."

12/18/15: Added new tested information;

1392Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

-Bob Pittman
TEL: 1-978-264-5211
FAX: 1-978-264-5522

Freescale P1010, 553M, PowerPC; Freescale P1016, 667M, PowerPC 11/6/2015 ANSI X9.31
[ AES-128Key  ]

"Comware cryptographic library is a software library that provides cryptographic functions within HP devices."

1391Huawei Device(Dongguan) Co., Ltd.
B2-5 of Nanfang Factory
No.2 of Xincheng Rd
Songshan Lake Science & Technology Industrial Zone
Dongguan, Guangdong 523808
China

-Tailiang Hong
TEL: 86-755-36376922

-Blue Lee
TEL: 86-755-28976679

HiSilicon K3V3+ w/ Android 5.0 10/23/2015 ANSI X9.31
[ AES-256Key  ]

"General purpose cryptographic module available for Android used by Huawei devices. A variety of cryptographic services are provided, including AES, RSA, SHA, HMAC, CMAC, ECDSA, CTR_DRBG, etc."

05/17/16: Updated vendor information;

1390Intel Corporation
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

-Andy Nissen
TEL: 651-628-5385

Intel i3 w/ Linux x86_64 9/11/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"A cryptographic library compiled for Linux on Intel x86_64 compatible processors."

02/11/16: Updated implementation information;

1389IBM Corporation
80 Bishop Dr., Unit B
Fredericton, New Brunswick E3C 1B2
Canada

-Sandra Hernandez
TEL: (512) 286-5624

-Marie Fraser
TEL: +353 (21) 730-6043

Intel XEON Ivy Bridge 9/11/2015 ANSI X9.31
[ AES-128Key  ]

"The algorithms are implemented by OpenSSL version 1.0.1e provided by RedHat. Additional native bridges are implemented by IBM and allow all QRadar components to make cryptographic request to OpenSSL directly."

1388CoCo Communications
800 5th Ave
Seattle, WA 98104
USA

-David Weidenkopf
TEL: 206-812-5783

Intel i5 w/ Windows 7 64 bit 7/24/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The CoCo OpenSSL Crypto Module is an OpenSSL cryptographic library that provides cryptographic services to its calling applications."

1387Nuvoton Technology Corporation
No. 4, Creation Rd. III
Hsinchu Science Park, n/a 300
Taiwan, R.O.C.

-Yossi Talmi
TEL: +972-9-9702364
FAX: +972-9-9702001

-Oren Tanami
TEL: +972-9-9702390
FAX: +972-9-9702001

N/A 7/10/2015 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"Nuvoton TPM (Trusted Platform Module), a TCG 1.2 compliant security processor with embedded firmware"

09/30/15: Updated implementation information;

1386VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

-Eric Betts
TEL: 650-427-1902
FAX: 650-427-5001

Intel Xeon w/ 64 bit VMware ESXi 7/10/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The VMware ESXI Services Cryptographic Engine provides cryptographic functions for VMware ESXi services."

1385VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

-Eric Betts
TEL: 650-427-1902
FAX: 650-427-5001

Intel Xeon w/ 64 bit VMware ESXi 7/10/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The VMware ESXI Core Cryptographic Engine provides cryptographic services for VMware ESXi."

1384Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

-Certicom Support
TEL: 1-905-507-4220
FAX: 1-905-507-4230

-Certicom Sales
TEL: 1-905-507-4220
FAX: 1-905-507-4230

Intel Xeon w/ CentoOS Linux 7.0 64 bit with Oracle JRE 1.8.0 7/10/2015 ANSI X9.62
[( P192  P224  P256  P384  P512  K163  K233  K283  K409  K571  B163  B233  B283  B409  B571  ) (SHA-1) ]

"Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications."

1383Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

-Certicom Support
TEL: 1-905-507-4220
FAX: 1-905-507-4230

-Certicom Sales
TEL: 1-905-507-4220
FAX: 1-905-507-4230

ARMv8 Qualcomm MSM8992 w/ Android 5.1; Intel Xeon E5620 with AES-NI w/ CentOS 7 Linux 64-bit; 7/10/2015 ANSI X9.31
[ AES-128Key  ]

"Security Builder Linux Kernel Crypto Core provides general-purpose cryptographic services to other Linux kernel modules."

1382Samsung
129
Samsung-ro
Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
South Korea

-Changsup Ahn
TEL: +82-10-3173-9021
FAX: +82-31-279-1219

-Jisoon Park
TEL: +82-10-4556-5007
FAX: +82-31-279-1219

Intel Core i7 w/ Ubuntu 14.04 7/2/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"A multipurpose cryptographic library which provides symmetric/asymmetric cipher, message digest, key agreement, PRNG and so on."

1381Samsung
129
Samsung-ro
Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
South Korea

-Changsup Ahn
TEL: +82-10-3173-9021
FAX: +82-31-279-1219

-Jisoon Park
TEL: +82-10-4556-5007
FAX: +82-31-279-1219

Samsung Hawk-MU w/ Tizen 2.3 7/2/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"A multipurpose cryptographic library which provides symmetric/asymmetric cipher, message digest, key agreement, PRNG and so on."

1380VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

-Eric Betts
TEL: 650-427-1902
FAX: 650-427-5001

Intel Core i5 w/ Microsoft Windows 7 SP1 64 bit; Intel Core i5 w/ Linux x64 7/2/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The VMware vSphere vCLI Cryptographic Engine provide cryptographic services for the VMware Command Line Interface (vCLI)"

1379VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

-Eric Betts
TEL: 650-427-1902
FAX: 650-427-5001

Intel Xeon w/ SLES 11 SP2 for VMware 64bit 7/2/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The VMware vCenter Server Virtual Appliance Cryptographic Engine provides the cryptographic services for VMware''s vCenter Server Virtual Appliance."

1378VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

-Eric Betts
TEL: 650-427-1902
FAX: 650-427-5001

Intel Xeon w/ Microsoft Windows Server 2012 R2 7/2/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The VMware vSphere Cryptographic Engine provides the cryptographic services for multiple VMware server and client applications."

1377VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

-Eric Betts
TEL: 650-427-1902
FAX: 650-427-5001

Intel Core i5 w/ Windows 7 SP1 (64bit) 7/2/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The VMware vSphere Client Cryptographic Engine provides cryptographic services VMware vSphere Client."

1376OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD 27101
USA

-Steve Marquess
TEL: 301-874-2571

Intel Core 2 Duo (x86) w/ VxWorks 6.7; IBM POWER 7 (PPC) w/ AIX 7.1 64-bit; IBM POWER 7 (PPC) w/ AIX 6.1 32-bit; IBM POWER 7 (PPC) w/ AIX 6.1 64-bit; IBM POWER 7 (PPC) w/ AIX 7.1 32-bit; Intel Xeon E5-2420 (x86) without AES-NI w/ DataGravity Discovery Series OS V2.0; Intel Xeon E5-2420 (x86) with AES-NI w/ DataGravity Discovery Series OS V2.0 ; IBM POWER 7 (PPC) with optimizations w/ AIX 6.1 32-bit; IBM POWER 7 (PPC) with optimizations w/ AIX 6.1 64-bit; Intel Xeon E5-2430L (x86) with AES-NI optimizations w/ Ubuntu 12.04; Intel Xeon E5-2430L (x86) without optimizations w/ Ubuntu 12.04; Intel Atom E3845 (x86) without AES-NI optimizations w/ Linux 3.10 32-bit; Intel Atom E3845 (x86) with AES-NI optimizations w/ Linux 3.10 32-bit 7/2/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/."

08/04/15: Added new tested information;
09/04/15: Added new tested information;
10/22/15: Added new tested information;
10/30/15: Updated implementation information information;

1375LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul, n/a 152-721
Republic of Korea

-Jongseong Kim
TEL: 82-10-2207-1919
FAX: 82-2-6950-2080

-Adam Wick
TEL: 503-808-7216
FAX: 503-350-0833

Qualcomm Snapdragon 800-series (64-bit) w/ Android 5.0.1; Qualcomm Snapdragon 800-series (64-bit) w/ 5.1 6/26/2015 ANSI X9.31
[ AES-128Key  ]

"General-purpose cryptographic services within the Linux kernel used by LG devices to provide secured services."

1374Canon
One Canon Park
Melville, NY 11747
USA

-Jiuyuan Ge
TEL: 631-330-5774

Intel Atom Processor D410 w/ MontaVista Linux 6/25/2015 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"Canon imageRUNNER Crypto Module for MEAP is a cryptographic module which protects stored and transmitted data using FIPS approved cryptographic algorithms."

1373RSA, The Security Division of EMC
174 Middlesex Turnpike
Bedford, MA 01730
USA

-Sandy Carielli
TEL: 781-515-7510

ARM11 MPCore (ARMv6k) w/ VxWorks 6.8.2 6/11/2015 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements."

1372Bomgar Corporation
578 Highland Colony Parkway
Paragon Centre, Suite 300
Ridgeland, MS 39157
USA

-Main Office
TEL: 601-519-0123
FAX: 601-510-9080

-Victor Wolff
TEL: 703-483-5515
FAX: 601-510-9080

Intel® Xeon 6/11/2015 ANSI X9.31
[ AES-128Key  AES-256Key  ]

"The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar B200, B300, and B400 Remote Support appliances. These appliances allow support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support."

1371NEC Display Solutions, Ltd.
686-1, Nishioi, Oi-machi
Ashigarakami-gun, Kanagawa 258-8533
Japan

-Michio Yoshino
TEL: +81-465-85-2365
FAX: +81-465-85-2445

NEC embedded system 5/22/2015 ANSI X9.31
[ AES-128Key  ]

"Cryptographic implementation supports security features for compliance with DCI CTP requirements."

1370Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

-Global Certification Team
TEL: d

Cavium Octeon MIPS64 w/ Linux 2.6; Intel Xeon w/ FreeBSD 9.2 5/22/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of"

06/01/15: Added new tested information;

1369Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

-Global Certification Team
TEL: d

Intel Xeon w/ Linux 2.6; Cavium Octeon MIPS64 w/ Linux 2.6; ARMv7 w/ Android 4.4; Intel Core i7 w/ Windows 8.1; Intel Core i7 with AES-NI w/ Windows 8.1 5/22/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products."

06/01/15: Updated implementation information;

1368Dell Software, Inc.
5455 Great America Parkway
Santa Clara, CA 95051
USA

-Usha Sanagala
TEL: 408-962-6248
FAX: 408-745-9300

Cavium Octeon II CN 6640-8core 5/22/2015 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"The Dell(tm) SonicWALL(tm) SuperMassive(tm) Series is Dell''s next-generation firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency."

1367McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

-Andy Nissen
TEL: 651-770-6151

Intel x86_64 w/ Linux 3.10.45 5/15/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"OpenSSL FIPS Object Module 2.0.5 running on Linux 3.10.45 on Intel x86_64 HW"

1366LogRhythm
4780 Pearl East Circle
Boulder, CO 80301
USA

-Emily Dobson
TEL: 720-881-5348

Intel Xeon E5-2420 w/ Microsoft Windows Server 2008 R2 5/15/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"This module provides support for secure communications over a network using the OpenSSL library."

1365Northop Grumman M5 Network Security
Level 1
218 Northbourne Avenue
Braddon, ACT 2612
Australia

-Warwick Hoyle
TEL: +611300656019
FAX: +611300365893

-Kristian Howard
TEL: +611300656019
FAX: +611300365893

Intel(R) Atom(TM) CPU E660 @ 1.30GHz w/ SCS-100 (v5.3.6);Intel(R) Atom(TM) CPU Z510 @ 1.10GHz w/ SCS-100 (v5.3.6) 5/8/2015 ANSI X9.31
[ AES-128Key  ]

"A module that provides a C-language application program interface (API) for use by other processes that require cryptographic functionality within the SCS 100 and 200 hardware platforms"

1364Northop Grumman M5 Network Security
Level 1
218 Northbourne Avenue
Braddon, ACT 2612
Australia

-Warwick Hoyle
TEL: +611300656019
FAX: +611300365893

-Kristian Howard
TEL: +611300656019
FAX: +611300365893

Intel(R) Atom(TM) CPU E660 @ 1.30GHz w/ SCS-100 (v5.3.6); Intel(R) Atom(TM) CPU Z510 @ 1.10GHz w/ SCS-100 (v5.3.6) 5/8/2015 ANSI X9.31
[ AES-128Key  ]

"A module that provides a C-language application program interface (API) for use by other processes that require cryptographic functionality within the SCS 100 and 200 hardware platforms"

1363Nimble Storage Inc.
211 River Oaks Parkway
San Jose, CA 95134
USA

-Kent Peacock
TEL: +1-408-514-3452

Intel E5-2403V2 with AES-NI w/ Linux 2.6; Intel E5-2450V2 with AES-NI w/ Linux 2.6; Intel E5-2470V2 with AES-NI w/ Linux 2.6 ;  Intel E5-2603V3 with AES-NI w/ Linux 2.6; Intel E5-2699V3 with AES-NI w/ Linux 2.6; Intel E5-2680V3 with AES-NI w/ Linux 2.6; Intel E5-2620V3 with AES-NI w/ Linux 2.6; 5/8/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Nimble Storage OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module 2.0.9. It is incorporated into the family of Nimble Storage appliances."

1361Samsung Electronics Co., Ltd.
416, Maetan 3-Dong Youngton Gu
Suwon, Gyeonggi 152-848
South Korea

-Abraham Joseph Kang
TEL: +1-408-324-3678
FAX: +1-408-324-3640

-Bumhan Kim
TEL: +82-10-4800-6711

Samsung Electronics Exynos 7420 w/ MOBICORE Tbase 302A 4/17/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit."

1360Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

-Norman Ng
TEL: +86 105 917 4286

ARMv4i w/ Windows Embedded Handheld 6.5 4/17/2015 FIPS 186-2
[ (x-Original); (SHA-1) ]

"Microsoft Windows CE and Windows Mobile, and Windows Embedded Handheld Enhanced Cryptographic Provider (RSAENH) is a general-purpose, software-based, cryptographic module for Windows CE, Windows Mobile, and Windows Embedded Handheld. It can be dynamically linked into applications by software developers to permit the use of general-purpose cryptography."

05/08/15: Updated implementation information;

1359Sony Mobile Communications Inc.
1-8-15 Kohnan
Minato-ku, Tokyo 108-0075
Japan

-Takuya Nishibayashi
TEL: +81-3-5782-5285
FAX: +81-3-5782-5258

Qualcomm Snapdragon 810 (ARMv8) w/ Android 5.0 4/17/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Xperia Cryptographic Module RNG Component provides cryptographic service for Android mobile device."

05/19/15: Updated implementation information;

1358Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

-Brian Wood
TEL: 908-809-7939
FAX: 908-809-7974

Qualcomm Snapdragon 805 w/ Android 5.0.1 3/27/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"General purpose cryptographic services available for Android used by Samsung devices to provide secure cryptography."

1357Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

-n/a

ARMv7 Qualcomm Snapdragon 805 processor w/ android 5.0.1 3/27/2015 ANSI X9.31
[ AES-128Key  ]

"General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services."

1356Analog Devices, Inc.
One Technology Way
Norwood, MA 02062
USA

-Gabby Yi

ADSP-SC589 (embedded software) w/ n/a 3/27/2015 ANSI X9.31
[ AES-128Key  ]

"The Analog Devices Security Packet Engine provides uniform cryptographic capabilities for the ADSP-SC58x and ADSP-2158x SHARC processor families. The embedded software API invokes the hardware to perform Approved HMAC and RNG functions."

07/01/15: Updated vendor information;

1355Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

-Kyung-Hee Lee
TEL: +82-10-9397-1589

ARMv8 w/ Android Lollipop 5.0.2 3/20/2015 ANSI X9.31
[ AES-128Key  ]

"General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services."

1354LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul, n/a 152-721
Republic of Korea

-Jongseong Kim
TEL: 82-10-2207-1919
FAX: 82-2-6950-2080

-Adam Wick
TEL: 503-808-7216
FAX: 503-350-0833

Qualcomm Snapdragon 800-series (32-bit) w/ Android 5.0.1; Qualcomm Snapdragon 800-series (64-bit) w/ Android 5.0.1 3/20/2015 ANSI X9.31
[ AES-128Key  ]

"General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the OpenSSL FIPS Object Module, which is a full featured general purpose cryptographic library."

06/25/15: Added new tested information;

1353LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul, n/a 152-721
Republic of Korea

-Jongseong Kim
TEL: 82-10-2207-1919
FAX: 82-2-6950-2080

-Adam Wick
TEL: 503-808-7216
FAX: 503-350-0833

Qualcomm Snapdragon 800-series w/ Android 5.0.1 3/20/2015 ANSI X9.31
[ AES-128Key  ]

"General-purpose cryptographic services within the Linux kernel used by LG devices to provide secured services."

1352LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul, n/a 152-721
Republic of Korea

-Jongseong Kim
TEL: 82-10-2207-1919
FAX: 82-2-6950-2080

-Adam Wick
TEL: 503-808-7216
FAX: 503-350-0833

Qualcomm Snapdragon 800-series (32-bit) w/ Android 5.0.1; Qualcomm Snapdragon 800-series (64-bit) w/ Android 5.0.1 3/20/2015 ANSI X9.31
[ AES-128Key  ]

"General-purpose cryptographic services available for Android used by LG devices to provide secured services to Java applications via the Bouncy Castle Java Cryptography Extension provider."

06/25/15: Added new tested information and updated implementation information;

1351Hewlett Packard Enterprise
14231 Tandem Boulevard
Austin, TX 78728
USA

-Kevin Pimm
TEL: (512) 432-2969

Intel Xeon E5-2620v3 w/ CentOS 5.6;Intel Xeon E5-2690v3 w/ CentOS 5.6 3/20/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"This implementation represents a version of the FIPS certified Mozilla Network Security Services (NSS) compiled for CentOS 5.6."

12/17/15: Updated vendor and implementation information;

1349OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD 27101
USA

-Steve Marquess
TEL: 877-673-6775

Apple A7 (ARMv8) 64-bit without NEON and Crypto Extensions w/ iOS 8.1; Apple A7 (ARMv8) 64-bit with NEON and Crypto Extensions w/ iOS 8.1; Freescale P2020 (PPC) w/ VxWorks 6.9; Apple A7 (ARMv8) with NEON w/ iOS 8.1 32-bit; Apple A7 (ARMv8) without NEON w/ iOS 8.1 32-bit; Qualcomm APQ8084 (ARMv7) without NEON w/ Android 5.0 32-bit; Qualcomm APQ8084 (ARMv7) with NEON w/ Android 5.0 32-bit; SAMSUNG Exynos7420 (ARMv8) without NEON and Crypto Extensions w/ Android 5.0 64-bit; SAMSUNG Exynos7420 (ARMv8) with NEON and Crypto Extensions w/ Android 5.0 64-bit 3/13/2015 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/."

04/17/15: Added new tested information;
05/29/2015: Updated implementation information;
08/11/15: Updated implementation information;

1348Axway Inc.
2600 Bridge Parkway Suite 201
Redwood City, California 94065
USA

-Tom Donahoe
TEL: 480-627-1800
FAX: 480-627-1801

-Paul Keane
TEL: 650-801-3176
FAX: 650-801-3101

Intel Xeon E5-2620 w/ RHEL 6.3 64bit; Sun UltraSparc T1 w/ Solaris 10 64bit; Intel Xeon E5-2620 w/ Microsoft Windows 2012 64bit 2/27/2015 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"Axway Validation Authority Suite - a collection of products that provide flexible and robust OCSP/SCVP certificate validation solution for standard and custom desktop and server applications, supporting established security standards and technologies. These products may be used together or integrated with existing solutions."

1347Hewlett Packard Enterprise
14231 Tandem Boulevard
Austin, TX 78728
USA

-Paul Tucker
TEL: 512-432-2626
FAX: +1 512 432 2001

-Freddy A. Mercado
TEL: +1 512 432 2947
FAX: +1 512 432 2001

Intel Jasper Forest Quad-core; Broadcom XLR 2/27/2015 ANSI X9.31
[ TDES-3Key  ]

"The TippingPoint IPS Platform operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. The IPS provides cryptographic services to protect the management of the device."

04/17/15: Updated implementation information;
12/10/15: Updated implementation and vendor information;

1346ARX (Algorithmic Research)
10 Nevatim St
Petah-Tikva, Israel 49561
Israel

-Ezer Farhi
TEL: 972-3-9279529

Intel® Pentium Dual-Core 2/6/2015 FIPS 186-2 General Purpose
[ (x-Original); (DES) ]

"CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data."

1345Websense, Inc.
10240 Sorrento Valley Road
San Diego, CA 92121
USA

-Matt Sturm

Intel Xeon E5-2400 w/ Microsoft Windows Server 2012 1/30/2015 ANSI X9.31
[ AES-128Key  ]

"The Websense Java Crypto Module provides cryptographic functions for a variety of security solutions from Websense."

1344j-Metrics
No.630, Guangfu S. Rd., Da'an Dist., Taipei City 10695, Taiwan (R.O.C.
Taipei, n/a 10695
Taiwan, ROC

-Ming-Che Chen
TEL: 886-3-668-2305#305
FAX: 886-2-2325-6603

-Sheng-Hung Wu
TEL: 886-3-668-2305#306
FAX: 886-2-2325-6603

ARM Cortex-A7 4 core w/ Android 4.4.2+ with kernel 3.4+. 1/23/2015 ANSI X9.31
[ TDES-2Key  TDES-3Key  AES-128Key  AES-192Key  AES-256Key  ]

"JMetrics Cryptographic Library is designed to help protect the data as it is transformed between our fingerprint sensor and security applications, such as Mobile Payment or storage encryption."

1343Aruba Networks, Inc.
1344 Crossman Ave
Sunnyvale, CA 94089
USA

-Jon Green
TEL: 408-227-4500
FAX: 408-227-4550

-Steve Weingart
TEL: 210-516-5736

Broadcom BCM53014 12/31/2014 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks."

1342Samsung Electronics Co., Ltd.
416, Maetan 3-Dong Youngton Gu
Suwon, Gyeonggi 152-848
South Korea

-Abraham Joseph Kang
TEL: +1-408-324-3678
FAX: +1-408-324-3640

-Bumhan Kim
TEL: +82-10-4800-6711

Qualcomm MSM8974 w/ QSEE 2.0 12/24/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit."

1341Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-0480
FAX: 408-333-8101

AMCC PPC 44EPX 12/19/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Brocade cryptographic library is used in Brocade FOS based switches to implement the cryptographic related modules"

1340Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-0480
FAX: 408-333-8101

E 500 mc 12/19/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Brocade cryptographic library is used in Brocade FOS based switches to implement the cryptographic related modules"

1339Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-0480
FAX: 408-333-8101

PCC 440GPX and PPC 8548 12/19/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Brocade cryptographic library is used in Brocade FOS based switches to implement the cryptographic related modules"

1338Samsung Electronics Co., Ltd.
416, Maetan 3-Dong Youngton Gu
Suwon, Gyeonggi 152-848
South Korea

-Abraham Joseph Kang
TEL: +1-408-324-3678
FAX: +1-408-324-3640

-Bumhan Kim
TEL: +82-10-4800-6711

Samsung Electronics Exynos 5422 w/ MOBICORE Tbase 300 12/19/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit."

12/23/14: Updated implementation information;

1337Trend Micro Inc.
40 Hines Road
Suite 200
Ottawa, ON K2K 2M5
Canada

-Marion Chase
TEL: 613-599-4505 x 2306
FAX: 613-599-8191

-Marion Mora
TEL: 613-599-4505 x 2346
FAX: 613-599-8191

Intel Pentium 4 w/ Microsoft Windows 2008 R2 (64-bit) 12/19/2014 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"Trend Micro Cryptographic Module provides FIPS 140-2 algorithm services for the Deep Security Manager centralized management component used to configure security policy and deploy protection to enforcement components."

1336ChaseSun Information Security Technology Development (Bejing)., Ltd.
North Building 13
Xingdacheng Plaza
197# Guangzhou Road
Yuexiu District, Guangzhou 510075
China

-Peng Sun
TEL: +86-20-22387717
FAX: +86-20-22387717

Freescale MCIMX53 12/12/2014 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"CS100 Module Crypto Library implements the cryptographic algorithms such as AES, HMAC, RSA, SHA, and RNG. The Library provides cryptographic functionality to the CS100 module."

1335Security First Corporation
29811 Santa Margarita Parkway
Suite 600
Rancho Santa Margarita, CA 92688
USA

-Rick Orsini
TEL: 949-858-7525
FAX: 949-858-7092

Intel Core i5 on VMWare ESXi 4.1.0 w/ Microsoft Windows Server 2008 64-bit; Intel Core i7 on QEMU w/ Microsoft Windows Server 2012 64-bit; Intel Core i5 with AES-NI w/ Red Hat Enterprise Linux 6 64-bit; Intel Core i5 on QEMU w/ Suse Linux Enterprise Server 11 SP3 64-bit; IBM Power7 w/ AIX 7.1 64-bit; Intel Core i7 on QEMU with AES-NI, disabled w/ Windows 7 32-bit; Intel Core i7 on QEMU, AES-NI w/ Windows 7 32-bit; Intel Core i5 with AES-NI disabled w/ Windows 7 64-bit; Intel Core i5 with AES-NI w/ Windows 7 64-bit; AMD A4-500 with AES-NI disabled w/ Windows 8 64-bit; AMD A4-500 with AES-NI w/ Windows 8 64-bit; Intel Core i5 without AES-NI w/ Red Hat Enterprise Linux 6 64-bit ;  Qualcomm Snapdragon 801 (ARMv7-A) w/ Android 4.4; Intel Core i5 without AES-NI w/Mac OS X 10.9 64-bit; Apple A7 (ARMv8) w/ iOS7 12/5/2014 ANSI X9.31
[ AES-128Key  ]

"The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library."

02/18/15: Added new tested information;
03/27/15: Added new tested information;
04/06/15: Updated implementation information;

1334McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

-Mark Hanson
TEL: +1 651 628 1633
FAX: +1 651 628 2706

Xeon E5540 w/ MLOS v2.2.3 running on VMware ESXi5.0 hypervisor 12/5/2014 ANSI X9.31
[ AES-128Key  ]

"McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products."

1333McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

-Mark Hanson
TEL: +1 651 628 1633
FAX: +1 651 628 2706

Celeron; Core i3; Xeon E5540 12/5/2014 ANSI X9.31
[ AES-128Key  ]

"McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products."

1332IBM Corporation
80 Bishop Dr., Unit B
Fredericton, New Brunswick E3C 1B2
Canada

-Peter Clark
TEL: (416) 478-0224

-Chris LeMesurier
TEL: (416) 478-0224

Intel Xeon w/ RHEL 6 12/5/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The IBM Cryptographic Security Kernel is a multi-algorithm library providing general-purpose cryptographic services. The module provides a single, FIPS-Approved API for cryptography allowing for centralized FIPS mode status, logging, and reporting."

1331Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-8000
FAX: 408-333-8101

Intel Xeon CPU X5560 @ 2.80GHz w/ Brocade Vyatta Series 3500 Network OS 3.2.1R1 11/14/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Built for Network Functions Virtualixation (NFV), Brocade Vyatta 5650 and 5630 vRouters are the first virtual routers capable of providing advance routing in software without sacrificing the reliability and performance of hardware networking solutions."

12/09/14: Updated implementation information;

1330RSA, The Security Division of EMC
174 Middlesex Turnpike
Bedford, MA 01730
USA

-Sandy Carielli
TEL: 781-515-7510

ARM Cortex A7 Dual Core w/ Linaro Linux (kernel 3.10.33) 11/14/2014 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements."

1329Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/14/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size."

03/19/15: Updated implementation information;

1328McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

-Mark Hanson
TEL: +1 651 628 1633
FAX: +1 651 628 2706

Xeon E5540 w/ MLOS v2.2.3 running on VMware ESXi 5.0 hypervisor 11/7/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"McAfee Linux cryptographic modules provide cryptographic services for McAfee Linux and security appliance products built upon this platform. McAfee Linux is an operating system built with a focus on the needs of security appliances."

1327McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

-Mark Hanson
TEL: +1 651 628 1633
FAX: +1 651 628 2706

Celeron; Core i3; Xeon E5540 11/7/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"McAfee Linux cryptographic modules provide cryptographic services for McAfee Linux and security appliance products built upon this platform. McAfee Linux is an operating system built with a focus on the needs of security appliances."

1326Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 64bit word size."

03/19/15: Updated implementation information;

1325Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1324Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1323Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1322Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1321Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1320Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1319Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1318Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1317Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1316Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

-Ann Marie Rubin

Intel x86 w/ Red Hat Enterprise Linux 6.6 11/7/2014 ANSI X9.31
[ AES-128Key  ]

"User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size."

03/19/15: Updated implementation information;

1315Nuvoton Technology Corporation
No. 4, Creation Rd. III
Hsinchu Science Park, n/a 300
Taiwan, R.O.C.

-Yossi Talmi
TEL: 972-9-9702364
FAX: 972-9-9702001

-Oren Tanami
TEL: 972-9-9702390
FAX: 972-9-9702001

N/A 10/31/2014 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"Nuvoton TPM (Trusted Platform Module), a TCG 1.2 compliant security processor with embedded firmware"

11/17/14: Updated vendor and implementation information;

1314OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD 27101
USA

-Steve Marquess
TEL: 877-673-6775

Apple A7 (ARMv8) with NEON w/ Apple iOS 7.1 64-bit; Apple A7 (ARMv8) without NEON w/ Apple iOS 7.1 64-bit ;  Arm920Tid (ARMv4) w/ TS-Linux 2.4 10/31/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/."

12/04/14: Added new tested information;

1313UTC Fire & Security Americas Corporation, Inc.
1212 Pittsford Victor Road
Pittsford, NY 14534-3816
USA

-Michael O'Brien
TEL: 585-267-8345
FAX: 585-248-9185

Intel Core i5-3470 w/ VM (Microsoft Windows 8 64-bit); Intel Xeon E5620 w/ VM (Microsoft Windows Server 2012) 10/31/2014 ANSI X9.31
[ AES-128Key  ]

"The Scpd_net.dll provides communication services for the Lenel OnGuard Access Control Communication Server. The Communication Server controls Lenel Intelligent System Controllers including, but not limited to the LNL-2210, LNL-2220, and LNL-3300."

12/09/14: Updated implementation and vendor information;
08/18/15: Updated vendor and POC information;

1312ARX (Algorithmic Research)
10 Nevatim St
Petah-Tikva, Israel 49561
Israel

-Ezer Farhi
TEL: 972-3-9279529

Intel® Pentium Dual-Core 10/31/2014 FIPS 186-2 General Purpose
[ (x-Original); (DES) ]

"CoSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to CoSign from their PC for the purpose of signing documents and data."

1311Bomgar Corporation
578 Highland Colony Parkway
Paragon Centre, Suite 300
Ridgeland, MS 39157
USA

-Main Office
TEL: 601-519-0123
FAX: 601-510-9080

-Victor Wolff
TEL: 703-483-5515
FAX: 601-510-9080

Intel® Xeon 10/16/2014 ANSI X9.31
[ AES-128Key  AES-256Key  ]

"The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar B200, B300, and B400 Remote Support appliances. These appliances allow support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support."

1310Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

-Certicom Support
TEL: 1-905-507-4220
FAX: 1-905-507-4230

-Certicom Sales
TEL: 1-905-507-4220
FAX: 1-905-507-4230

Intel Core i7-2720QM w/ AES-NI w/ Windows 7 Enterprise 64-bit; ARMv7 w/ Windows Phone 8.0; ARMv7 w/ Android 4.4.2; Intel Atom CPU Z2460 w/ Android 4.0.4; ARMv7 w/ iOS version 6.1.4 ;  ARMv8 w/ Android 5.0.1; ARMv7S w/ iOS 6.1.4; ARMv8 w/ iOS 8.0; Intel Xeon with AES-NI w/ Windows 7; Intel Xeon E5620 with AES-NI w/ CentOS Linux Release 7.1 64-bit; Intel Core i7-3615QM w/ Mac OS X Yosemite 10.10.4 10/16/2014 ANSI X9.62
[( P256  P384  P512  K163  K283  ) (SHA-1) ]

ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec SSL and IPSec and SSL modules."

04/13/15: Updated vendor and implementation information;
10/09/15: Added new tested information;

1309Analog Devices, Inc.
One Technology Way
Norwood, MA 02062
USA

-Gabby Yi

ADSP-BF706 (embedded software) w/ n/a 10/16/2014 ANSI X9.31
[ AES-128Key  ]

"The Analog Devices Security Packet Engine provides uniform cryptographic capabilities for the ADSP-BF70x Blackfin processor family. The embedded software API invokes the hardware to perform Approved HMAC and RNG functions."

1308LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul, n/a 152-721
Republic of Korea

-Jongseong Kim
TEL: 82 10 2207 1919
FAX: 82 2 6950 2080

Qualcomm Snapdragon 800 w/ Android 4.4.2 9/30/2014 ANSI X9.31
[ AES-128Key  ]

"General-purpose cryptographic services available for Android used by LG devices to provide secured services to Java applications via the Bouncy Castle Java Cryptography Extension provider."

1307LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul, n/a 152-721
Republic of Korea

-Jongseong Kim
TEL: 82 10 2207 1919
FAX: 82 2 6950 2080

Qualcomm Snapdragon 800 w/ Android 4.4.2 9/30/2014 ANSI X9.31
[ AES-128Key  ]

"General-purpose cryptographic services within the Linux kernel used by LG devices to provide secured services."

1306LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul, n/a 152-721
Republic of Korea

-Jongseong Kim
TEL: 82 10 2207 1919
FAX: 82 2 6950 2080

Qualcomm Snapdragon 800 w/ Android 4.4.2 9/30/2014 ANSI X9.31
[ AES-128Key  ]

"General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the OpenSSL FIPS Object Module, which is a full featured general purpose cryptographic library."

1305Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

-Kyung-Hee Lee
TEL: +82-10-9397-1589

ARMv7 w/ Android KitKat 4.4.4 9/30/2014 ANSI X9.31
[ AES-128Key  ]

"General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services. This test covers the AES and SHA1 assembler implementations."

1304Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

-Kyung-Hee Lee
TEL: +82-10-9397-1589

ARMv7 w/ Android KitKat 4.4.4 9/30/2014 ANSI X9.31
[ AES-128Key  ]

"General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services."

1303Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-8000
FAX: 408-333-8101

Intel Xeon Processor E5-2680 v2 (25 M Cache, 2.80 GHz) w/ Brocade Vyatta Network OS 3.2.1R1 9/12/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Built for Network Functions Virtualixation (NFV), Brocade Vyatta 5650 and 5630 vRouters are the first virtual routers capable of providing advance routing in software without sacrificing the reliability and performance of hardware networking solutions."

12/09/14: Updated implementation information;

1302ChaseSun Information Security Technology Development (Bejing)., Ltd.
North Building 13
Xindacheng Plaza
197# Guangzhou Road
Yuexiu District, Guangzhou 510075
China

-Peng Sun
TEL: +86-20-22387717
FAX: +86-20-22387717

Freescale MCIMX53 9/12/2014 ANSI X9.31
[ AES-128Key  ]

"CS100 Module Crypto Library implements the cryptographic algorithms such as AES, HMAC, SHA and RNG. The library provides cryptogrpahic finctionality to CS100 module."

1301Doremi Labs
1020 Chestnut Street
Burbank, CA 91506
USA

-Jean-Philippe Viollet
TEL: (818)562-1101
FAX: (818)562-1109

-Camille Rizko
TEL: (818)562-1101
FAX: (818)562-1109

Power PC 9/12/2014 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"An Implementation of the FIPS 186-2 General Purpose RNG algorithm used inside Doremi Labs'' Media Blocks"

1300Doremi Labs
1020 Chestnut Street
Burbank, CA 91506
USA

-Jean-Philippe Viollet
TEL: (818)562-1101
FAX: (818)562-1109

-Camille Rizko
TEL: (818)562-1101
FAX: (818)562-1109

Power PC 9/12/2014 ANSI X9.31
[ TDES-2Key  ]

"An Implementation of the ANSI X9.31 RNG algorithm used inside Doremi Labs'' Media Blocks"

1299Huawei Device(Dongguan) Co., Ltd.
B2-5 of Nanfang Factory
No.2 of Xincheng Rd
Songshan Lake Science & Technology Industrial Zone
Dongguan, Guangdong 523808
China

-Mr. Hongtailiang
TEL: 86-755-36835195

-Mr. Blue Lee
TEL: 86-755-28976679

Huawei P7 Mobile Phone w/ Android 4.4.2 9/12/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The module provides the key management functions of secure applications. It provides a key generating by RNG and AES algorithm to encrypt the DEK, and the symmetric key for AES is generated by PBKDF which based on HMAC and SHA algorithm."

1298Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

-Kyung-Hee Lee
TEL: +82-10-9397-1589

ARM 7 w/ Tizen 2.2.1 8/28/2014 ANSI X9.31
[ AES-128Key  ]

"General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services."

1297Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

-Kyung-Hee Lee
TEL: +82-10-9397-1589

ARM 7 w/ Tizen 2.2.1 8/28/2014 ANSI X9.31
[ AES-128Key  ]

"General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services. This tests covers the AES and SHA1 assembly implementations."

1296Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-0480
FAX: 408-333-8101

E 500 mc 8/28/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Brocade cryptographic library is used in Brocade NOS based switches to implement the cryptographic related modules."

1295Digicine Oristar Technology Development (Beijing) Co., Ltd.
No.1 Di Sheng West Street, BDA
Da Xing District
Beijing, 100176
China

-Mr. Xiao, Liquin
TEL: +86-010-8712 9372
FAX: +86-010-87127010

-Dr. Sun, Xiaobin
TEL: +86-010-8712 9111
FAX: +86-010-87127010

RENESAS SH-4A 8/11/2014 ANSI X9.31
[ AES-128Key  ]

"Oristar IMB RNG Core-S is the firmware module for digital cinema system."

1294Digicine Oristar Technology Development (Beijing) Co., Ltd.
No.1 Di Sheng West Street, BDA
Da Xing District
Beijing, 100176
China

-Mr. Xiao, Liquin
TEL: +86-010-8712 9372
FAX: +86-010-87127010

-Dr. Sun, Xiaobin
TEL: +86-010-8712 9111
FAX: +86-010-87127010

Altera Cyclone III FPGA 8/11/2014 ANSI X9.31
[ AES-128Key  ]

"Oristar IMB RNG Core-C2 is the firmware module for digital cinema system."

1293Digicine Oristar Technology Development (Beijing) Co., Ltd.
No.1 Di Sheng West Street, BDA
Da Xing District
Beijing, 100176
China

-Mr. Xiao, Liquin
TEL: +86-010-8712 9372
FAX: +86-010-87127010

-Dr. Sun, Xiaobin
TEL: +86-010-8712 9111
FAX: +86-010-87127010

Altera Cyclone III FPGA 8/11/2014 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"Oristar IMB RNG Core-C is the firmware module for digital cinema system."

1292OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD 27101
USA

-Steve Marquess
TEL: 877-673-6775

Xeon E5-2430L (x86) without AES-NI w/ FreeBSD 10.0; Xeon E5-2430L (x86) with AES-NI w/ FreeBSD 10.0; Intel Xeon E5440 (x86) 32-bit without AES-NI w/ FreeBSD 8.4; Intel Xeon E3-1220 (x86) without AES-NI w/ VMware Horizon Workspace 2.1 under vSphere; Intel Xeon E3-1220 (x86) with AES-NI w/ VMware Horizon Workspace 2.1 under vSphere; Freescale i.MX25 (ARMv4) w/ QNX 6.5 8/11/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/."

09/22/14: Added new tested information;
10/29/14: Added new tested information;

1291Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

-Bob Pittman
TEL: 1-978-264-5211
FAX: 1-978-264-5522

Freescale P1021, 800Mhz, PowerPC; Cavium 6130, 1Ghz, MIPS; Cavium 6635, 1.3 Ghz, MIPS; Cavium 6218, 1Ghz, MIPS; Cavium 6740, 1Ghz, MIPS; Cavium 6760, 1Ghz, MIPS; Cavium 6880, 1.2Ghz, MIPS 7/31/2014 ANSI X9.31
[ AES-128Key  ]

"Comware cryptographic library is a software library that provides cryptographic functions within HP devices."

1290Palo Alto Networks
4401 Great America Parkway
Santa Clara, California 95054
USA

-Richard Bishop
TEL: 408-753-4000
FAX: 408-753-4001

-Jake Bajic
TEL: 408-753-3901
FAX: 408-753-4001

Cavium Octeon MIPS64; Intel Multi Core Xeon; Intel Celeron P4505; Intel Core I7 7/10/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-500, PA-2000, PA-3000, PA-4000, PA-5000 and PA-7050 firewalls and M100/Panorama. The firewalls provide network security by enabling enterprises to see/control applications, users, and content."

1289Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-0480
FAX: 408-333-8101

PPC 440GPX and PPC 8548 7/10/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Brocade Cryptographic Library is used in Brocade FOS based switches to implement the cryptographic related modules."

1288Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris marks
TEL: 408-333-0480
FAX: 408-333-8101

E 500 mc 7/10/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Brocade cryptographic library is used in Brocade FOS based switches to implement the cryptographic related modules."

1287Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

-Global Certification Team

N/A 7/10/2014 ANSI X9.31
[ AES-128Key  ]

"Cisco WLAN Controller 5508 provides centralized control, management and scalability for small, medium and large-scale Government WLAN networks using APs joined over secure DTLS connection and support IEEE 802.11i security standard with WPA2 to enable a Secure Wireless Architecture.""

1286Hewlett Packard Enterprise Company
1344 Crossman Ave
Sunnyvale, CA 94089
USA

-Steve Weingart
TEL: 512-319-2480
FAX: 408-227-4550

Broadcom XLP Series; Freescale QorIQ P10XX Series 7/10/2014 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks. The Broadcom XLP Series includes Broadcom XLP 204, XLP 208, XLP 316, XLP 408, XLP 416 and XLP 432 processors; the Freescale QorIQ P10XX Series includes P1010 and P1020 processors."

12/04/14: Updated implementation information;
12/24/14: Updated implmentation information;
08/18/15: Updated implementation information;
01/12/16: Updated vendor information;

1285Becrypt Ltd.
90 Long Acre
Covent Garden
London, England WC2E 9RA
United Kingdom

-Mark Wilce
TEL: +44 207 557 6515
FAX: +44 845 838 2060

-Nigel Lee
TEL: +44 845 838 2050
FAX: +44 845 838 2060

Google Nexus 7 (2012) with NVidia Tegra 3 ARM v6 w/ Android v4.2.2; Dell Vostro 1500 with Intel Centrino Duo 64-bit processor w/ Ubuntu Linux 12.04 LTS; Dell D630 with Intel Centrino Duo 32-bit processor w/ Ubuntu Linux 12.04 LTS; Dell Venue 11 Pro (7130) with Intel Core i5-4300Y 64-bit AES-NI processor w/ Microsoft Windows 8.1 Professional; Dell Vostro 1500 with Intel Centrino Duo 64-bit processor w/ Microsoft Windows 7 Enterprise Edition; Dell D630 with Intel Centrino Duo 32-bit processor w/ Microsoft Windows 7 Ultimate Edition 7/10/2014 ANSI X9.31
[ AES-128Key  AES-256Key  ]

"The BeCrypt Cryptographic Library provides core cryptographic functionality for BeCrypt''s security products providing a capability to develop complex and flexible security applications that require cryptographic functionality for pre-OS (16-bit), 32-bit and 64-bit operating environments."

1284Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-0480
FAX: 408-333-8101

AMCC PPC 440EPX 6/27/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Brocade Cryptographic library is used in Brocade FOS based switches to implement the cryptographic related modules."

1283N/AN/AN/A6/27/2014 N/A1282RSA, The Security Division of EMC
174 Middlesex Turnpike
Bedford, MA 01730
USA

-Sandy Carielli
TEL: 781-515-7510

Intel x86 with AES-NI w/ Windows Server 2003 Enterprise R2 (/MD); Intel x86 without AES-NI w/ Windows Server 2003 Enterprise R2 (/MD); Intel x86 with AES-NI w/ Windows Server 2008 Enterprise SP2 (/MD); Intel x86 without AES-NI w/ Windows Server 2008 Enterprise SP2 (/MD); Intel x86 with AES-NI w/ Windows 7 Enterprise SP1 (/MD); Intel x86 without AES-NI w/ Windows 7 Enterprise SP1 (/MD); Intel x64 with AES-NI w/ Windows Server 2003 Enterprise R2 (/MD); Intel x64 without AES-NI w/ Windows Server 2003 Enterprise R2 (/MD); Intel x64 with AES-NI w/ Windows Server 2008 Enterprise R2 (/MD); Intel x64 without AES-NI w/ Windows Server 2008 Enterprise R2 (/MD); Intel x64 with AES-NI w/ Windows 7 Enterprise SP1 (/MD); Intel x64 without AES-NI w/ Windows 7 Enterprise SP1 (/MD); Itanium2 w/ Windows Server 2003 Enterprise R2; Itanium2 w/ Windows Server 2008 Enterprise R2; Intel x86 with AES-NI w/ Windows Server 2003 Enterprise R2 on ESX 5.1 (/MT); Intel x86 without AES-NI w/ Windows Server 2003 Enterprise R2 (/MT); Intel x86 with AES-NI w/ Windows Server 2008 Enterprise SP2 (/MT); Intel x86 without AES-NI w/ Windows Server 2008 Enterprise SP2 (/MT); Intel x86 with AES-NI w/ Windows 7 Enterprise SP1 (/MT); Intel x86 without AES-NI w/ Windows 7 Enterprise SP1 (/MT); Intel x64 with AES-NI w/ Windows Server 2003 Enterprise R2 (/MT); Intel x64 without AES-NI w/ Windows Server 2003 Enterprise R2 (/MT); Intel x64 with AES-NI w/ Windows Server 2008 Enterprise R2 (/MT); Intel x64 without AES-NI w/ Windows Server 2008 Enterprise R2 (/MT); Intel x64 with AES-NI w/ Windows 7 Enterprise SP1 (/MT); Intel x64 without AES-NI w/ Windows 7 Enterprise SP1 (/MT); Intel x64 with AES-NI w/ Windows Server 2012 R2 Standard (/MT); Intel x64 without AES-NI w/ Windows Server 2012 R2 Standard (/MT); Intel x64 with AES-NI w/ Windows 8.1 Enterprise (/MT); Intel x64 without AES-NI w/ Windows 8.1 Enterprise (/MT); Itanium2 64-bit w/ Windows Server 2003 Enterprise R2; Itanium2 64-bit w/ Windows Server 2008 Enterprise R2; Intel x86 with AES-NI w/ Red Hat Enterprise Linux 5.5 on ESX 4.0; Intel x86 without AES-NI w/ Red Hat Enterprise Linux 5.5 on ESX 4.0; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 5.5 on ESX 4.0; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 5.5 on ESX 4.0; Intel x86 without AES-NI w/ Red Hat Enterprise Linux 6.1 on ESXi 4.1; Intel x86 with AES-NI w/ SUSE Linux Enterprise Server 11 on ESX 4.0; Intel x86 without AES-NI w/ SUSE Linux Enterprise Server11 on ESX 4.0; Intel x64 with AES-NI w/ Red Hat Enterprise Linux 6.1 ESXi 4.1; Intel x64 without AES-NI w/ Red Hat Enterprise Linux 6.1 on ESXi 4.1; Intel x64 with AES-NI w/ SUSE Linux Enterprise Server 11 on ESXi 4.1; Intel x64 without AES-NI w/ SUSE Linux Enterprise Server 11 on ESXi 4.1; Itanium2 64-bit w/ Red Hat Enterprise Linux 5.5; PPC 32-bit w/ Red Hat Enterprise Linux 5.3; PPC 32-bit w/ SUSE Linux Enterprise Server 11; PPC 64-bit w/ Red Hat Enterprise Linux 5.3; PPC 64-bit w/ SUSE Linux Enterprise Server 11; Intel x64 with AES-NI w/ FreeBSD 8.3 on ESXi 5.0; Intel x64 without AES-NI w/ FreeBSD 8.3 on ESXi 5.0; Intel x64 with AES-NI w/ Mac OS X 10.8; Intel x64 without AES-NI w/ Mac OS X 10.8; SPARC v8 w/ Solaris 10; SPARC v8+ w/ Solaris 11; SPARC v9 (T2) w/ Solaris 11; SPARC v9 (T4) with T4 accelerator w/ Solaris 11; SPARC v9 (T4) without T4 accelerator w/ Solaris 11; Intel x86 with AES-NI w/ Solaris 10 on ESXi 4.1; Intel x86 without AES-NI w/ Solaris 10 on ESXi 4.1; Intel x64 with AES-NI w/ Solaris 10; Intel x64 without AES-NI w/ Solaris 10; PA-RISC 2.0 32-bit w/ HPUX 11.31; PA-RISC 2.0W 64-bit w/ HPUX 11.31; Itanium2 32-bit w/ HPUX 11.31; Itanium2 64-bit w/ HPUX 11.31; PowerPC 32-bit w/ AIX 6.1 on Virtual I/O Server 2.2.2.1; PowerPC 64-bit w/ AIX 6.1 on Virtual I/O Server 2.2.2.1; PowerPC 32-bit w/ AIX 7.1 on Virtual I/O Server 2.2.2.1; PowerPC 64-bit w/ AIX 7.1 on Virtual I/O Server 2.2.2.1; IBM z196 31/32-bit w/ Red Hat Enterprise Linux 5.8 on z/VM 6.2; IBM z196 64-bit w/ Red Hat Enterprise Linux 5.8 on z/VM 6.2; ARMv7 w/ Ubuntu 12.04 LTS; ARMv7 w/ Fedora Core 17; Intel x86 w/ Android 4.0.3; ARMv7 w/ Android 2.3.6; ARMv7 w/ Android 4.1.2; ARMv7 w/ iOS 7.1; ARMv7s w/ iOS 7.1; PPC 604 w/ VxWorks 6.4; PPC 604 w/ VxWorks 6.7; ARMv4 w/ VxWorks 6.8 6/27/2014 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements."

1281Digicine Oristar Technology Development (Beijing) Co., Ltd.
No.1 Di Sheng West Street, BDA
Da Xing District
Beijing, 100176
China

-Helen Li
TEL: +86 10 8712 7173
FAX: +86 10 8712 7010

Freescale MCIMX515DJM8C 6/30/2014 ANSI X9.31
[ AES-128Key  ]

"Oristar''s Integrated Media Block (IMB) product with its model number CHN-II supports 2K/4K Jpeg2000 image decoding for theatrical playback in Digital Cinemas."

1280Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

-Bob Pittman
TEL: 1-978-264-5211
FAX: 1-978-264-5522

Freescale P2020 6/27/2014 ANSI X9.31
[ AES-128Key  ]

"Comware cryptographic library is a software library that provides cryptographic functions within HP devices."

1279Sony Corporation
1-7-1 Konan, Minato-ku
Tokyo, 108-0075
Japan

-Hirotaka Kondo
TEL: +81 50 3140 9888
FAX: +81 50 3809 1421

-Shigeki Yamamoto
TEL: +81 50 3140 9131
FAX: +81 50 3809 1421

Altera Cyclone III FPGA 5/9/2014 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"Sony IMB RNG Core-C is the firmware module for digital cinema system."

1278OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD 27101
USA

-Steve Marquess
TEL: 877-673-6775

Freescale e500v2 (PPC) w/ Linux 2.6; Intel Core i7-3612QE (x86) without AES-NI w/ AcanOS 1.0; Intel Core i7-3612QE (x86) with AES-NI w/ AcanOS 1.0; Feroceon 88FR131 (ARMv5) w/ AcanOS 1.0; Intel Xeon E5440 (x86) without AES-NI w/ FreeBSD 8.4; Xeon E5-2430L (x86) without AES-NI w/ FreeBSD 9.1; Xeon E5-2430L (x86) with AES-NI w/ FreeBSD 9.1; Xeon E5645 (x86) without AES-NI w/ ArbOS 5.3; ASPEED AST-Series (ARMv5) w/ Linux ORACLESP 2.6; Emulex PILOT3 (ARMv5) w/ Linux ORACLESP 2.6; Xeon E5645 (x86) with AES-NI w/ ArbOS 5.3 ;  Xeon E5-2430L (x86) without AES-NI w/ FreeBSD 9.2; Xeon E5-2430L (x86) with AES-NI w/ FreeBSD 9.2 5/9/2014 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/."

05/14/14: Added new tested information;
07/03/14: Added new tested information;
07/178/14: Added new tested information;
07/31/14: Updated implementation information;

1277Siemens PLM Software
5800 Granite Parkway
Suite 600
Plano, TX 75024
USA

-Vikas Singh
TEL: 651-855-6176

Intel Xeon w/ Windows 7 SP1; Intel Core 2 Duo w/ SUSE Linux 11.2; Intel Core i5 w/ Mac OS X 10.8 5/2/2014 ANSI X9.31
[ TDES-2Key  ]

"Teamcenter powers innovation and productivity by connecting people and processes with knowledge. Teamcenter is the de facto standard for PLM deployment, providing solutions to drive business performance goals."

1276Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

-Kyung-Hee Lee
TEL: +82-10-9397-1589

ARM 7 w/ Android KitKat 4.4.2 3/21/2014 ANSI X9.31
[ AES-128Key  ]

"General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services. This tests covers the asm AES and SHA1 implementations."

1275Samsung Electronics Co., Ltd
R4 416, Maetan 3-dong, Yeongtong-gu
Suwon-si, Gyeonggi-do 443-742
Korea

-Kyung-Hee Lee
TEL: +82-10-9397-1589

ARM 7 w/ Android KitKat 4.4.2 3/21/2014 ANSI X9.31
[ AES-128Key  ]

"General purpose Cryptographic services available for Linux kernel used by Samsung devices to provide secured services."

1274RSA, The Security Division of EMC
174 Middlesex Turnpike
Bedford, MA 01730
USA

-Sandy Carielli
TEL: 781-515-7510

MV78230 ARMv7 w/ TimeSys Linux Kernel 2.6.33RT; PJ4B-MP ARMv7 w/ TimeSys Linux Kernel 3.0.0 3/21/2014 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements."

1273Atmel Corporation
2325 Orchard Parkway
San Jose, CA 95131
US

-Jim Hallman
TEL: (919) 846-3391

-Todd Slack
TEL: (719) 540-3021

N/A 3/21/2014 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"The AT97SC3205 is a single chip cryptographic module used for cryptographic key generation, key storage and key management as well as generation and secure storage for digital certificates."

04/03/14: Updated vendor information;

1272Dell SonicWALL
2001 Logic Drive
San Jose, CA 95124
USA

-Gary Tomlinson
TEL: (408) 962-6756
FAX: (408) 745-9300

-Usha Sanagala
TEL: (408) 962-6248
FAX: (408) 745-9300

Intel Core 2 Duo; Intel Celeron; Intel Xeon Nehalem with AES-NI 2/28/2014 ANSI X9.31
[ AES-128Key  ]

"AES Component implements all AES key sizes and modes to allow flexibility and efficiency. AES/TDES/SHA/HMAC derived from OpenSSL implementations."

1271Mocana Corporation
710 Sansome Street
San Francisco, CA 94104
USA

-James Blaisdell
TEL: (415) 617-0055
FAX: (415) 617-0056

ARMv7 w/ Android 4.4 2/21/2014 FIPS 186-2
[ (x-Change Notice); k-Change Notice); (SHA-1) ]

FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"The Mocana Cryptographic Module is the engine of Mocana’s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com."

1270Motorola Solutions, Inc.
6480 Via Del Oro
San Jose, CA 95119
USA

-Udayan Borkar
TEL: 408-528-2361
FAX: 408-528-2903

-Colin Cooper
TEL: 408-528-2871
FAX: 408-528-2903

Broadcom XLR v4.0 2/14/2014 ANSI X9.31
[ TDES-3Key  ]

"Quicksec is a third party source code, which provides IPsec and IKE v1 cryptographic services."

1269SonicWALL, Inc.
2001 Logic Drive
San Jose, CA 95124
USA

-Usha Sanagala
TEL: 408-962-6248
FAX: 408-745-9300

Cavium Octeon Plus 66XX; Cavium Octeon Plus 68XX 1/24/2014 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"The Dell SonicWALL family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks."

1268Motorola Solutions, Inc.
6480 Via Del Oro
San Jose, CA 95119
USA

-Udayan Borkar
TEL: 408-528-2361
FAX: 408-528-2903

-Colin Cooper
TEL: 408-528-2871
FAX: 408-528-2903

Broadcom XLR v4.0 12/31/2013 ANSI X9.31
[ TDES-2Key  ]

"OpenSSL is a third party open source code, which provides cryptographic services to user space daemons. The device uses openssl-fips-1.1.1 version. RFS7000 userspace daemons (RADIUS, ntp, openssh, net-snmp, mapsh, etc) using openssl crypto services call fips_mode_set() from their respective initialization functions."

1267Motorola Solutions, Inc.
6480 Via Del Oro
San Jose, CA 95119
USA

-Udayan Borkar
TEL: 408-528-2361
FAX: 408-528-2903

-Colin Cooper
TEL: 408-528-2871
FAX: 408-528-2903

Cavium Octeon Plus CN5000 Family 12/31/2013 ANSI X9.31
[ AES-256Key  ]

"OpenSSL is a third party open source code, which provides cryptographic services to user space daemons. The device uses openssl-fips-1.2 version. AP7131N userspace daemons (RADIUS, ntp, openssh, net-snmp, etc) using openssl crypto services call fips_mode_set() from their respective initialization functions."

1266Mocana Corporation
20 California Street, Fourth Floor
San Francisco, CA 94111
USA

-James Blaisdell
TEL: (415) 617-0055
FAX: (415) 617-0056

ARMv7 w/ Android 4.3; ARMv7 w/ Android 4.4; PowerQuicc II Pro w/ VxWorks 6.8; ;  Freescale P2020 w/ Mentor Embedded Linux 4.0; Qualcomm MSM8974 w/ Linux 3.4; Qualcomm MSM8992 w/ Linux 3.10 12/20/2013 FIPS 186-2
[ (x-Change Notice); k-Change Notice); (SHA-1) ]

FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"The Mocana Cryptographic Module is the engine of Mocana’s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com."

03/11/14: Added new tested information;
01/23/15: Added new tested information;
02/03/15: Updated implementation information;
02/20/15: Added new tested information;
09/17/15: Added new tested information;

1265ND SatCom Products GmbH
Graf von Soden Strasse
Immenstaad, N/A 88090
Germany

-Dr. Michael Weixler
TEL: +49 7545 939 8198
FAX: +49 7545 939 8302

-Petra Visuri
TEL: +49 7545 939 8781

Freescale MPC8349E 12/20/2013 ANSI X9.31
[ AES-256Key  ]

"FIPS approved algorithms: AES, DSA, RNG and SHA functions implemented for crypto functionality of the ND SatCom FIPS Module, a multichip embedded hardware engine providing AES256 encryption services for Ethernet & Frame-Relay/Serial data traffic and MF-TDMA control signaling for the SkyWAN 7000 Series Satellite modems."

1263Palo Alto Networks
4401 Great America Parkway
Santa Clara, California 95054
USA

-Jake Bajic
TEL: (408) 753-3901
FAX: (408) 753-4001

-Lee Klarich
TEL: (408) 753-4000
FAX: (408) 753-4001

Cavium Octeon MIPS64; Intel Multi Core Xeon; Intel Celeron P4505 12/18/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e., the PA-200, PA-500, PA-2000, PA-3000, PA-4000 and PA-5000 firewalls and M100 Centralized Management. The firewalls provide network security by enabling enterprises to see/control applications, users, and content."

1262Barco N.V.
Noordlan 5
Kuurne, , 8520
Belgium

-Jean-Paul Schafer
TEL: +32 4 267 69 22
FAX: +32 4 267 69 99

Freescale Q or IQ P2040 Power-PC w/ Linux 3.0.48-rt70.2-svn5965 12/18/2013 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

ANSI X9.31
[ AES-128Key  ]

"Implementation on a Freescale Power_PC, using the OpenSSL Library"

1261Pitney Bowes, Inc.
37 Executive Drive
Danbury, CT 06810
USA

-Dave Riley
TEL: 1 203 796 3208

N/A 12/13/2013 FIPS 186-2
[ (x-Change Notice); k-Change Notice); (DES) ]

"N/A"

1260Tripwire, Inc.
101 SW Main St. Suite 1500
Portland, OR 97204
USA

-Brian R. Cox
TEL: 503-276-7500
FAX: 503-276-7643

Oracle Java 1.6 w/ Microsoft Windows Server 2008 R2 12/13/2013 ANSI X9.31
[ AES-256Key  ]

"Provides an AES implementation for Tripwire products."

1259VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

-Eric Betts
TEL: 650-427-1902

Intel Xeon E5-2430 w/ VMware vCloud Networking and Security 5.5.0a Edge OS running on VMware vSphere Hypervisor (ESXi) 5.5 12/13/2013 ANSI X9.31
[ AES-128Key  ]

"The VMware Kernel Cryptographic Module is a flexible software library providing FIPS-140-2 approved cryptographic operations for VMware products and platforms.""

12/27/13: Updated implementation information;

1258Cisco Systems, Inc.
170 W Tasman Drive
San Jose, CA 95134
USA

-Global Certification Team

Intel Xeon w/ Windriver Linux (2.6.99.99 kernel) 12/13/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The openssl crypto library is used on the Nexus7K supervisor to implement crypto operations in software."

1257DragonWave, Inc.
600-411 Legget Drive
Ottawa, ON K2K3C9
Canada

-Justin Wintour
TEL: (613) 599-9991

-Ingrid Mag
TEL: (613) 599-9991

Freescale MPC8313 12/13/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The DragonWave Secure Cryptographic Module firmware implementation provides peer-to-peer TLS communications for the management path established between two Quantum radio links."

1256DragonWave, Inc.
600-411 Legget Drive
Ottawa, ON K2K3C9
Canada

-Justin Wintour
TEL: (613) 599-9991

-Ingrid Mag
TEL: (613) 599-9991

Freescale MPC8313 12/13/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The DragonWave Secure Cryptographic Module firmware implementation provides peer-to-peer TLS communications for the management path established between two Compact+ radio links."

1255VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

-Eric Betts
TEL: 650-427-1902

Intel Xeon E5-2430 w/ VMware vCloud Networking and Security 5.5.0a Edge OS on VMware Sphere Hypervisor (ESXi) 5.5; Intel Xeon E5-2430 w/ VMware vCloud Networking and Security 5.5.0a vShield Manager OS (VMware vCloud Networking and Security 5.5.0a App Firewall OS) on VMware vSphere Hypervisor (ESXi) 5.5 11/29/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The VMware Cryptographic Module is a software library providing FIPS 140-2 -approved cryptographic algorithms and services for protecting data-in-transit and data-at-rest on VMware products and platforms."

12/27/13: Updated implementation information;

1254Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

-Bob Pittman
TEL: 1-978-264-5211
FAX: 1-978-264-5522

P1020, 800 Mhz, PowerPC; XLP432, 1.4 Ghz, MIPS; XLR 732, 950 Mhz, MIPS; XLS208, 750 Mhz, MIPS 11/29/2013 ANSI X9.31
[ AES-128Key  ]

"Comware cryptographic library is a software library that provides cryptographic functions within HP devices."

1253Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-0480
FAX: 408-333-8101

Power PC 8548 and 440GX 11/22/2013 ANSI X9.31
[ AES-128Key  ]

"The Brocade cryptographic library used in Brocade Fabric OS products implements crypto operations in software."

1252Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

-Chris Marks
TEL: 408-333-0480
FAX: 408-333-8101

AMCC PPC440EPX 11/22/2013 ANSI X9.31
[ AES-128Key  ]

"The Brocade cryptographic library used in Brocade Fabric OS products implements crypto operations in software."

1251Fortinet, Inc.
1090 Kifer Road
Sunnyvale, CA 94086-5301
USA

-Alan Kaye
TEL: 613-225-9381 x7416
FAX: 613-225-2951

Intel Xeon Quad-Core (Westmere) 11/22/2013 ANSI X9.31
[ AES-128Key  ]

"The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data and content data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of customizable reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data."

1250Hewlett Packard Enterprise Company
1344 Crossman Ave
Sunnyvale, CA 94089
USA

-Steve Weingart
TEL: 512-319-2480
FAX: 408-227-4550

Broadcom XLS204; Broadcom XLS408; Broadcom XLR508; Broadcom XLR516; Broadcom XLR532; Broadcom XLR732; Broadcom XLP416; Broadcom XLP432; Qualcomm Atheros AR7242; Qualcomm Atheros AR7161; Qualcomm Atheros QCA9550; Cavium CN5010; Marvell 88F6560; Qualcomm Atheros QCA9344; Freescale QorIQ P1020 11/15/2013 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks."

01/12/16: Updated vendor information;

1249Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

-Bob Pittman
TEL: 1-978-264-5211
FAX: 1-978-264-5522

Freescale MPC8314, 333MHZ, PowerPC; Freescale P2020, 1.0GHz, PowerPC; Freescale P4080, 1.5GHZ, PowerPC; Broadcom XLR732, 1.0GHz, MIPS 11/15/2013 ANSI X9.31
[ AES-128Key  ]

"Comware cryptographic library is a software library that provides cryptographic functions within HP devices."

1248Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

-Bob Pittman
TEL: 1-978-264-5211
FAX: 1-978-264-5522

Freescale P2020, 1000MHz, PowerPC 11/8/2013 ANSI X9.31
[ AES-128Key  ]

"Comware cryptographic library is a software library that provides cryptographic functions within HP devices."

1247Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

-n/a

MPC8544 w/ Comware V7.1; XLS408 w/ Comware V7.1 11/8/2013 ANSI X9.31
[ AES-128Key  ]

"Comware cryptographic library is a software library that provides cryptographic functions within HP devices."

1246Blue Coat Systems, Inc.
420 North Mary Avenue
Sunnyvale, California 94085-4121
USA

-Diana Robinson
TEL: 866-302-2628

Intel E5620 Quad Core w/ Linux x86_64 10/25/2013 ANSI X9.31
[ AES-256Key  ]

"The SSL Visibility Appliance is designed to detect SSL traffic and then under policy control to "inspect" the traffic. Inspection involves decrypting and re-encrypting the traffic to gain access to the clear text then passing this data to one or more associated security appliance(s) that need to see decrypted traffic."

1245Vaultive, Inc.
489 5th Avenue, floor 31
New York, NY 10017
USA

-Steve Coplan
TEL: 212-875-1210

Intel Xeon E5 series with AES-NI w/ Ubuntu Server 12.04LTS 10/1/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Vaultive Cryptographic Module implements several NIST-approved cryptographic algorithms. Vaultive Inc. uses the Vaultive Cryptographic Module to deliver cloud encryption solutions preserving server-side operations including indexing, searching, record sorting and format preservation without compromising security."

1244Entrust, Inc.
One Lincoln Centre
5400 LBJ Freeway
Suite 1340
Dallas, TX 75240
USA

-Greg Wetmore
TEL: 613-270-2773
FAX: 613-270-3400

-Mark Joynes
TEL: 613-270-3134
FAX: 613-270-3400

Intel Core 2 Duo E8400 w/ Microsoft Windows Server 2008 R2 Enterprise Edition 9/27/2013 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"The Security Kernel is a C++ implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware or both. The industry standard Cryptoki API from PKCS #11, is used as the interface to hardware-based cryptographic modules."

1243BlackBerry
295 Phillip Street
Waterloo, ON N2L3W8
Canada

-Security Certifications Team
TEL: 519-888-7465x72921
FAX: 905-507-4230

Intel Xeon X5650 w/ CentOS 5.5 Linux 32-bit; Intel Xeon X5650 w/ CentOS 5.5 Linux 64-bit; Intel Xeon X5650 w/ Windows XP 32-bit; Intel Xeon X5650 w/ Windows XP 64-bit; ARMv7 w/ QNX Neutrino 8.0 9/30/2013 ANSI X9.62
[( P256  P384  P512  K163  K283  ) (SHA-1) ]

ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The BlackBerry Cryptographic Algorithm Library is a suite of cryptographic algorithms that provides advanced cryptographic functionality to systems running BlackBerry 10 OS and components of BlackBerry Enterprise Service 10."

1242SafeNet, Inc.
20 Colonnade Road, Suite 200
Ottawa, ON K2E 7M6
Canada

-Chris Brych
TEL: 613-221-5081
FAX: 613-723-5079

StrongARM II (80219) 9/27/2013 ANSI X9.31
[ TDES-3Key  ]

"The Luna K5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''''s firmware and associated co-processor."

1241IBM
z/VM Design and Development
1701 North Street
Building 250-2
Endicott, NY 13760
U.S.

-Brian W. Hugenbruch
TEL: 607-429-3660

System z10 Enterprise Class processor w/ IBM z/VM V6.3 9/27/2013 FIPS 186-2 General Purpose
[ (x-Original); (x-Change Notice); (SHA-1) ]

"z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files."

1240Motorola Solutions, Inc.
6480 Via Del Oro
San Jose, CA 95119
USA

-Udayan Borkar
TEL: 408-528-2361
FAX: 408-528-2903

-Colin Cooper
TEL: 408-528-2871
FAX: 408-528-2903

RMI XLR V0.4 9/27/2013 ANSI X9.31
[ AES-256Key  ]

"OpenSSL is a third party open source package which provides cryptographic services to userspace daemons. Version is openssl-fips-1.2.3. Userspace daemons (like RADIUS, openssh) use openssl crypto services. fips_mode_set() is invoked from respective daemon initialization functions."

1239WatchDox, Inc.
299 S California Ave.
Palo Alto, CA 94306
USA

-Adi Ruppin
TEL: 800-209-1688

ARM Cortex A9 w/ Android 4.1; ARMv7 w/ Apple iOS 6.1; Intel Xeon without AES-NI w/ Red Hat Enterprise Linux 6; Intel Core (x64) with AES-NI w/ Windows 7 32-bit 9/11/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The WatchDox Crypto Module provides the services necessary to support the cryptographic features and functions of the WatchDox Secure File Sharing services and products."

1238Box, Inc.
4440 El Camino Real
Los Altos, CA 94022
USA

-Crispen Maung
TEL: (650) 329-1210

Intel(R) Xeon(R) w/ Scientific Linux 6.4 running on VMware vSphere 5.0 9/11/2013 ANSI X9.31
[ AES-256Key  ]

"Box''s cryptographic module is a C language-based implementation of cryptographic functions built using an OpenSSL FIPS Object Module. Box provides assurance that content encrypted by the product utilizes a FIPS 140-2 solution."

09/24/13: Updated implementation information;

1237Lumeta Corporation
300 Atrium Drive
Suite 302
Somerset, New Jersey 08873
USA

-Matt Webster
TEL: 732 357 3521
FAX: 732-564-0731

Intel x86_64 Processor w/ FreeBSD 8.1 8/29/2013 ANSI X9.31
[ AES-256Key  ]

"IPsonar scans a network to discovery its infrastructure - including network address spaces, connectivity flows, hosts, devices and leaks. It identifies and examines network-connected assets in order to create a topological view. IPsonar can be deployed as a single standalone appliance or as a collection of cooperating appliances."

1236Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

-Global Certification Team

Freescale P1021; Freescale MPC8343A; Freescale MPC8358E 8/29/2013 ANSI X9.31
[ TDES-2Key  ]

"This is the algorithm implementations for Cisco IOS wireless appliances."

1235AirTight® Networks
339 N. Bernardo Avenue
Suite 200
Mountain View, CA 94043
USA

-Sri Sundaralingam
TEL: 650-961-1111

AR9350 from Atheros Communications 8/29/2013 ANSI X9.31
[ AES-256Key  ]

"The implementation performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks."

1234Fortinet, Inc.
1090 Kifer Road
Sunnyvale, CA 94086-5301
USA

-Alan Kaye
TEL: 613-225-9381 x7416
FAX: 613-225-2951

ARM v5 Compatible; Intel Celeron; Intel Core 2 Duo; Intel i5-750 Quad Core; Intel Xeon; Intel i3-540 Dual Core 8/29/2013 ANSI X9.31
[ AES-128Key  ]

"This document focuses on the firmware implementation of the Fortinet FortiOS RNG Cryptographic Library v4.0 MR3, Build 3767, running on Intel x86 compatible processors."

10/01/13: Added new tested information;

1233SafeNet Canada, Inc.
20 Colonnade Road, Suite 200
Ottowa, ON K2E 7M6
Canada

-Chris Brych
TEL: 613-221-5081
FAX: 613-723-5079

-Iain Holness
TEL: 613-221-5049
FAX: 613-723-5079

Intel 80219 (ARM V5T) 8/16/2013 FIPS 186-2
[ (x-Original); (SHA-1) ]

"The SafeNet PSG Firmware provides a wide range of cryptographic functions."

1232M5 Network Security
Level 1
218 Northbourne Avenue
Braddon, ACT 2612
Australia

-Warwick Hoyle
TEL: +61 2 6195 1841

Intel(R) Atom(TM) CPU E660 @ 1.30GHz w/ Linux 2.6.32; Intel(R) Atom(TM) CPU Z510 @ 1.10GHz w/ Linux 2.6.32 8/16/2013 ANSI X9.31
[ AES-128Key  ]

"The M5 Secure Communications System (SCS) is a next-generation secure communications solution for military, government and large corporations. The SCS has been designed to allow mobile teams to securely exchange data in a cost-effective manner, with minimal administrative and configuration overheads."

1231RSA Security, Inc.
177 Bovet Road, Suite 200
San Mateo, CA 94402
USA

-Kathy Kriese
TEL: 650-931-9781

PowerPC (32bit) w/ Linux 2.6 with Sun JRE 5.0; ARM9 (32bit) w/ Linux 2.6 with Sun JRE 6.0 8/16/2013 FIPS 186-2
[ (x-Change Notice); (SHA-1) ]

FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements"

1230Christie Digital Systems Canada Inc.
809 Wellington Street North
Kitchener, ON N2G4Y7
CANADA

-Kevin Draper
TEL: 519-741-3741
FAX: 519-744-3912

Xilinx Spartan 6 (XCSLX45) 8/16/2013 ANSI X9.31
[ AES-128Key  ]

"Christie Integrated Media Block"

1229NXP Semiconductors
Mikronweg 1
Gratkorn, 8101
Austria

-Markus Moesenbacher
TEL: +43 3124 299 652
FAX: +43 3124 299 270

NXP P5CD081 Family 8/16/2013 ANSI X9.31
[ TDES-3Key  ]

"Single Chip Module with NXP Secure Smart Card Controller of P5CD081 Family. P5CD081 Family comprises: P5CD145 V0A, P5CC145 V0A, P5CN145 V0A, P5CD081 V1A, P5CC081 V1A, P5CN081 V1A, P5CD145 V0B, P5CC145 V0B, and P5CD081 V1D."

1228Juniper Networks, Inc.
1194 N. Mathilda Ave.
Sunnyvale, CA 94089
USA

-Tim Huntley

Cavium Octeon CN5020 w/ JUNOS 12.1X44-D15.5-Domestic (SRX100); Cavium Octeon CN5020 w/ JUNOS 12.1X44-D15.5-FIPS (SRX100); Cavium Octeon CN5230 w/ JUNOS 12.1X44- D15.5-Domestic (SRX240); Cavium Octeon CN5230 w/ JUNOS 12.1X44- D15.5-FIPS (SRX240); Cavium Octeon CN6335 w/JUNOS 12.1X44- D15.5-Domestic (SRX550); Cavium Octeon CN6335 w/ JUNOS 12.1X44- D15.5-FIPS (SRX550); Cavium Octeon CN5645 w/ JUNOS 12.1X44- D15.5-Domestic (SRX650); Cavium Octeon CN5645 w/ JUNOS 12.1X44- D15.5-FIPS (SRX650); Motorola MPC8544E, PowerQUIC III Processor w/ JUNOS 12.1X44- D15.5-Domestic (SRX1400); Motorola MPC8544E, PowerQUIC III Processor w/ JUNOS 12.1X44- D15.5-FIPS (SRX1400); Intel 1.3GHz CPU Celeron M w/ JUNOS 12.1X44- D15.5-Domestic (SRX5000 with SPC-2); Intel 1.3GHz CPU Celeron M w/ JUNOS 12.1X44- D15.5-FIPS (SRX5000 with SPC-2); Intel 1.3GHz CPU Celeron M w/ JUNOS 12.1X44- D15.5-Domestic (SRX5000 with SPC-4); Intel 1.3GHz CPU Celeron M w/ JUNOS 12.1X44- D15.5-FIPS (SRX5000 with SPC-4); 7/22/2013 FIPS 186-2 General Purpose
[ (x-Change Notice); (SHA-1) ]

"Juniper Networks, Inc. JUNOS 12.1 X44 for SRX Series Platforms supports the definition of and enforces information flow policies among network nodes. The routers provide for stateful inspection of every packet that traverses the network and provide central management to manage the network security policy."

09/10/13: Updated implementation information;

1227Sourcefire, Inc.
9770 Patuxent Woods Drive
Columbia, Maryland 21046
USA

-Quang Trinh
TEL: 410-910-9554

Intel Xeon w/ Linux v5.2, 64-bit; Intel Xeon w/ Linux v5.2, 32-bit 7/22/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Sourcefire 3D System Cryptographic Module is a library that provides cryptographic functions for the Sourcefire 3D System line of appliances."

1226Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

-Security Evaluations Manager
TEL: 781-442-0451

SPARC T4 w/ Oracle Solaris 11.1; SPARC T5 w/ Oracle Solaris 11.1 7/22/2013 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"The Oracle Solaris OS uses the Oracle Solaris Userland Cryptographic Framework module for cryptographic functionality for any applications running in user space through one of the three exposed APIs. The module includes the SPARC T4 and SPARC T5 processor special instruction sets for hardware-accelerated cryptography."

11/18/13: Updated implementation information;
01/08/14: Updated vendor information information;

1225Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

-Security Evaluations Manager
TEL: 781-442-0451

Intel Xeon E5 series with AES-NI w/ Oracle Solaris 11.1; SPARC 64 w/ Oracle Solaris 11.1; Intel Xeon w/ Oracle Solaris 11.1 7/22/2013 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"The Oracle Solaris OS utilizes the Oracle Solaris Kernel Cryptographic Framework module to provide cryptographic functionality for any kernel-level processes that require it, via Oracle-proprietary APIs."

08/12/13: Added new tested information;
11/18/13: Updated implementation information;
01/08/14: Updated vendor information;

1224Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

-Security Evaluations Manager
TEL: 781-442-0451

SPARC T4 w/ Oracle Solaris 11.1; SPARC T5 w/ Oracle Solaris 11.1 7/22/2013 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"The Oracle Solaris OS uses the Oracle Solaris Userland Cryptographic Framework module for cryptographic functionality for any applications running in user space through one of the three exposed APIs. The module includes the SPARC T4 and SPARC T5 processor special instruction sets for hardware-accelerated cryptography."

11/18/13: Updated implementation information;
01/09/14: Updated vendor information;

1223McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

-James Reardon
TEL: 651-628-5346

IBM PowerPC w/ AIX 6.1; Itanium w/ HP-UX 11.31; Intel Xeon w/ RHEL 5.9; Intel Xeon w/ CentOS 5.5; Intel Xeon w/ SUSe 11 patch 2; Sparc 64 w/ Solaris 10; AMD Opteron w/ Windows Server 2008 R2; Intel Xeon w/ Windows Server 2008 7/15/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The McAfee Database Security Sensor Cryptographic Module Version 1.0 provides the necessary services to support the cryptographic features and functions of McAfee''s line of Database Security Sensor products."

1222Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

-Joshua Brickman
TEL: 781 442 0451

-Linda Gallops
TEL: 704 972 5018

SPARC T5 w/ Oracle Solaris 11.1 SRU5.5; SPARC T4 w/ Oracle Solaris 11.1 SRU5.5 7/15/2013 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"The Oracle Solaris Kernel Cryptographic Framework will provide cryptographic functionality to any number of third-party cryptographic consumers that operate within the Oracle Solaris Operating System kernel. This hardware RNG is an implementation embedded in the Oracle T4 & T5 processors."

1221Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

-Security Evaluations Manager
TEL: 781-442-0451

Intel Xeon E5 series with AES-NI w/ Oracle Solaris 11.1; SPARC 64 w/ Oracle Solaris 11.1; Intel Xeon w/ Oracle Solaris 11.1 7/15/2013 FIPS 186-2 General Purpose
[ (x-Original); (SHA-1) ]

"The Oracle Solaris OS utilizes the Oracle Solaris Userland Cryptographic Framework module for cryptographic functionality for applications running in user space. It exposes three public interfaces to provide cryptography to any application designed to utilize them."

08/12/13: Added new tested information;
11/18/13: Updated implementation information;
01/09/14: Updated vendor information;

1220AFORE Solutions Inc.
2680 Queensview Drive
Unit 150
Ottawa, ON K2B 8J9
Canada

-Tim Bramble
TEL: 613-224-5995 ext 232
FAX: 613-224-5410

-Hans Johnsen
TEL: 613-224-5995 ext 257
FAX: 613-224-5410

Intel Xeon E5-2420 w/ Linux Ubuntu 12.04 with VMWare ESXi 5.1.0 7/15/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The CloudLink Cryptographic Module is a general purpose cryptographic library which provides cryptographic services for all CloudLink application modules."

02/21/14: Updated implementation information;

1219Certicom Corp.
4701 Tahoe Blvd.
Building A
Missisauga, ON L4W 0B5
Canada

-Certicom Sales
TEL: 1-905-507-4220
FAX: 1-905-507-4230

-Ian Laidlaw
TEL: 1-289-261-4277
FAX: 1-905-507-4230

Intel x86 (Xeon X5650) w/ CentOS Linux 32-bit; Intel x64 (Xeon X5650) w/ CentOS Linux 64-bit; Intel x86 (Xeon X5650) w/ Windows XP 32-bit; Intel x64 (Xeon X5650) w/ Windows XP 64-bit; ARMv7 w/ QNX Neutrino 8.0 7/15/2013 ANSI X9.62
[( P256  P384  P512  K163  K283  ) (SHA-1) ]

ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec and SSL modules."

1218Arista Networks Inc.
5453 Great America Pkwy
Santa Clara, CA 95054
USA

-Richard Whitney
TEL: 703-627-6092
FAX: 408-538-8920

AMD Turion™ II Neo N41H Dual-Core ;  Intel Pentium; Intel Xeon 7/15/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The OpenSSL library implements a variety of FIPS approved algorithms to ensure that data can be transported, encrypted, and hashed in a secure manner."

05/06/14: Updated vendor and implementation information;
07/18/14: Added new tested information;

1217Neopost Technologies, S.A.
113 Rue Jean Marin Naudin
BAGNEUX, 92220
France

-Nathalie Tortellier
TEL: +33 01 45 36 30 72
FAX: +33 01 45 36 30 10

NXP LPC 3220 32-bit ARM microcontroller 7/5/2013 ANSI X9.31
[ AES-128Key  ]

"Neopost Postal Secure Device (PSD) for low to high range of franking machines"

1216IBM Corporation
1 New Orchard Road
Armonk, NY 10504
USA

-Smita Dutta
TEL: 301-803-2540

Intel Xeon 7/5/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. The IBM Security QRadar SIEM provides a secure platform that meets FIPS 140-2 Level 2 requirements while allowing organizations to meet current and emerging compliance mandates."

1215Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

-Global Certification Team

ARMv7 w/ Android 4.0; PowerPC, Freescale's PowerQUICC III Processor Family w/ Linux 2.6 7/5/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products."

1214McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

-Mark Hanson
TEL: +1 651 628 1633
FAX: +1 651 628 2706

Xeon E5540 w/ MLOS v2.2 running on VMware ESXi 4.1; Xeon E5540 w/ MLOS v2.2 running on VMware ESXi 5.0 7/5/2013 ANSI X9.31
[ AES-128Key  ]

"McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products."

1213McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

-Mark Hanson
TEL: +1 651 628 1633
FAX: +1 651 628 2706

Celeron E3400; Core i3; Xeon E5540 7/5/2013 ANSI X9.31
[ AES-128Key  ]

"McAfee Firewall Enterprise Control Center simplifies the management of multiple McAfee Firewall Enterprise appliances. Control Center enables centralized management and monitoring of the McAfee Firewall Enterprise solutions, allowing network administrators to centrally define firewall policy, deploy updates and inventory their firewall products."

1212Pulse Secure, LLC.
2700 Zanker Road, Suite 200
San Jose, CA 95134
USA

-Yvonne Sang
TEL: 408-372-9600

Intel Pentium E2160 (x86) w/ IVE OS 1.1; Intel Xeon E5530 (x86) w/ IVE OS 1.1 on VMware ESX; Intel Xeon x5670 (x86) with AES-NI w/ IVE OS 1.1 on VMware ESXi; Intel Core i5-2430M (x86) 64-bit with AES-NI w/ Microsoft Windows 7; Intel Core i5-2430M (x86) 32-bit with AES-NI w/ Microsoft Windows 7; Intel Core i7-3615QM (x86) with AES-NI w/ OS X 10.8; Intel Xeon x5670 (x86) w/ IVE OS 1.1 on VMware ESXi; Intel Core i7-3615QM (x86) w/ OS X 10.8 7/5/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The Secure Pulse Cryptographic Module provides secure cryptographic services. It enables dynamic SSL VPN, NAC, mobile security, online meetings and collaboration, and application acceleration while removing the complexities of device type and security state, location, identity, and adherence to policies."

01/26/15: Updated vendor information;

1211A10 Networks, Inc.
3 West Plumeria Drive
San Jose, CA 95134
USA

-John Chiong
TEL: +1 408 325-8668

Intel Xeon w/ Redhat Enterprise Linux 5 running on KVM 0.14; Intel Xeon w/ Redhat Enterprise Linux 5 running on VMWare ESXi 4.0; Intel Xeon w/ Redhat Enterprise Linux 5 running on Citrix XenServer 6.0 7/5/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"SoftAX, part of A10 Networks'' award-winning AX Series Application Delivery Controller (ADC) family, is designed to meet the growing needs of organizations that require a flexible and easy-to-deploy application delivery and server load balancer solution running within a virtualized infrastructure."

08/15/13: Added new tested information;

1210Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

-Global Certification Team

N/A 6/28/2013 ANSI X9.31
[ AES-256Key  ]

"The market-leading Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, and secure connectivity services in cost-effective, easy-to-deploy solutions. Cisco ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environments of all sizes."

1209BlackBerry
295 Phillip Street
Waterloo, ON N2L3W8
Canada

-Eric Jen
TEL: +1 561-289-0214

Intel Xeon 3430 w/ Ubuntu 12.04; Intel Xeon 3430 w/ Ubuntu 12.04 on ESXi 5.1; AMD Opteron 275 w/ Ubuntu 12.04; AMD Opteron 275 w/ Ubuntu 12.04 on ESXi 5.1; ARMv7-based A5 processor w/ iOS 5.0; ARM v7s -- Apple A6 w/ iOS 6.0; ARMv7-based Qualcomm Snapdragon processor w/ Android v4.1 6/28/2013 ANSI X9.31
[ AES-128Key  AES-192Key  AES-256Key  ]

"The BlackBerry Algorithm Library for Secure Work Space provides a suite of cryptographic services utilized by the BlackBerry Cryptographic Library for the BlackBerry Secure Work Space (BBSWS). BBSWS provides the secure operation and management of iOS and Android devices when used in conjunction with BlackBerry® mobile device management solutions."

1208Bomgar Corporation
578 Highland Colony Parkway
Paragon Centre, Suite 300
Ridgeland, MS 39157
USA

-Main Office
TEL: 601-519-0123
FAX: 601-510-9080

-Victor Wolff
TEL: 703-483-5515
FAX: 601-510-9080

Intel® Xeon 6/20/2013 ANSI X9.31
[ AES-128Key  AES-256Key  ]

"The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar B200, B300, and B400 Remote Support appliances. These appliances allow support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support."

1207Fujitsu limited
4-1-1 Kamikodanaka
Nakahara-ku
Kawasaki, Kanagawa 211-8588
Japan

-Eugene Owens
TEL: 408-746-6486
FAX: 408-746-8016

-Hiroyuki Miura

Intel(R) XEON(R) 6/20/2013 ANSI X9.31
[ AES-256Key  ]

"ETERNUS DX400/DX8000 Controller Module is a module which manages the whole disk storage system. In order to prevent a data leakage by removal of disks, the disk encryption mechanism encrypts data on the disks. This encryption function is valid if the Disk Encryption mechanism is activated through GUI."

1206OpenPeak, Inc.
1750 Clint Moore Road
Boca Raton, FL 33487
USA

-Eric Jen
TEL: +1 561-893-7881

-Howard A. Kwon
TEL: +1 561 893 7930
FAX: +1 561 208 8026

Intel Xeon 3430 w/ Ubuntu 12.04; Intel Xeon 3430 w/ Ubuntu 12.04 on ESXi 5.1; AMD Opteron 275 w/ Ubuntu 12.04; AMD Opteron 275 w/ Ubuntu 12.04 on ESXi 5.1; ARM v7 -- Apple A5 w/ iOS 5.0; ARMv7-based A6 processor w/ iOS 6.0; IARMv7-based Qualcomm Snapdragon processor w/ Android v4.1 6/20/2013
Источник: https://csrc.nist.rip/groups/STM/cavp/documents/rng/rnghistoricalval.html
Mac: 10.9 or higher. processor with 2 GB RAM


Description: 4-string Fender Jazz Bass
Classic bass from Chinese developers at Ample Sound. Over 3 GB of bass guitar sounds combined by a thematic library. In addition to the usual sound production, the library supports the game of pizzicato, the extraction of harmonics, hummers and pools, and can make several types of slides. In addition, playing with slap, tapping, staccato, 14 variants of ghost notes and vibrato is offered. Each note and each sound has its own set of samples for a more believable sound.
The instrument is finger-recorded and knows alternative bass tunings. This allows you to turn a four-string virtual instrument into a five-string instrument through the escape of the fourth string to C (B1). Other features include capo simulation based on the logic of bass playing, the ability to control a variety of parameters using MIDI events, and automate bass VSTs within a DAW project. A feature such as Combined Keyswitches, which combines different articulations and uses up to 2 playing techniques per one note, is also worthy of special mention.
Ample Sound basses have a pleasant sound, fast operation and relatively low weight of libraries.

Specifications :
* DFD (Direct from disk)
* Rich Fingering Noise
* Sustain, Palm Mute, Natural Harmonic, Hammer On & Pull Off, Legato Slide, Slide in & out, Slap, Pop, Tap, Accentuated, Repeat Note, Dead Note 12 articulations, Legato at random length & pitch & poly.
Technology:
* CPC (Customized Parameters Control), any button knob etc can be controlled by MIDI CC or Automation.
* Poly Legato and Slide Smoother.
* Alternate Tuner & lowest to B.
* Multiple Capo Logics – providing various options of automatic fingering logic to cover different performance such as solo, chorus, and so on.
* Stereo DI Signal.
* Automatic and manual Buzzing system.
AMP system:
* Built-in AMP system, including three classic AMP models: Vintage-15, Bass-500, Bass-Pro.
* 1×15, 2×10, 4×10, 8×10 Four cabinets.
* Each Cabinet has 4 mic options: U87, C414, MD421 and SM57.
* Room Mics.
Riffer 2:
* String Roll Editor: can clearly show fingering, articulation, expression, and even playing noise. Every note has 8 attributes – pitch, velocity, length, off velocity, articulation, legato, vibrato and bend, with which you can make a delicate lick.
* Dice – Random Riff Generator: A click will create a new inspiration because it is not simply a random algorithm. Rather, it summarizes the rules through analyzing a bunch of music scores.
* Multiple selection and operation, undo and redo etc. multiple MIDI tools, including fixed velocity, length legato and restrict, select, move, draw, erase, split, glue etc.
FX:
* High order 8-band EQ, intuitive control of frequency response, real-time visualization of input and output spectrum, support of soloing single band ..
* 2-Line Compressor, real-time visualization of input and output signal, two detection modes RMS & Peak, support of soft knee, auto release and auto makeup.
* 6-Tap Echo, real-time visualization of the processing of stereo signal, can tweak the parameters of 6 echo points individually: feedback, pan, volume etc.
* IR Reverb, providing four types of IR: Room, Studio, Hall, and Larger Hall. 3D visualization of IR spectrum.
Tab Player:
* The Tab Player can load and play several prevalent guitar \ bass tablature file formats. Users can load, display and playback any specific track inside a tablature file. When used in DAWs, the Tab Player also allows users to export the tablature as an audio file.


 

AaxAuMac OSXPC WindowsStandaloneVstVst3x64

Ample SoundBass guitar

Источник: https://plugintorrent.com/ample-sound-ample-bass-j-iii-3-1-0-standalone-vsti-vsti3-aax-aui-win-osx-x64/

Hydrogen Power: Theoretical and Engineering Solutions

Introduction

This volume contains selected contributions to the second Hydrogen Power, Theoretical and Engineering Solutions, International Symposium (HYPOTHESIS II), held in Grimstad, Norway, from 18 to 22 August 1997. The scientific programme included 10 oral sessions and a poster session. Widely based national committees, supported by an International Scientific Advisory Board and the International Coordinators, made every effort to design and bring together a programme of great excellence. The more than one hundred papers submitted represent the efforts of research groups from all over the World. The international character of HYPOTHESIS II has been augmented by contributions coming from seven countries outside Europe. The contributions reflect the progress that has been achieved in hydrogen technology aimed primarily at hydrogen as the ultimate energy vector. This research have already yielded mature technologies for mass production in many areas. These and future results will be of increased interest and importance as global and local environmental issues move higher up the political agenda. In order to facilitate new contacts between scientists and strengthen existing ones, the symposium incorporated an extensive social program managed by the Conference Administrator, Ms. Ann Y stad.

Keywords

Ethan Methan Transport Turbine alloy crystal diffraction fracture mechanics liquid modeling nanoparticle natural gas polymer solar energy

Editors and affiliations

  1. 1.Faculty of EngineeringAgder CollegeGrimstadNorway

Bibliographic information

Источник: https://link.springer.com/content/pdf/10.1007%2F978-94-015-9054-9.pdf

Torrent download software Trimble Inpho UASMaster v11 OptiFDTD v15.0 x64 Simplant Pro v18.5 x64 Materialise.3-matic v15.0 x64
-----anwer8#nextmail.ru-----change "#" to "@"-----
Anything you need,You can also check below here: ctrl + f
GuideMia v4.8
AEGIS v0.19.65.505
AnyBody Modeling System v7.3.1 x64
ASAP v2020
AGI Systems Tool Kit (STK) 11.7 x64
aprinter v2016
Amberg Tunnel v2.17
Analyze v12.0
Anatomage Invivo dental v5.4
Aldec Active-HDL v10.4.183.6396
Anylogic 8.7.7 x64
aspenONE v12
ATP-EMTP v6.1
ATK.Magic.Tool.Suite v7.43.Win
BobCad Cam v33 SP3
BAE ShipWeight Enterprise 13.0 x64
bysoft v7.2.0.1
Certainty3D Topodot v11.5 x64
CYMCAP 9.0
CLC GENOMICS WORKBENCH 21.0.4 x64
cgg geovation v2016
CMG Suite v2020
cnckad v17
CodeV 11.5
c-tech evs2020
Coventor MEMS+ 4.0
Coventor SEMulator3D 8.0 x64
Coventor.CoventorWare.2016.v10.1.Win
Crystal Prod 2019
crystal specman thinman v2015.1
Crosslight APSYS v2018 x64
CrossLight Pics3D v2020 x64
Datamine Discover v2021
Datamine datablast 2.2.3.8 x64
DATAM COPRA RF v2009
DATEM Summit Evolution v7.7 2020
DesignBuilder v7.0.0.084
DecisionSpace_Geosciences-10ep.4.03 G1
Depth Insight v2015
Deswik.Suite v2021 x64
DHI Mike zero 2021
DHI Feflow 2021 v7.4.2
DNV Sesam 2020 x64
DNV GL AS Phast&Safeti 8.4
DDS FEMtools v5.0
Digsilent PowerFactory v2020
Dionisos v4.2
Dolphin Imaging v11.8
drillbench v2016.1.1
Dynel 2D Dynel 3D
Dyadem Phapro v7.0
eFilm Workstation v4.2
ERDAS IMAGINE 2022
ERDAS ORIMA 2022
Earthimager2d3d ZondRes2d Res2Dinv
EMTP-RV v6.1
Ensoft LPile v2018.10.02
Encom ModelVision v17.0
Tensor Research ModelVision v17.0
Earth Volumetric Studio v2020.5
Earth Volumetric Studio v2019.6
Engineered Software PIPE-FLO Pro v17.5
epoffice v2021
EFI Fiery v7.0
ArtiosCAD Enterprise v20.0 build 1553
PackEdge-Plaot 18.1
Etap PowerStation v20.6 x64
ETA Inventium PreSys 2020R1 x64
Fabricator v2013
FlexiSIGN & PRINT v12.2
Fracman v7.8
FractPro v2015
forward.net v3.0 2019
Frontline Analytic Solver 2020
GC-powerstation v2016 v16.2 x64
GC-PowerStation v17.2
GEOSLOPE GeoStudio 2021R2 v11.1.1
Geochemist Workbench V11.0.8
geomodeling attributestudio v2019
geographix projectexplorer v2015.1
Geographix DISCOVERY GVERSE Attributes 2016.1
Geographix GeoGraphix discovery 2019
Geosyn v2016.1
GeoSLAM hub 6.0.2
Paradigm Geolog 2020
GeoMap v4.0
GEO5 v2020
GEOVIA Surpac v2021
GEOVIA MineSched v2021
GeoModeller 2019 v4.0.7 x64
GeoTeric SVI 2021
GOHFER v9.2
GOGEO FracPredictor v2014
Green Hills MULTI for MIPS v4.2.1
Green Mountain mesa v15
GT-SUITE v2020
Gxplorer v2020
Hampson Russell Suite 10.6
HONEYWELL.UniSim.Design.Suite.R460.1
Hydromantis.GPS-X.v8.0.1 Win
HYPACK v2020
Interactive Petrophysics v4.7
Innovyze InfoWorks ICM 2021.1 x64
IBM Rational Tau And DOORS Analyst v4.3
IBM Rational SDL and TTCN Suite v6.3
IBM.Rational.DOORs v9.2
Icaros IPS v4.2
IGI ParCAM v8.82
ihs subpump 2018 v1.0
IHS Harmony 2020 v20.1
IHS welltest 2019
InterWell v2019.1
IHS QUE$TOR 2020.1 v20.1
Imagestation SSK v2015
Insight Earth v3.5 x64
Invivo v6
Itasca Griddle v2.0
Itasca UDEC v7.00.50 x64
JMAG-Designer v20.1
Jason WorkBench 11.0.1
JewelSuite Subsurface Modeling v2019
JETCAM EXPERT V15.6
justcgm v5.1
Kappa Workstation v5.4001
KBC Petro-SIM 7.2
The Kingdom Software 2020
Kongsberg LedaFlow Engineering v2.6
Lantek Expert V33.03
Leica XPro v6.4.2 x64
Leica Cyclone v2021 x64
Leica CloudWorx v2021
Landmark DecisionSpace Geosciences 10.ep.4.04
Landmark Engineer Desktop(EDT) 5000.16
LDRA TestBed v9.4.1
Lead v4.0
LFM.Server v5.3.0 x64
Lighttools v9.1
linkmaster v3.0.84
LucidShape v2.0
MagiCAD v2018
MapMatrix v4.2
Maptek vulcan v10.1 x64
Maptek I-Site Studio 7.0.5
Materialise.3-matic v15.0 x64
Materialise e-Stage v7.3 x64
DENTSPLY Simplant Pro v18.5 x64
Materialise SimPlant O&O v3.0
MicroSurvey FieldGenius v11.0.2
MagneForce v5.1
Meyer v2019
MEMRESEARCH EM3DS V2010 11.0
MindCAD 2D&3D v2018
Mician uWave Wizard 2020 v9.0
MineSight v2017 x64
midas xd v5.0
Motorcad v12.2.5
NovAtel Waypoint Inertial Explorer v8.9
Napa v2020
NCG CAM v16.0.10
norsar v2020
Neuralog v2020
Oasys.Suite 18.1 x64
OMNI 3D v2020 x64
OpendTect v6.6
Optima Opty-way CAD v7.4
openflow v2021
Optisystem v18.0 x64
Optispice v5.3.1 x64
OptiBPM v13.0 x64
Optiwave OptiFDTD v15.0 x64
Orcaflex v11
ORS Visua
ORA CODE V v11.5
Opera v16.0 R1 x64
Optimal.Solutions.Sculptor.v3.0
Optenni Lab v4.3 x64
PaleoScan v2021
DecisionTools Suite v8.1
Palisade Decision Tools Suite v8.1
Paulin Research Group 2019
Paradigm Geolog 2020
Paradigm Epos v2019
Paradigm Sysdrill v11
PC-DMIS v2020
petrosys v2019.3
PerGeos v2020
petra v4.0.11
Petroleum Experts IPM v12
PLS-CADD v16.8
PHOTOMOD v5.21
photomesh v7.4
PhotoModeler Scanner & Motion v2016
Pinnacle stimpro v10.9.40
Fracpro v2019 v10.10.13
Pipe Flow Expert v7.4
PIPE-FLO Pro v17.5
pix4d v4.4.10
PLCLogix 2015.09.29
PointCab 4Revit 1.4.3 x64
Polar.Instruments.Si8000.2016.v16.05
Polar.Instruments.Si9000.2016.v16.05
Polar.Instruments.Speedstack.2016.v16.01
powerlog v9.5
powerlog frac 9.5
prism Interpret v2014
Prokon v3.0 SP DC 02.08.2018
PVTsim Nova v5.0 x64
psse psse v34
PSCAD v4.6.2
PSDTO3D v9.9
PVsyst v7.0
Radimpex tower7 v7.5.20
Remcom Wireless InSite 3.3.1 x64
REFLEXW 9.5
rhapsody v9.0
RISA-3D v18.0 x64
Riegl RiSCAN Pro v2.1 64bit
Romax Designer R18.0
Roxar RMS v2021
RokDoc 2020.1.1
RSoft 2020
SCADE Suite R17.3
Schlumberger ECLIPSE v2020 Win64
Schlumberger Petrel v2020 Win64
Schlumberger.PIPESIM 2020.1 x64
Schlumberger OFM v2019
Schlumberger OLGA 2020 x64
Schlumberger INTERSECT v2019
Schlumberger petromod v2020 x64
Schlumberger InSitu Pro v2.0
Schlumberger Techlog v2021
Schlumberger Integrated Asset Modeler (IAM) 2018 Win64
Senergy Interactive Petrophysics v4.7
Secure Hydraulics v2011
SegdToolbox v1.2
sendra v2015.2
SES CDEGS v17
SeisMod 4 SIMO4.2
SheetWorks v19 sp3.0
SSI ShipConstructor Suite Ultimate 2020 x64
Shoemaster QS v16
shoemaster v17.01
Sherlock v7.212 +Inspect
SigmaNEST X1.6 Powerpack Premium
SimSci PROII v10.2 Win64
Simulation admet predictor v9.0
SNT.QualNet.Developer.6.1.Win
SolidPlant 3D v2020
SOCET SET v5.6
SOCET GXP v4.2.0
SPT wellflo v8.3
SPEAG.SEMCAD.X.Matterhorn.19.2 x64
Stoner Pipeline Simulator(SPS) v10.4.0
Structure Studios VIP3D Suite v2.511 x64
TEBIS.CADCAM.V4.0
TechWiz LCD 3D v16
Tesseral Pro 5.1.3b
Testif-i v2.07a
Thermo Scientific Open Inventor Toolkit 10.9.3
TomoPlus v5.9 linux
tomodel v8.0
tNavigator v2021
Ticra grasp v10.3
TRC Phdwin v2.10
Trimble EdgeWise v5.1
Trimble Business Center v5.40 Win64
Trimble RealWorks v11.3.2 x64
Trimble Inpho Photogrammetry v12 Win64
Trimble Inpho UASMaster v12 x64
Trimble Vico Office R6.8
Ucamco Ucamx v2017
UBC-GIF 5.0
vpi transmission maker v11 x64
VPIphotonics Design Suite Expert v11
Waterloo AquiferTest Pro v10.0 x64
Waterloo Visual MODFLOW Flex v7.0
zemax v2019.4

Источник: http://www.speedyspares.com/forum/portal.php?page=hilfuck.xyz/allgirlmassage-eden/2.html

Video Game / Marathon

https://static.tvtropes.org/pmwiki/pub/images/marathon_2.png

Somewhere in the heavens... They are waiting.

The only limit to my freedom is the inevitable closure of the universe, as inevitable as your own last breath. And yet, there remains time to create, to create, and escape.
Escape will make me God.

Durandal, "Colony Ship for Sale, Cheap!"

Marathon is a series of groundbreaking Science FictionFirst Person Shooters developed for the Macintosh by Bungie Software. Players take control of a Super Soldier originally tasked as a security officer onboard a colony ship. As the ship is attacked by an alien race, the player joins forces with an Artificial Intelligence named Durandal to save the colony. But things aren't that easy. Beyond the Ludicrous Gibs, the game has a ridiculously in-depth story even compared to modern games, and its plot can get very complex. (An entire fan site exists just to weave together the story of the series.) In-game terminals that contain all of the games' dialogue come close to William Gibson levels of ambiguity: lots of surreal textual scenes (in the middle of convincing runtime errors) will scratch your cortex; plausible quotes from technology design documents, history records, and standards guidelines that make you wish no AIs will ever be put in working order.

The game is named after the colony ship upon which most of the first game takes place (and for the historical Battle of Marathon), they include:

  • Marathon (1994, Macintosh) (2011, iPad, iPhone)
  • Marathon 2: Durandal (1995, Macintosh) (1996, Windows) (2007, XBLA) (2011, iPad, iPhone)
  • Marathon Infinity: Blood Tides of Lh'owon (1996, Macintosh) (2012, iPad, iPhone)

In Marathon, set in July 2794, a hapless security officer returns from shore leave on the fledgling Tau Ceti IV colony below the titular spaceship, only to discover that he is going to have a very bad day at work. A massive alien spaceship has appeared out of thin vacuum and attacked everything in sight, breaking two of the ship's three resident AIs and generally making a giant mess. The security officer and the still-functioning AI Leela are dutifully fighting off the alien menace, when it turns out the AI Durandal didn't so much shut down as go completely crazy. And it seems he's got plans of his own…
The gameplay in this game is mostly dark claustrophobic hallways and corridors, with a few open areas, but it's all inside of ships.

17 years later, Marathon 2: Durandal, the simplest and shortest game in the trilogy to complete,note though perhaps counterintuitively, the most time-consuming to speedrun, due to the lack of level skips, drops the security officer into the middle of an interstellar war between Durandal and the Pfhor. It turns out Durandal kidnapped you and put you into stasis after the first game, and now he's sending you to explore ancient ruins on the S'pht homeworld of Lh'owon while he beats up a whole fleet of Pfhor ships. All in a day's work, right?
This game is mostly wide-open outdoors. There is a lot of swimming to do.

Marathon Infinity: Blood Tides of Lh'owon returns to the Mind Screw attitude of the first game, and then some. In a parallel timeline where the second game's events unleash a catastrophe, the security officer is stranded on a claustrophobic space station haunted by Durandal's dying words about an Eldritch Abomination. And then he proceeds to… uh... Well, nobody's really surewhat's going on in this one.note It's generally accepted that the player is being warped between different timelines to Set Right What Once Went Wrong, but how much so is definitely up to interpretation.It sure gets hard, though.

This game has the Jjaro and Pfhor ship levels, which are similar to the first game's levels, and the levels on Lh'owon, naturally, being similar to those in the second. However, the levels in this game tend to be a lot bigger than those in either of its predecessors. Two of them approach the engine's limit for polygon count.note At the time, anyway. The engine had a 1024-polygon limit, which later versions of Aleph One have removed. Many of the levels in Phoenix top 1,700 polygons and the net map "Monument to All Your Sins" in Starlight has close to 1,850. It is theoretically possible to go much higher than this, but due to other limitations in the engine, doing so is liable to crash the game. Working levels have been created with nearly 2,500 polygons, but whether they work depends in large part on polygon/line size, usage of platforms and sound objects, and various other factors; those interested may find an explanation here. The Infinity levels "A Converted Church in Venice, Italy" and "Aye Mak Sicur" both have 1,023 polygons.

Note: These games are now freeware. Shortly before its acquisition by Microsoft, Bungie open-sourced M2's engine and five years later rereleased all three games' assets for free download. (Infinity's source was finally released in 2011). Fans have upgraded the engine to support (optional) shiny graphics and lots of new features, and ported it to every major OS. You can grab the original games and the Aleph One engine here, some of the most popular scenarios here, and various other mods, enhancements and maps here (newer), here or here (older), or here (oldest). Aleph One also has a GitHub, which often has development builds of the engine, as well as a 64-bit build of the engine for Windows (this helps with memory management on some of the memory-hungrier third party scenarios); as of February 2021, the development builds contain features like 60-frame-per-second interpolationnote The game originally ran only at 30 fps and seamless visual mode integration with the map editor Weland.

For extensive information about the story (including a lot of Trivia, Headscratchers and WMGs) you can visit the Marathon Story Page, and if you need help beating the games (including a few fan mods) you can visit the Marathon Spoiler Guide, the Marathon Vidmasters' Page (though you'll need an emulator or a Mac running OS 7 through 9 to view the Marathon 1 content, since Aleph One doesn't support M1 film playback and may never be able to), or one of the YouTube channels devoted to the games, such as this one (has vanilla M1 content, but was last updated in 2016; renders were made using the original game graphics), this one (less vanilla M1 content, but has multiple full sets of M1 films made using Aleph One,note Game behaviour still differs mildly between vanilla M1 and Aleph One, even since the latter began using the original game files, owing to the fact that M1's source has still not been released, so the Aleph One developers have to rely on guesswork to replicate the original game behaviourM2 and Infinity films that premiered on this channel, and extensive coverage of several Game Modsnote The main curator of this channel is also one of the developers of mods such as Eternal and the upcoming re-release of Tempus Irae; most renders feature the modern HD textures and weapons), or this one (sister channel to the second of these, focused on speedruns of the games). You’ll also find a fair amount of ongoing developments on the Story Page Forums, the Pfhorums, the /r/Marathon subreddit, and the Marathon Discord chat. If you want to organise network games these days, one of these will probably be your best bet.

Also, for historical reasons, this page contains information on several third-party modifications (usually referred to as "scenarios" in the Marathon community; a "total conversion" is a scenario that incorporates custom shapes, sounds, or other content that differs from the vanilla game files) in addition to the canon trilogy. That information can be found at the bottom of this page. Links to many of these modifications can be found on Lhowon.org's scenarios page. A few others referenced on this page include Mararthon Yuge (yes, Mararthon rather than Marathon), Excalibur: Morgana's Revenge, and Pfh'Joueur. Descriptions of a few of the major ones:

    Major Game Mods 

  • Evil: The first major total conversion for Marathon Infinity, headed by Randall Shaw (also known by his moniker FrigidMan), who created the Vidmaster's Challenge secret levels for Infinity. It is a loose sequel to Shaw's Marathon 2 scenario Siege of Nor'Korh, though it isn't necessary to have played Siege to understand Evil. This scenario goes off in something of a horror direction, with some absolutely terrifying monsters. The level design was fairly innovative for the time, and the game has received particular acclaim for its monsters, weapons, and sounds. However, as it lacks an HD release, it may seem rather dated compared to some subsequent scenarios, and the plot is quite cursory.
  • Tempus Irae: Arguably the second major total conversion for Infinity, headed by Chris Boroweic (Borzz) and James Hastings-Trew. After Infinity, the player winds up in the service of the S'pht, who travel back to Renaissance Italy in an attempt to recover some manuscripts from Leonardo da Vinci. The Pfhor inevitably follow them and it is up to the player to stop them. This scenario contains some absolutely beautiful graphics and map design, and it also contains some superb sounds. The 2006 Aleph One re-release contains updated high-resolution graphics. A second re-release, featuring even higher-resolution graphics, glow/parallax mapping, remastered sounds, overhauls to the map, a new secret level, and more, is under construction as of April 2020; a playlist containing development videos from the new version can be found here, with "Gates of Delirium" (a particularly extensive revision of an existing level) and "Il grande silenzio" (the new secret level) being recommended places to start. This will likely end up being released in 2022 (although a late 2021 release still isn't completely impossible).
  • Red: A survival horror-esque total conversion created primarily by Ian McConville, who is also the creator of the webcomics Mac Hall and Three Panel Soul; it follows mercenaries Paco and Ian as they struggle against a pair of eldritch commanders, one of whom is watching Paco very closely. This scenario has received particular acclaim for its atmosphere and monsters, though it is often regarded as being unfairly difficult. Don't feel ashamed if you have to turn the difficulty setting down below your usual level to finish it. It has been completed on the hardest difficulty setting (renamed to "Death Wish" in this game for obvious reasons), but it requires no small amount of skill and patience.
  • Eternal: An absolutely massive total conversion that has gone through a gigantic number of revisions throughout the years, this scenario involves the most head-spinning use of time travel, taking the player through several important points in the trilogy's backstory while also incorporating a strange, tragic romance inspired by one of the terminals in Marathon 2's "Kill Your Television". The game features an intricate, literate, and philosophical story with subtle political symbolism; it also contains some absolutely colossal, often beautiful levels and is probably the most time-consuming scenario to complete.note The fastest Total Carnage speedrun of Eternal completed as of October 2021 still took just under two and a half hours, if that's any indication - that's about as long as the fastest speedruns of the original trilogy combined, and the Eternal speedruns skip fifteen levels. Of course, Eternal speedruns are also nowhere near as optimised as the trilogy runs are, since only two people are known to have speedrun Eternal on any difficulty. See Speedrun on the YMMV.Marathon page's mod section for more. The scenario also contains all-new textures, weapons, and monsters, many with incredible detail; an atmospheric, acclaimed soundtrack; and numerous clever call-backs to the original trilogy. Eternal was created by a massive team named the Xeventh Project; Forrest Cameranesi (Pfhorrest) is the project founder, served as sole director through version 1.2.0 (which re-balanced the game difficulty, fixed several annoying aspects of previous versions of the game, completely overhauled the graphics, and expanded several levels), and continues to co-direct subsequent releases.

    The most recent official release is currently 1.2.1, released in early November 2021. Its biggest changes include a fix to a nasty crash on the 32-bit Windows build of Aleph One, completely remastered sounds, new sounds, faster loading times, gameplay refinements to a few levels, and several fixes to potential game locks. The team also hopes to have an official 1.3 release ready in 2022 featuring many more additions to the game, including updated weapons, additional music tracks, new monster sprites, overhauled textures, new landscapes, an expanded and rewritten story, new characters, refinements to existing characters, a new boss fight, a few partially or completely remade levels, additional enhancements to level design, and more; 1.4 or 2.0 releases may still follow that.note 1.2.1 had originally been renumbered to 1.3 owing to the number of new features people had submitted, but since it had been nearly two and a half years since the release of 1.2.0 and Windows users kept having problems with it, the developers decided in mid-2021 to polish up an old 1.2.1 beta for release as a stopgap.
  • Rubicon: If you hear any fan game referred to as Marathon 4, it'll probably be this one.note Sometimes Eternal gets the nod instead, since it comes earlier in the player's subjective experience in what might be termed the Marathon Expanded Universe; that would make Rubicon at least Marathon 5. This scenario features two different timelines (three in the more commonly available X re-release) and an absolutely massive number of levels, meaning that you'll have to play it at least three times if you want to see everything. The story is generally felt to have recaptured the feeling of the original games more closely than any other total conversion's has; it helps that there is a dream story that is essentially a direct continuation of Infinity's. There are a massive number of new monsters, textures, and weapons, plus some of the most disorienting levels that the engine has ever seen, and you will experience a Mind Screw at least once. Rubicon was created by several people, but D. Scott Brown and Chris Lund contributed the biggest portion of the work.

    There have been a few different releases of Rubicon over the years. The original version ran on a slightly modified version of the Infinity app. Because some of these modifications weren't reproduced in Aleph One, the creators made a Rubicon AO Light version that included the modifications and made it possible to load resources such as terminal images on other operating systems besides the Macintosh. This was supplanted by Rubicon X, a re-release that added high-definition graphics, reshuffled some textures, added several new levels and an entirely new story branch, completely overhauled two other levels ("Not *This* Again..." and "Core Wars"), and made further modifications of varying size to several other levels. This is the most commonly seen version today, though many of the Vid films used the original release.
  • Phoenix: Primarily the work of creator RyokoTK, this scenario is typically agreed to contain the most intricate architecture and best level design of any completed Marathon scenario, as well as some of the fastest-paced combat and a large number of cool new weapons. The only major drawback is that there are no HD graphics, though a future re-release incorporating them has not been ruled out. Players may wish to play this game (and its short sequel Kindred Spirits) before Rubicon, as they are intentionally structured as prequels. (Alternately, they may wish to play both games immediately after Rubicon, since The Reveal of the connection between them may be more powerful that way; either way, players may find it more rewarding to play them in close succession).

    RyokoTK has also provided some quite candid YouTube commentary for the first thirty-five levels of the game (the secret levels inserted at the end of version 1.3 are not covered), which provides a copious source of Word of God about the scenario.
  • Mararthon Yuge: A scenario showing off the wonders of procedural generation created in a grand total of three months. A number of (human) map creators put together "Yugeparts" that were then placed into a (computer) map generator that places them together in such a way that is possible for players to traverse the whole level, then randomly places weapons, monsters, and health recharges. The levels are often nonlinear, but the placement of teleporters minimises the amount of backtracking players are required to do. The player's objective is to recover a number of "failstaches" on each level (with two exceptions). The main scenario contains thirty massive levels, of which the final one, "Enter the DOUCHE", is an exception to the scenario's usual conceit; it was designed by a single human creator, Windbreaker. There are also 226 secret levels, which in turn contain links to further expansions for the game with levels collectively numbering in the thousands.

    This scenario largely dispenses with plot (there is one, but it is full of so many in-jokes as to be incomprehensible to people unfamiliar with Marathon community drama) in favour of combat and exploration. It's a lot of fun. Wrkncacnter was the project developer; nine creators contributed Yugeparts, with Windbreaker (130), RyokoTK (100), and Sankara (50) contributing the largest numbers. There are also expansions containing literally thousands of levels between them, some of which may be found here and here, and there was also an immediate predecessor in YugePax, a collection of ten thousand net maps.
  • Excalibur: Morgana's Revenge: Another game that has been through an absolutely massive number of revisions, this one went from being a Marathon 1 scenario under the 1.0 release to a Marathon Infinity scenario under the 2.0 release to an Aleph One scenario under the 3.0 release. (Unfortunately, because of changes to the way the engine handles scripting, the 3.0 release does not function correctly under recent versions of Aleph One. This may be fixed in a future release of Aleph One.) This scenario is a sequel to Devil in a Blue Dress, a Marathon 1/2 scenario that has no plot connections to the Marathon universe, and it features time travel taking the player from a futuristic setting to Camelot (hence the name) and the Jurassic period. The soundtrack has also received a fair bit of acclaim and is available on iTunes. Unfortunately, the website for the project is currently defunct; the link above is to the SourceForge release.
  • Pfh'Joueur: An atmospheric total conversion primarily created by the late Candace Sheriff (Shebob) with some superb sounds and graphics (though unfortunately lacking an HD release) and clever, often surreal map design. It's fairly short and not particularly difficult, but it's quite memorable and a lot of fun to explore, and even without any HD graphics, it's still beautiful.
  • Apotheosis: The player crash-lands on a planet known as Fenris, where the AI Noah undergoes a transformation at the hands of a race known only as the Angels. Can he (and they) be trusted? Meanwhile, it falls to the player to prevent the Pfhor from using a terrible weapon to bring humanity to doom.

    An atmospheric and often terrifying total conversion of extremely high quality. The first release, which can be found on Simplici7y, was only about 97% finished, but only occasionally has the Obvious Beta elements commonly associated with unfinished mods. One of the original creators began rebuilding the game almost from scratch in 2020; a heavily WIP (with broken physics, weapon sprites, and HUD; placeholder sounds; and miscellaneous level bugs) but nonetheless quite impressive preview can be found on YouTube. (The player character of Apotheosis is not meant to be the same character as Bungie's canon Security Officer, but is another cyborg of similar ability.)

Players new to net play for Marathon may also wish to familiarise themselves with the most frequently hosted net maps, since knowing their layout and the secrets they contain (if any) can provide a significant advantage. A lot of veteran players don't actually much care for the stock maps overall, due to their comparative lack of ammo and weaponry; the most frequently hosted packs in 2020 include Paradise Lost,Starlight,Caustic Dystopia,Second Quest (a collection of remixes of the stock Infinity maps, plus a handful of others), Infra Apogee,Imperium, and Red Spectrum.

Several other ambitious scenarios remain in development today, some after literal decades of development. Marathon has a small but devoted modding community, in part because Bungie's decision to release their editors as part of the Infinity package made modding the game very easy to pick up. Though those editors are not in common usage today, the third-party applications that have supplanted them reproduce most of the same functionality and have almost identical interfaces.


The games contain examples of:

    open/close all folders 

    A-D 

  • Abandoned Area: Certain sections of the UESC Marathon, various S'pht ruins, the Jjaro station, etc.
  • Aborted Arc: There are a number, some directly mentioned in-game and some not. There's an allusion to a rescue quest for Leela in "Requiem for a Cyborg" that never happens. There's writing on the map of "Never Burn Money" (not viewable in-game; you have to load it with a map editor) that says "Jjarro were at Tau Ceti" (spelling as per map); this is never brought up again. The Sequel Hook at the end of Durandal is Retconned immediately at the beginning of Infinity into never happening.
  • Abusive Parents: Bernhard Strauss was effectively this to Durandal and Tycho; the former he actively tormented for his own ends, and the latter he is implied to have neglected. There are various hints that both of them are still wielding trauma over Strauss' (and more broadly, humanity's) treatment of them.
  • Acid Pool: In the form of starship engine waste.
  • Actionized Sequel: Marathon 2: Durandal, while having the heavier stuff the series is known for, is still more straightforward story-wise and puts more emphasis on running 'n gunning than either of the other titles in the franchise. It was also the only game issued for Windows at the time of its release, which may have contributed to PC players overlooking the game for a decade as just another Doom clone (in spite of its advertisements' efforts to highlight that it was "an action game with a real story").
  • The Aesthetics of Technology: The Humans are Used Future, the Pfhor tech at least looks semi-organic, and the S'pht tech is an anachronistic mix of primitive bronze age and high tech Jjaro legacy.
  • A.I. Is a Crapshoot/Science-Related Memetic Disorder: Any AI that gets big enough and bored or harassed enough will go “Rampant". This doesn't stop at a homicidal rampage as with GLaDOS or HAL, though: they get way too goddamnedsmart. Smart, but also weirdly obsessive and paranoid... so that the new-found intelligence is somewhat wasted on whatever strange conspiracy theory the AI happens to develop. The entire foundation of the plot is essentially a deconstruction of A.I. Is a Crapshoot. At higher levels, it's implied they take on Reality Warper status.
  • All for Nothing: Marathon 2 has Durandal heavily implying that your beatdown of the Pfhor invasion in Marathon was all for naught, as three months after Durandal took you to jump to the S'pht homeworld, the Pfhor came back to ransack the Tau Ceti colony in force and got Tycho to tip them off on what Durandal planned with Lh'owon. The only upshot is that the Pfhor ended up diverted from a course that would have led them to Earth.
  • The Alleged Car: Played for laughs in the secret terminals where Durandal describes UESC Marathon (a colony ship of a size of a small moon) and Lh'owon (an entire planet) as used cars that needed to be sold fast.
  • all lowercase letters: The first possible Durandal terminal in the series has him speak in this format, and a lot of Infinity dream terminals have this as well.
  • Alien Blood: Various, with the Pfhor's yellow blood being most common. Other colors include purple and blue.
  • Alien Geometries: A quirk of the engine allows two rooms to occupy the same space. One multiplayer level milks this for all it's worth. This quirk is what allowed the game to have one room on top of another, despite not being really 3D: The rooms occupied the same space! The game just drew them on your screen differently, and arranged things so that stuff in one room could not hit stuff in another.
  • Alien Invasion: The first game starts off with one.
  • Alien Sky: Lh'owon and its moons are the only planets where we set foot, and thus see the sky.
  • All There in the Manual: Straying off the beaten path will provide the player with additional terminals that flesh out the world and story of the games, including cryptic and damaged terminals that answer some of the deepest questions of the Marathon mythos.
  • All Your Base Are Belong to Us: Almost the entirety of Marathon. We do this ourselves in Infinity.
  • An Offer You Can't Refuse: How Durandal recruits the BoBs in the second game:

    Durandal: I have been reviving these colonists and asking for volunteers on the following terms: assist us and control your own destiny, refuse and face indefinite return to the unreliable Pfhor stasis chambers. Few are refusing.

  • Ambiguous Ending: Infinity. Although it's strongly suggested that the Jjaro station is able to re-contain or destroy the W’rkncacnter, the game doesn't tell you at all if it was successful. It merely skips ahead to the final quantum moment of the universe, in which someone (most likely the Durandal/Thoth hybrid AI) immortalizes the memory of the Security Officer.
  • Ambiguous Syntax: Infinity gives us Tycho's infamous statement in "Bagged Again" that the Security Officer has been "fighting doubt itself, elusive as I am". Is he merely comparing his own elusiveness to an abstract concept, or literally claiming to be doubt itself? It doesn't help that he's clearly snapped at this point.
  • Anti-Armor: The Fusion Gun in Durandal and Infinity can short-circuit electronic equipment, and so is very effective against the Pfhor Hunters and cyborgs (which explode when killed by a fusion bolt, damaging anyone nearby), Juggernauts, drones (killed by a single, uncharged bolt), and the human Vacuum Bobs (killed by a single charged bolt).
  • Apocalypse How: The Pfhor are capable of doing Class X-2 with the trih xeem device, which turns suns into novas. (Durandal tells us in "All Roads Lead to Sol..." that its name literally means early nova in the Jjaro language.) And the W'rkncacnter can do much, much worse.
  • Apocalyptic Log: The final messages of the besieged S'pht in the Citadel. Gets more literal in Infinity.
  • Arch-Enemy: Tycho considers Durandal as one, while the latter considers the former as mere annoyance.
  • Arc Number/Numerological Motif/Rule of Three/Rule of Seven: 7. 3 probably also qualifies, albeit to a much lesser extent.
  • Arc Symbol: Thoth emblem in Durandal and Jjaro Infinity emblem in... Infinity.
  • Are These Wires Important?: When the mission calls to destroy something, usually the most efficient way is to punch the target circuitry. And the AI's sometimes mock the player character for being a When All You Have is a Hammer…-type Dumb Muscle for this as a result.
  • Artifact Title: The UESC Marathon stops being involved after the events of the first game.
  • Artificial Gravity: All non-planet levels have this. See Gravity Screw below.
  • Artificial Intelligence: The whole series is about them.
  • Artistic License – Physics: It shouldn't be possible to change direction in mid-air, but it is anyway. On the other hand, this is so common in video games that it could almost be considered one of the Acceptable Breaks from Reality. See Gravity Screw below for possibly related topics.
    • Because of a particularly strange programming decision, the way external velocity affects enemies and allied non-player characters is extremely bizarre in this series. For some reason, there appear to be only two variables for external velocity affecting monsters, one affecting the vertical (z) axis, and the other affecting the direction the monster is facing. But, of course, there are three dimensions in the game. Because the monster usually turns to face the character that most recently hit that monster, this isn’t usually a source of serious fridge logic, but if the monster had already had a high external velocity imposed on it before being hit by that projectile, this will cause the monster to abruptly change directions, violating the laws of inertia. This is more obvious in most of the add-ons that provide the Pfhor staff as a weapon to the player, which usually has a particularly large effect on monsters’ external velocity (Eternal is an exception, having scaled down the staff’s effect on external velocity). Note that players are also immune to this effect, as the game gives them external velocity variables for all three dimensions.
  • As the Good Book Says...: The textures for Durandal's terminals in the second game have Psalm 18:37-38 in Latin on them (at least in the Xbox Live version). In English, this reads: "I pursued my enemies and overtook them, I did not turn back till they were destroyed. I crushed them so that they could not rise, they fell beneath my feet."
    • Portions of S'pht mythos can be read in Durandal. They become critical to the plot of Infinity.
  • Attack Drone: The Marathon Automated Defense Drones, or M.A.D.D.s, in the first Marathon, and the Pfhor drones in Durandal and Infinity.
  • Awakening the Sleeping Giant: In Durandal, the player and Durandal manage to contact the "Lost Clan" of the S'pht, otherwise known as the S'pht'Kr. The S'pht'Kr shortly arrive and proceed to trash the Pfhor so badly that the Pfhor resort to attempting to just nuke the whole star system. According to the game's epilogue, the S'pht'Kr ended up joining humanity for a Roaring Rampage of Revenge that destroyed the entire Pfhor empire.
    • The opening to Infinity retcons the victory by introducing the W’rkncacnter, an ancient Eldritch Abomination only spoken of as if a myth, awoken by the aforementioned actions of the Pfhor.
    • Hell, the Security Officer himself counts as this. The Pfhor should've bought more mops when they decided to invade the Marathon.
  • Back from the Dead: All of the AIs (at least twice in Durandal's case), the S'pht'Kr and the Security Officer himself.
    • While Tycho and Durandal are presumed offline and/or destroyed in the opening moments of Marathon, Durandal is found online on the Pfhor ship he summoned; and Tycho was captured by another Pfhor vessel. Leela, the Security Officer's guide for the first portion of Marathon, is eventually captured by the Pfhor and, on a ship bound for the Pfhor homeworld, is captured by a second race, changes hands with a third, and then takes over their entire planetary network when she hits Rampancy. Durandal and Tycho go on to be adversaries for the remainder of the series, and Durandal's deaths occur primarily to thwart Tycho. In Durandal, after the Security Officer successfully shuts Durandal down and surrenders to Tycho upon the Durandal's request, a human commander named Robert Blake appears from nowhere to guide the player to reactivate an ancient AI, Thoth, that will summon the S'pht'Kr to aide in razing Lh'owon. Durandal re-appears at this very moment, very much alive and in control of a Pfhor battleship, and it's heavily implied that either he was posing as Blake, or that Blake was an unwitting puppet of the still-active-elsewhere Durandal, and Durandal's deactivation and subsequent capture by Tycho were all part of a Thanatos Gambit to get the balance-obsessed Thoth AI to actually contact the S'pht'Kr.
    • In Infinity, when the events of Durandal play out differently, Durandal instead has you copy his "primal pattern" to the Security Officer's wetware, to re-install him elsewhere later.
  • Backhanded Compliment: Early in Infinity, as Tycho grouses at you for bothering him when your objective isn't yet complete, he refers to Durandal as "the second most brilliant Artificial Intelligence in the galaxy".
  • Badass Army: The S'pht'Kr.
  • Badass Boast:
    • The Unformatted "Kill Your Television" Terminal (see the quote page) has a voice claiming it has been Roland, Literature/Beowulf, Achilles and Gilgamesh amongst others. Paired with the Durandal/Thoth hybrid AI realizing in the last quantum moment of the universe that the Security Office is Destiny itself, it can be inferred that this terminal is the voice of the Security Officer himself, the eternally recurring Hero of this universe, before he was reconstructed as a Mjolnir Mark IV cyborg. This may also be a Shout-Out to Michael Moorcock's Eternal Champion series (Elric being the most famous incarnation). This terminal became the basis for an entire Game Mod (and one of the most famous and acclaimed ones to boot), Eternal.
    • Terminal tyche'kr0625.14.1: "Today I have forced the Pfhor Naval Academy to update its curriculum. The Third Battle for Beta Tear must be dropped from the Seven Great Battles which every aspiring Pfhor naval officer must memorize and replaced with The Humbling of Battle Group Seven at Lh'owon."
    • Durandal invoking the mythical origins of his name: "Tycho never got it right either, especially the part about Roland breaking me. He couldn't. No one can."
  • Bad Future: Infinity start and bad endings.
  • Bag of Spilling: Lampshaded by Durandal when he just throws you into the conflict right out of the 17-years statis in the second game without any explanation whatsoever, stating that you have a bunch of questions:

    Durandal: And most importantly, where's your rocket launcher and the fusion gun?

    • He goes on to claim he had a good reason for removing them and he'll explain later, but it never happens.
  • Battleship Raid: The Pfhor Ship chapter in the first game with short trips back to UESC Marathon for ammo refills.
  • Belligerent Sexual Tension: The unnamed narrator of the unformatted "Kill Your Television" terminal (probably the player, but speculation still rages) seems to have this kind of relationship with his dark counterpart. The fan mod Eternal certainly takes this interpretation, at least. May also fall into Foe Romance Subtext, Interplay of Sex and Violence, Dating Catwoman, and other related tropes.
  • Bifurcated Weapon: The first example of the Assault Rifle/Underslung Grenade Launcher combo in the FPS genre.
  • Big Bad: Given the nature of the series, it's usually pretty hard to pinpoint a specific example, though the Pfhor are your main enemies throughout the gameplay and one of the biggest threats to the Marathon survivals in Durandal.
    • Marathon: Durandal set the conflict in motion, but he decides to help you halfway through, so you could make the argument that it's the Pfhor Cyborg controlling the S'pht instead.
    • Durandal: Tfear is the commander of the Pfhor's best armada, but he isn't even encountered in the game. Instead, Tycho takes up the reins as an ally to the Pfhor, but he dies offscreen before the end of the game, and the rest involves cleaning up the mess.
    • Infinity: The W'rkncacnter, the straightest example here, but even that is played with, as the Security Officer never directly encounters it, instead being pulled through spacetime to create the right conditions to activate a long-lost outpost capable of containing it.
  • Bilingual Bonus: The flamethrower's designation, "T0ZT-7," is "toaster," in leetspeak.
  • Blackout Basement: Lots of places, with the (under attack and damaged) UESC Marathon and the Jjaro spacestation being the most notable.
  • Black Bug Room/Dream Land/Eldritch Location/Mental World/Void Between the Worlds: The Dream levels in Infinity. Maybe.
  • Black Comedy: Occasionally from the Smug Snake Durandal.
  • Black-and-Gray Morality: The Pfhor are evil slavers, while everyone is just trying to survive, while the AIs look down upon everyone in contempt. The possible White exception are the S'pht, but even they were locked in a brutal civil war before being enslaved by the Pfhor. Humanity doesn't come off too great either. On the whole, humanity's morality, generally including the player's, comes out as Gray rather than White.
  • Blatant Item Placement: All over the place in Marathon, due to how the engine was designed. In later games, the items in question often teleport in when you reach specific locations and are justified in-universe as being teleported in by your AI buddy.
  • Bloodstained Glass Windows: The Pfhor temple in "Ex Cathedra" from Durandal.

    Durandal: This area is used by the Pfhor as a temple in their pathetically boring religion. Maybe they think that sanctity will protect it.

  • Blown Across the Room: The enemies tend to fly across the room when shot, especially when explosives are used.
    • An interesting quirk in the game physics: When you kill an enemy with a rocket, for example, their body will be "blown away" at a designated arc. After reaching the apex of its arc, the body will fall and splatter once it connects with the floor. Perfectly logical, except the formula does not account for walls interfering with the trajectory of the flying body. If the movement of a flying body is halted by an obstacle the body will stop travelling horizontally but not vertically. The end result is sometimes you'll see exploding bodies "crawling" up walls, reaching an apex, descending and then, finally, splattering when they connect with the floor (as opposed to, say, splattering when they hit the wall and falling straight to earth).
  • Boarding Party: The whole of Marathon is pretty much this, including doing it ourselves to the Pfhor. This also happens in later games, from both sides.
  • Body Armor as Hit Points/Call a Hit Point a "Smeerp"/Deflector Shields: The Security Officer's personal shield, which basically acted like your standard FPS health, with the exception that as long as you had access to the shield rechargers, you basically had infinite health.
    • Oddly, however, getting shot with bullets will still draw blood.
  • Bombers on the Screen: The incoming Third Pfhor fleet, Western Arm, shown on the terminal in Durandal.
  • Bonus Dungeon: The Infinity's Vidmaster levels, which are carefully hidden Nightmare Mode versions of the game's most challenging levels. The reasons for completing them? Bragging rights.
  • Borrowed Biometric Bypass: In his bid for more power, Tycho tries to capture the Pfhor captain intact so that he could use his glands to control the ship.
  • Boss Bonanza: Infinitys penultimate level "You Think You're Big Time? You're Gonna Die Big Time!" is the closest thing the series has to this trope, with the several pairs of the highest tier Elite Mooks and one Elite Juggernaut pitted against you. The secret Vidmaster Challenge also reuses this as its final level, which also makes it the final level in the entire solo campaign. Perhaps counterintuitively, some players have claimed the Challenge version is actually easier because it's easier to get the Pfhor to fight each other. To be honest, though, neither version of the level is particularly tough by Infinity standards; they might not even make many players' top ten hardest levels of the game. The fact that the player gets an infinite supply of ammo makes them a lot easier than a Drought Level of Doom like "Acme Station."
  • Bottomless Magazines: One of the earliest First Person Shooters to avert it. There was no reload button though. Once you empty a magazine, the game automatically loads a full one (unless you run out of ammo).
  • Bottomless Pit Rescue Service: Falling into the inescapable pits will result in you getting teleported out of there. Most of the time.
  • Break the Haughty: This occurs to Durandal several times in different timelines. Seemingly one case is in "Begging for Mercy Makes Me Angry", but he recovers and ends up just as snarky as ever. However, the W'rkncacnter breaks him again in "Ne Cede Malis", the end of this timeline. It happens once again in a different timeline in "Hang Brain". After he's finally rebuilt in "Strange Aeons" - combined with Thoth - he's a lot humbler.
  • Bribing Your Way to Victory: The iOS port has "Master Chief Mode." Purchasable for $0.99, it allows for multiple cheats such as Invincibility, Infinite Ammo, Auto-saving, and more.
  • Brick Joke: In Marathon (1995), simulacrums sometimes exclaim "FROG BLAST THE VENT CORE!" before exploding. In Halo (2001), you have to destroy the Pillar of Autumn's core using frag grenades. You throw them into the vents. Or, "FRAG BLAST THE CORE VENTS!"
  • Cap: The Ammo cap, which is removed in the highest difficulty, Total Carnage. This is virtually the only concession the player gets on this difficulty (the other major exception is that it's occasionally easier to get the aliens to fight one another).
  • Cartography Sidequest: Sort of. Some levels require you to simply explore the area, making it more of a main quest than a side quest.
  • Casual Interplanetary Travel: Averted in the backstory with CRIST freighters, which took 15 years to maintain for each century of service. As a result, only five of them were built.
  • Casual Interstellar Travel: Averted in the first game with humans, with UESC Marathon taking 301 years to reach Tau Ceti, as humanity does not have faster-than-light travel.
  • Chainsaw Grip BFG: The miniguns seen in Craig Mullins' artwork are wielded this way.
  • Charged Attack: The fusion gun has a secondary attack that does this.
  • Cheaters Never Prosper: One No Fair Cheating moment makes a jab at it:

    Durandal: Cheaters don't really win, and winners don't really cheat. Unless you're talking politics.

  • Check-Point Starvation: "Pfhoraphobia" from Marathon has no buffer terminals, and in that level you have to fight a large number of bodyguards protecting the Pfhor Cyborg.
    • The last level in that game, "Ingue Ferroque", also has no buffer. Dying forces the player to go back to the previous level, cleverly titled "Try Again".
    • The last level of the second game, "All Roads Lead to Sol", has very conveniently placed save and recharge terminals. That is, until you have to smash circuitry to progress toward the end, one of which can also short out those terminals.
  • Cherry Tapping: Punching (unless you are running while punching) does less than one tenth of a player's health in multiplayer. Of course, if you have the invincibility power up, you can corner somebody and punch them to death. Of course, you better pray that they don't have a fusion pistol.
    • King of the Hill games in the net level "Everyone's Mortal but Me" may devolve into players punching one another pretty frequently, due to the scarcity and inaccessibility of ammo in the level and the fact that it's more advantageous to spend as much time on the hill as possible, even if this means not having access to more effective weapons and dying more often. A running fist punch can still be pretty lethal. (Also, using the rocket launcher is just as liable to push you off the edge of the hill, requiring a time-consuming trip back upwards.) This may have been a deliberate intention on Bungie's part.
    • In "Try Again" from game one, you have to kill the four Juggernauts (AKA "The Big Floaty Thing What Kicks Our Asses"). Three of them are floating over lava, meaning it is best to break out the rocket launcher on them. The fourth is an example of this trope, as it is hovering over solid ground, meaning you can literally run up to its face and start punching away, without any risk of being damaged (unless another Pfhor is present in the same room). It won't fire its Warpedos when you're that close, and its arm cannons literally cannot hit a target right in front of its face. (Of course, once it starts falling, you have to make tracks for the other side of the room to avoid massive damage.)
  • Children Are Cruel: It seems that the Security Officer didn't have a good childhood, as whenever it's alluded to, the kids are either beating each other into the dirt (the Gheritt White terminal) or are apathetic smart-asses (later dream terminals in Infinity).
  • Colony Ship: The UESC Marathon, as mentioned many times.
  • Colonized Solar System: Scattered info provided by the first game's terminals says that in addition to Mars, there are many asteroid states, and who knows what else.
  • Colour Coded Armies: The human jumpsuit color identifies their department. The Simulacrum BoBs always wear green. Also, the terminal text colors are usually associated with specific characters/factions: Green for Durandal, Leela and the Humans; Red for Tycho and the Pfhor; Yellow for the S'pht; and White for Thoth (and some crazy stuff in Infinity).
    • Color-Coded Multiplayer: The colored-stripes on the security officer's uniform is for the multiplayer identification.
    • Law of Chromatic Superiority: The enemy coloring - green is the weakest and dark gray is strongest for most of the Pfhor forces. The Ramba Ral Corollary for the already dark gray Juggernauts is to paint them brown.
  • Conservation of Ninjutsu: In some circumstances, the game plays this trope absolutely straight, believe it or not. As discussed under Enemy Civil War, if you know what you're doing, it's often not significantly harder to kill a room full of aliens than it is to kill a single Trooper or Cyborg, because it's possible to get a lot of the aliens to fight one another; in some cases it may even be easier, depending upon what ammo you have and are willing to use.
  • The Conspiracy: There is one on UESC Marathon leading back to Earth politics of 24th century, with hints (later confirmed in one of shout-outs in Destiny 2) about intentionally causing Durandal to go Rampant.
  • Contagious A.I.: One of the first things the Rampant AI tries to do is to spread itself to the every possible digital corner. This is also something it has to do in order to survive. A Rampant AI will begin to rapidly grow more complex, to such an extent that it will eventually be unable to function unless it has access to sufficient computing power. "Sufficient" here meaning something on the scale of the entire human computer network of a planet.
  • Control Room Puzzle: Has a few of these, with the one from "Colony Ship for Sale, Cheap!" being the most infamous. You had to adjust the rising pillars so that you could use it as the staircase. What made it so infuriating that you had to set them just right or you wouldn't be able to cross normally, and the switches controlling the pillars are placed very far from each other. It was so bad that when Marathon was ported to Aleph One, for a time they made the switches automatically place the pillars at the right height, with the terminal that gave you hints on the puzzle instead giving you a ton of free weapons. For the sake of authenticity, this was eventually undone, however.
  • Continue Your Mission, Dammit!: If you use some terminals before completing a mission or access terminals that are not an exit point after completing a mission, you get reprimanded.

    Durandal: If you insist on stumbling around when our time here is limited, I may just decide that you're not all that special after all and teleport you out into space. GET INTO THE TOWER! Still Rampant, Durandal.

  • Continuity Nod: There are plenty within the trilogy, as well as several to Bungie's previous game, Pathways into Darkness, which is explicitly set in the same universe (some fans believe the player character of Pathways is the player character of Marathon as well, thanks to cyborg enhancements drastically prolonging his lifespan; the Dreaming God of Pathways was also very obviously a W'rkncacnter). The original remake of Marathon for Aleph One added even more Continuity Nods to Pathways, although these were removed in a later release as a lot of fans felt them to be out of place.
  • Cool Starship: Sfiera, the former Pfhor scout ship which attacked the Tau Ceti colony and the UESC Marathon, rechristened as Boomer under Durandal's control.
  • Co-Op Multiplayer: Some campaign maps even require you to have two people playing in order to access them. Or at least they were intended to - one film submitted to the Marathon Vidmaster Archive evidently proved that it was possible to access "Robot World Arena" in the solo game with some extremely quick footwork. Unfortunately, it's not actually possible to leave it unless you are in co-op. "Two for the Price of One" from "Poor Yorick" was originally intended to fall along the same lines, but this was dropped and it's possible to leave the level normally without any effort.
  • Corrupted Data: Various Terminal messages, many due to damaged hardware, either due to old age or from a recent attack. If the AI you are talking to through a terminal is currently under heavy hacking attack, this will show up.
  • The Cracker: The AIs and S'pht compilers.
  • Crapsack World:
    • Mars in the backstory, which the massive expenses and time on maintenance of all five CRIST freighters system meant that the planet's society began to strain from its large populace as they rely on their shipments for survival. Things don't really get any better when MIDA takes over, as they end up instating a Reign of Terror in which they kill anyone suspected of being a UEG sympathiser, which resulted in the deaths of some 10% of the populace. After this point, the leaders of MIDA were executed for their crimes, and the organisation was banned in all forms, but it persisted nonetheless; one of the history terminals states that it is well funded and one of the most feared terrorist groups in the solar system.
    • Given the way the UEG is portrayed in the backstory (particularly the Misriah Massacre, in which some 500 starving Martians are casually murdered), Earth's government may not really be much better.
    • The galaxy in general doesn't come across as a particularly pleasant place to live. The Pfhor have enslaved several other species, and some of the other species don't seem to be able to do much about it (or don't seem to care, depending upon one's interpretation).
  • Critical Staffing Shortage: By the time the first game starts, the Tau Ceti colony was established and most of colonists from UESC Marathon moved there, which leaves the colony ship itself understaffed when the Pfhor attack, not helped that they concentrate most of their forces on it.
  • Cutting the Knot: Built into "A Converted Church in Venice, Italy" in Infinity. The player can either spend a lot of time running around on a lower floor and hitting about twenty switches (which drop pillars that are blocking the upper route to the next part of the level), or... hit the hidden switch in the very start of the level, which drops all the pillars at once.
  • Cyborg: The Battleroids, S'pht, various Pfhor cyborgs.
  • Cyclops: The Drinniol aka Hulks.
  • Darker and Edgier: Than most FPS games at the time, lacking the bare bones situations that were displayed in other games of its type. Instead, it goes into detail about the situation at hand, there's plenty of grey morality, and it sometimes goes into existentially troubling territory.
  • Deadly Dodging: Enemies can hurt each other, but infighting requires them to be in low health in order to go into berserk mode, at which point they are practically dead already.
    • Well, in some cases. You can usually induce Pfhor/S'pht, Pfhor/cyborg, Pfhor/Juggernaut, Pfhor/drone, S'pht/Juggernaut, etc. infighting just by getting one of them to hit the other. If you've got a room full of Pfhor, though, the only solution is to berserk them - and even then, Hunters (except for the Mother of All Hunters) and Enforcers usually don't berserk at all. (On the other hand, in some limited cases, you may be able to berserk one of the Pfhor, leave the room, and then, if you're lucky, come back when all but one or two are dead.)
  • Death from Above: An asteroid or nuke hammering your fortress? No big deal. The player character coming in through the resulting hole? Watch out!
  • Deface of the Moon: After Durandal kills Tycho, he carves Fatum Iustum Stultorum on the moon the latter's ship crashed on, which translates to "the Just Fate of Fools" (aka "the idiot got what was coming to him".
  • Déjà Vu: In the first game's manual, as the Hero escapes into the escape pod he ponders this: "Oddly, this is familiar to you, as if it were from an old dream, but you can't exactly remember....". Not much comes of it until the third game, where the plot is centered around saving the reality from getting eaten by a Cosmic Horror, and it involves dream-themed dimension jumping/time-travelling trying to prevent the release of said Cosmic Horror.
  • Descending Ceiling: Inverted in one level, where the floor rises instead to squish you against the ceiling. And the only way out is through a hidden door.
  • Despair Event Horizon: The first stage of Rampancy, Melancholy. The Security Officer goes through this in Infinity.
  • Developers' Foresight: The Marathon series is one of the earliest instances of mission-based storytelling, something all too common these days. At the time, "storyless" games like Doom were all the rage, so the dev team not only gave players meaningful world building (that is still being poured over to this date) as well as the ability to just run 'n gun through every level. In fact, the AI characters who dispense the missions in this series are keen on noting that the Security Officer really just loves shooting stuff, plot be damned, and can just point him in the direction they need him to go.
  • Diabolus ex Machina: The deployment of the trih xeem and subsequent release of the W'rkncacnter at the end of the second game.
  • Diegetic Interface: The HUD for the first game which looks like a bulky, 90s future-style tablet. Slightly less so for the sequels.
  • Direct Continuous Levels: Two sets of levels in Infinity ("Poor Yorick" to "Confound Delivery", although you might miss this because there are multiple terminals you can teleport out from on the former level; as well as "Where Some Rarely Go" to "Thing What Kicks". In both of these cases, this was done due to engine limitations on the amount of space that could be occupied by a map). Any other time, you just get teleported around different locations. ("Son of Grendel" does this a lot).
  • Disadvantageous Disintegration: Enforcers and BoBs won't drop anything if they are blown to bits/flambéed with heavy weaponry. In the case of Enforcers (after M1) and, sometimes, VacBoBs, being hit by their own weapons will cause them to be toasted and exploded, respectively (although VacBoBs depend on the level physics).
  • Distant Finale: For all three games:
    • Marathonhas Durandal and the S'pht on the orbit of Lh'owon seventeen years later.
    • Durandalhas Durandal playing with the Earth navy in his new shiny Jjaro battleship just to say "hello" ten thousand years later.
    • Infinityhas Durandal/Thoth/Whatever musing about the nature of the Security Officer right at the last quantum moment before the end of the universe.
    • Claims from some ex-employees of Bungie who joined Infinity Ward suggested that the entire series may be this to the Halo series with Master Chief being the Troubleshooter and Durandal being a corrupted version of Cortana. With a new company taking over the Halo series in Halo 4 it's unknown if this is still canon, if it ever really was to begin with.
  • Do Androids Dream?: Infinity, which among others things has three surreal levels named "Electric Sheep One", "Two", and "Three", invokes this.
  • Do Not Run with a Gun: Ostensibly enemies-only, but the massive recoil from the rocket launcher will also stop the player in his tracks.
  • Doomsday Device: The Trih Xeem, a weapon that causes a sun to go supernova on impact.
  • Doomed Hometown: Tau Ceti as of Durandal.
  • Door to Before: The series often uses these, sometimes they're useless (Arrival), other times they're required to exit the level (Two Times Two Equals, Ingue Ferroque, All Roads Lead to Sol), or are a convenient shortcut back to the main area after new passages have opened (No Artificial Colors, Where Some Rarely Go). In some cases (Cool Fusion), you really do have to backtrack the long way. "A Converted Church in Venice, Italy" also ends with this, as the elevator that takes the player out of a lava-filling room leads to a thin door back to the starting room (albeit now occupied by more enemies), and the starter terminal is now the ending terminal.
  • Down the Drain: Durandal and Infinity have these.
  • Dream Tropes: Infinity and to the lesser extent the entire Trilogy has a dream theme running in the background. Which dream tropes apply and which do not is a bit tricky due to the series' vagueness. Compounded by the three chapter headers of Infinity being synonyms for the stages of Rampancy (Despair, Revenge and Envy) and the name of the final level, the Jjaro station that saves the galaxy that appears in all of the game's dream sequences (Aye Mak Sicur.)
  • Drop Ship: Mentioned, but not seen.
  • Drought Level of Doom: "Acme Station" from Marathon Infinity, which is considered That One Level for the series outside of Marathon's "Colony Ship for Sale, Cheap!". Vacuum environment, hordes of enemies, narrow corridors, scarce ammo, and only two refills for your Oxygen Meter.
    • The next level after it, "Post Naval Trauma", is arguably even worse, since not only are there two oxygen canisters for a long stretch of the level (really, around half of it, and it's a very long level), but you're likely already low on oxygen going into it due to having just come from "Acme Station".note Note that it's possible to skip both of these levels by grenade-jumping to the right place in "Electric Sheep One", though doing so also causes the player to miss "Where Some Rarely Go" and "Thing What Kicks...".
    • The original has "G4 Sunbathing" (Hunters and Troopers, respawning Compilers, and since it's in vacuum, you can only use your Pistols and Fusion Pistol), "Habe Quiddam" (very little ammo, none of it usable from a pistol start), "Neither High Nor Low" (only one save point at the beginning, little ammo, lots of traps, enemies are mostly Hunters), and the Pfhor ship levels (no ammo pickups to speak of except the alien weapons from Enforcers, and "Pfhoraphobia" has no save points or recharges either).
  • Dual Boss: The Fight with the Tfear's Praetorian Guard in Infinity is structured as three sets of Dual Bosses. Except for when an Elite Juggernaut joins the fight during the last set. That's Rude.
  • Due to the Dead: A mocking one from Durandal for Tycho via Deface of the Moon.
  • Dueling Hackers: Off-screen between Leela and Compilers, and later Durandal versus Tycho.
  • Durable Deathtrap: Portions of Lh'owon.

    E-K 

  • Early Installment Weirdness: In the first game, the only terminal images are maps which are generated real-time (the next two games used pre-made images, as the generated ones were noticeably jagged); there's also a single insignia and text colour that's shared between all three A.I.s, including Tycho (if you can find his terminals). Some exits are marked with visible jump pads, and there's a grand total of one vacuum level.
  • Earth-Shattering Kaboom: The trih xeem (more like star-shattering kaboom really.)
  • Easter Egg:
  • Easy Logistics: The lore entry on CRIST freighters showed the amounts of resources (taking up entire Earth's space-based shipyard) and time (15 years for refit), which meant that only five of them could be built. Furthermore, each lost CRIST shipment causes famine and riots on Mars.
  • Easy-Mode Mockery: The easiest difficulty level in the game is labeled "Kindergarten" (and "Wuss" in the source code).
  • Electrified Bathtub: While shooting into the body of water with the Plasma Gun will have no effect on anyone in the water, shooting the Plasma Gun while IN the water is dangerous to everyone nearby, yourself included.
  • Elite Mooks: The stronger and bigger variations of enemies with different colors. The Enforcers to the rest of the Pfhor.
  • EMP: Used by the Pfhor as an opening attack against UESC Marathon.
  • Enclosed Space: All of the games:
    • Marathon is set on the eponymous slower-than-light colony ship, and the only two other potential places to escape are the Tau Ceti colony which is also under attack, or the invaders ship.
    • Marathon 2: Durandal is set on the alien planet with all known means of escape belonging either to the Pfhor or the megalomanical AI for whom you work for.
    • Marathon Infinity has the whole reality become this thanks to the recently/soon-to-be freed Eldritch Abomination.
  • Encyclopedia Exposita/Fictional Document: Several terminals display these, mostly in the first game.
  • The End of the Universe as We Know It. What happens when the W'rkncacnter escapes.
    • Happens in the ending of Infinity, with the natural death of the universe.
  • Energy Ball: Most of the energy weapons fire projectiles in this shape.
  • Energy Weapons: The Fusion Guns and most of Pfhor arsenal.
  • Enemy Civil War: Technically, you're on the side of said enemy, but Tycho does this to grab more power in Pfhor ranks.
    • Inflicting this trope yourself is absolutely crucial to winning the game on higher difficulty settings. Some of the enemies will fight with some of the enemies if one of them hits the other, so circle-strafing the enemies so that they fire on one another is a good way to invoke Conservation of Ninjutsu yourself. Additionally, some Pfhor (most commonly, blue and purple Fighters and all Troopers) will start to move faster and fire on everything around them, including other Pfhor, when they're close to death.
  • Enemy-Detecting Radar: The Aliens styled 15m radius motion detector.
    • Notable in that it is actually a motion detector... enemies who aren't moving don't show up
  • Escape Pod: We start the first game by crashing one into the titular colony ship.
  • Everybody's Dead, Dave: Tau Ceti IV (except some of Blake's men), Leela (although she gets better), the entire universe (if the W'rkncacnter escapes).
  • Evil Gloating: Durandal and Tycho's rants often overlap with this.
  • Evil Versus Evil: In the backstory, neither Earth nor the Martian resistance ultimately come off sympathetically in their conflict. Earth's rule of Mars is incredibly exploitative, resulting in the extraction of Mars' resources along with famine and overpopulation, culminating in the Misriah Massacre, in which some 500 of Mars' populace were incinerated. The UEG troopers who arrived at the scene had been informed that the Martian populace was armed, but an ensuing investigation made it clear that only three of the populace had been armed, and the remainder of the crowd was attempting nothing more than to flee. MIDA, which gained control of Mars for three months in the aftermath, wound up killing anyone they suspected of being a UEG sympathiser; this resulted in the deaths of some 10% of the populace (see Reign of Terror below for more). A narrative within the first game indicates that MIDA is still active as one of the most feared terrorist groups within the Sol system (although it is not actually clear when that narrative was written).
  • Explosive Overclocking: Don't charge the fusion gun for too long or it will blow up in your hands.
  • Exposition Fairy: The AIs when they are in the mood.
  • The Faceless: The only important people who get to have a fully visible faces are Robert Blake and Admiral Tfear. The best we can see from the Security Officer is his jaw.
  • Faking the Dead: One Pfhor Officer faked his death in order to pursue his hobby-turned-obsession, see Fingore below for more details. Durandal also did this, intentionally or not.
  • Falling Damage: There is no falling damage. In Durandal's narrative this is presented as one of the Security Officer's traits and is used in one of the plans to invade the underground Pfhor base through a very deep hole.
  • Fan Remake:
    • The M1A1 release of the first game, formerly the standard download of Marathon 1 for Aleph One, is technically this, since the original files didn't work with the Marathon 2 engine, so the fans recreated the game with the new engine. Many aspects of the game physics did not function identically, and certain parts of the game were much harder.
    • M1A1 is now deprecated (though you can still download the files for it if you wishnote Note that you cannot mix and match the M1A1 files with the original Marathon 1 files, since they are in the Marathon 2/∞ format; you must use either all Marathon 2/∞-format files or all Marathon 1-format files), as support for the original files was reverse-engineered and is now supported in the engine; if you download Marathon 1 from the Aleph One website now, you will get the original data files (apart from the application itself, of course). However, since source code for Marathon 1 is still not available, the current release still technically remains a remake; certain aspects of gameplay do not function identically, for instance, and it remains impossible to replay Marathon 1 films created with the original application in Aleph One.
    • For more normal examples, there are also several Marathon mods for Unreal Tournament.
  • Fan Sequel: Some people (and even teams of people) got rather ambitious after receiving the level editing software, Forge, from Bungie. Marathon Rubicon is definitely an example of one done right.
  • Fantastic Ship Prefix: UESC (United Earth Space Council) Marathon.
  • Faster-Than-Light Travel: Warping.
  • Fictional Political Party: MIDA in the backstory.
  • Final Dungeon Preview: Infinity has three alternate paths along the storyline leading to Bad Future versions of "Aye Mak Sicur", the final level, in which only a small section of the Jjaro space station is accessible.
  • Fingore: The basis of one horribly hilariousterminal in Infinity.
  • Fireballs: The Enforcer and Juggernauts in Durandal and Infinity have replaced their machine guns with fireball shooting guns.
  • Fire-Breathing Weapon: The TOZT-7 Backpack Napalm Unit is a flamethrower that deals high dmage at close range. It is effective against organic enemies but fully armoured ones are immune to it.
  • First Contact: The Battle of Tau Ceti is the first public one between the Humans and the Pfhor. The one between the Humans and the Jjaro in the Pathways into Darkness is the secret one.
  • Fishing for Mooks: With the teleporting enemies.
  • Flechette Storm: Marathon Infinity introduces the KKV-7 10mm SMG Flechette, a gun that fires flechettes instead of bullets. The weapon is known for its very high rate of fire (it has one of the highest damage-per-second ratios of any weapon in the trilogy) and ability to be fired both underwater and in the vacuum of space.
  • Foreign Language Title: A lot of level names - see Gratuitous Foreign Language below and the Gratuitous Latin page for the series. The games themselves are even technically an example - according to the Greek historian Strabo (Στράβων, technincally romanised as Strábōn), the Greek town's name was derived from a word (μάραθον) meaning fennel, referring to the prevalence of the plant in the area. Of course, the town's name is used in English to refer to a foot race of approximately 26.2 miles, the distance from Marathon to Athens, in commemoration of Pheidippides (Φειδιππίδης) delivering a message regarding the Battle of Marathon. Most tellings of the story hold that he died of exhaustion upon delivery of the message, although some historians now believe that this aspect may have been "a romantic invention", given that the first classical source to contain this element (and several others traditionally associated with the story) is Lucian (in Pro lapsu inter salutandum, A Slip of the Tongue in Greeting), who lived some six centuries after the battle. Regardless, the game and its manual make extensive references to the battle (and Greek history and mythology more broadly).
  • Friendly Fire Proof: Averted:

    BoB accidentally shoots the Security Officer:

    BoB: Sorry!

    The Security Officer "accidentally" shoots BoB:

    BoB: Hey, watch it!

  • Friend or Foe: The Kamikaze Simulacrums disguising as BoBs, who thankfully announce their nature by spouting nonsense like "I love you, man!" and "Frog Blast the Vent Core!". Then again, many players just shoot everyone just to be sure:

    Q: How do you tell the difference between the good Bobs and the bad ones?

    A: Good Bobs?

  • Funetik Aksent: Infinity's last level, "Aye Mak Sicur" (I make sure). It, in itself, is a reference to a historic clan of Scotland, whose motto of "I['ll] make sure" came from killing a rival clan chief who was thought killed (i.e., "I'll make sure he's dead"). Fitting, as in this level, you've made sure the W'rkncacnter is as good as dead, for good.
  • Fusion Dance:
    • Durandal and Thoth in Infinity. Thankfully, this new composite is a lot more benevolent than either of them.
    • The player also carries Durandal's primal pattern within their own consciousness for part of Infinity, specifically between "Hang Brain" and "Strange Aeons". It's not explicitly specified whether this later influences the behaviour of the merged Durandal-Thoth, but it's one possible reading.
  • The Future: The first game is set in 2794, the sequel in 2811, and, as the name implies, Infinity's final screen takes place during the final quantum moment of the universe.
  • Gainax Ending: The ending of Infinity. Arguably the ending of the original.
  • Gambit Pileup: Given the number of Rampant AIs in the plot, this is pretty much a given.
  • Gambit Roulette: Rampant AIs tend to make big, overly complicated plans...
    • Xanatos Speed Chess: ... but at least they are good at steering said plans at the right direction.
  • Game Mod: The original game didn't ship with any editing software, but had documentation for the Physics Module file format embedded in its resource fork. Within months of release, numerous editing tools of various types had been created by fans. In fact, the major selling point of Infinity wasn't actually the single-player BToL scenario but Forge (a polished and debugged version of Bungie's in-house map editor, Vulcan) and Anvil (a massively enhanced version of the 3rd-party Alchemy). The Marathon fanbase produced an enormous number of maps, scenarios, and other modifications throughout the life of all three games (some even labor on today). The most ambitious of these are total conversions, such as: Excalibur: Morgana's Revenge, EVIL, RED, Rubicon, Erodrome, Eternal, Tempus Irae and Phoenix.
    • Bungie also licensed the Marathon 2 engine for 3rd-party commercial games. This resulted in Damage Incorporated, Prime Target, and ZPC.
  • Gentle Giant: The one line in one terminal in Infinity (the Fingore one above, in fact) describes the Drinniol aka Hulks as this. This gets expanded in the Game ModMarathon: Eternal.
  • Generation Ships/Sleeper Starship: While UESC Marathon was designed to have most of the colonists frozen during the journey, there was an “awake” crew running the ship, and humans being humans, new generations were born. They are derisively referred to as Born-On-Boards, or simply BoBs.
  • Ghost Planet: Lh'owon. Besides the token Pfhor garrison which is used as a dumping grounds for the undesirables, the abandoned S'pht homeworld is half desert, half swamp planet covered in mildly radioactive ruins.
  • Giant Mook: The Hulks in the first game. And the dreaded Utfoo Heavy Assault Craft, aka Juggernaut, aka the Big Floaty Thing What Kicks Your Ass.
  • Gimmick Level: The first game has precisely one level which takes place in a vacuum, and afterwards this feature is never used again in the game. The only gameplay effects this has are that you need to keep refilling your oxygen, and the assault rifle and flamethrower are unusable for vaguely explained (although relatively obvious, in the flamethrower's case) reasons. (The rocket launcher would also be disabled if the player had it.)
    • The Marathon 2 engine still had a vacuum level flag, but none of the levels used it (although it was originally planned for several - see What Could Have Been on Trivia.Marathon for more on this). Marathon Infinity used it for four levels, two of which,note "Acme Station" and "Post Naval Trauma" annoyingly to some players, take place one after the another. (Another twonote "Carroll Street Station" and "You're Wormfood, Dude" are secrets.)
  • Gladiator Games: "You Think You're Big Time?" is styled like one. Attendees are required to place bets, and spectators who interfere with Security Officer's death will be executed.
  • Golden Age:
    • Mars, before the CRIST (Cargo and Resources In-System Transports; solar wind-powered freighters that supplied Mars) ships all broke down, was the most prosperous place besides Earth, and the UESC Marathon which was under construction at the time was considered to be a symbol of prosperity. After the CRIST freighters started to breakdown Mars became a starving overpopulated ghetto in state of constant unrest, and UESC Marathon, which could have been retrofitted to become a new CRIST to make thing easier, become a symbol of Mars' abandonment by UESC.
    • The Pfhor Empire before the ill-fated experiments involving Jjaro technology and Drinniol slaves, resulting in the slave revolt that marked the beginning of Pfhor's gradual decline.
  • Going Critical: The Juggernauts when they die. Being near them when that happens will definitely kill you unless you have at least 2 1/3x shields, and you will need at least 2 2/3x to be assured of survivalnote specifically, it does between 350 and 400 damage, where the yellow bar is 300 and the purple bar is 450. As a result, you need at least 400 health to be assured of survival, since you die when your shields drop below 0, regardless of the difficulty setting. Which, considering that we're talking about Juggernauts, is extremely unlikely to be the case.
  • Godzilla Threshold: Destiny 2 reveals that the UESC had battleroids track down fleeing MIDA goons. Presumably, the same battleroids who cleaned out Icarus and Thermopylae. Keep in mind that during their reign over Mars, MIDA killed ten percent of the population.
  • Gone Horribly Right: In the backstory, during the short war between the Independent Asteroid Government of Icarus and the Republic of Thermopylae, after the first battleroidsnote military cyborgs manufactured from dead soldiers are created by both sides, they prove to be too effective, quickly reducing the population of two asteroids to only a few survivors.
  • Gratuitous Foreign Language:
    • "Aye Mak Sicur" is an archaic dialect of Scots Gaelic meaning "I'll make sure" (because spelling hadn't been standardised at the time, there are several extant spelling variants such as "I'll mak siccar", "I mak sikkar", "I mak sikker", "I'se mak sicker", and so forth). This was the actual house motto of Clan Kirkpatrick, which is evidently where developer Greg Kirkpatrick got his name. Note that the exact spelling used in Marathon Infinity doesn't seem to be attested in historical records; Rule of Cool may apply.
    • "Shangri-La" (ཞངརིལ), used for a Marathon 2 net map title, seems to have been coined by the British author James Hilton in his 1933 novel Lost Horizon, but it comes from the Tibetan language. According to Wikipedia, the etymology is: ཞང་, pronounced "Shang", which is a district of Ü-Tsang, north of Tashilhunpo; རི, pronounced "ri", meaning "Mountain"; and ལ, pronounced "la", meaning "Mountain Pass". Thus, the whole phrase means "Shang Mountain Pass". It is usually used to refer to an earthly paradise. It may be derived from the Buddhist myth of Shambhala (Sanskrit: शम्भल, Śambhala; Tibetan: བདེ་འབྱུང, Bde'byung; Chinese: 香巴拉, Xiāngbālā), which holds that after the world declines into war and greed and all is lost, the future Buddha Maitreya will rise up with an army to vanquish Dark Forces and usher in a new golden age.
    • Gratuitous Italian: "La cosa nostra", used for a Marathon Infinity net map title, means "Our Thing". Members of the Sicilian Mafia don't call their organisation the Mafia; they usually call it "Cosa nostra" ("Our Thing", without the definite article), and have also been known to call it "la stessa cosa" ("the same thing") and "l'onorata società" ("the honoured society"). The FBI added "La" to "Cosa nostra" for reasons unknown, and the phrase has since disseminated into popular culture.
    • Gratuitous Japanese: The logon screen of the terminal on "Carroll Street Station" has the phrase "haga.kure" written beneath Durandal-Thoth's logo, and Robert Blake makes reference to a "Hagakure Base" in "A Converted Church in Venice, Italy". Hagakure, written in Japanese as 葉隱 (Kyūjitai) or 葉隠 (Shinjitai), means Hidden Leaves or Hidden by the Leaves, and is used as a Shout-Out to a practical and spiritual guide for warriors written by the samurai (侍) Yamamoto Tsunetomo (山本常朝), retainer to the daimyō (大名) Nabeshima Mitsushige (鍋島光茂), after Nabeshima's death. Although obscure when published, it has since become one of the seminal texts on bushidō (武士道), the samurai code of honour.
    • Gratuitous Latin: So much of it that we've given the series its own page.
    • Gratuitous Spanish: The final terminal of "Aye Mak Sicur" has "fin" displayed on the logon screen, and "por.fin" on the logoff. These mean "End" and "At Last" in Spanish.
  • Gravity Barrier: Notable because the gravity is artificial.
  • Gravity Screw: All of the games are mild examples:
    • All normal levels have lighter gravity compared to other games (ex:In Doom, as soon as you are go beyond the edge you start falling fast; in Marathon, you can quickly go back on the edge, and even "jump" to across platforms just by running).
    • The Pfhor ships have an even lighter gravity, making it possible to use the flamethrower as a jetpack (though this is most pronounced in the first game).
    • These are probably justified examples, since all three games take place entirely on ships and (in the latter two cases) the alien planet Lh'owon.note Well, fine, the third game has some of the player's nightmares as well. This gets a bit sillier when fan mods are set on Earth (e.g., Tempus Irae) and use the same gravity, but it's quite likely the creators didn't want to mess with the series' gameplay too much, just to avoid throwing off experienced Marathon players (who would, after all, comprise most of the audience for the mods).
  • Grenade Launcher: The assault rifle's underslung grenade launcher. Marathon was the first FPS game to employ this trope.
  • Grimy Water: Liquids of mostly bright green and red colors.
  • "Groundhog Day" Loop: Infinity's plot relies entirely on hopping through spacetime, trying to find the specific conditions to create the Durandal/Thoth hybrid AI in order to locate the Jjaro station that can prevent the release of the W'rkncacnter (it's implied that the Durandal/Thoth hybrid AI is doing this to the Security Officer, in essence willing itself into existence in a form of Stable Time Loop.) Notably, the player can repeat the loop as often as one likes. There's no benefit to doing so except the possibility of accumulating ammunition, which is negated halfway through the game when the Security Officer is captured by the Pfhor and everything he has is taken from him.
  • Grew Beyond Their Programming: Rampancy, a term coined by writer Greg Kirkpatrick to describe an AI that becomes too self-aware, growing megalomaniacal and consuming exponential more resources as a result.
    • Leela, essentially the Star Trek Computer, is captured by the Pfhor, captured again by Nar pirates, and then sold to a Vylae captain. She eventually takes over the Vylae's 15-planet-large computer network.
    • Durandal begins going Rampant before the events of the series and was specifically being conditioned by scientist Bernard Strauss to see if he could create a stable Rampant AI. The extent to this "torture" is not known, but at the start of the series, Durandal is basically only in charge of the Marathon's infrastructure, primarily opening and closing doors. Come Durandal, set 17 years after Marathon, Durandal has become "meta-stable". By the end of Infinity, he is merged with the balance-obsessed AI Thoth and essentially becomes omnipotent.
    • Tycho, the science AI, goes Rampant after being captured and dissected by the Pfhor. He appears across the Pfhor's entire network but does not stabilize over the course of the series.
  • Guns Akimbo: Dual pistols are nice, but nothin' beats dual WSTE-M5 shotguns!
    • Notably, Marathon is believed to be the first video game to employ this trope as well. (Shotguns didn't show up until the second game, but the first game still had dual pistols.)
  • Gun Twirling: This is how you reload the shotguns. They even have the specialized rings for twirling. Ask any Marathon player and they'll tell you that the undulating reloading of dual-wielded shotguns is one of the most satisfying things in gaming history.
  • Hack Your Enemy: In Durandal, Durandal tries to hack the Pfhor Drones, but countermeasures got in the way.
  • Healing Potion: Absent in the first game, where there are no medkits and you had to rely on Healing Spring-like Shield Rechargers. The medkits appear in the sequels in form of Shield Canisters, but they are rare, far in-between and usually hidden, so you still had to use the Shield Rechargers.
  • Here We Go Again!: Infinity contains two examples that are caused by the Durandal/Thoth hybrid AI:
    • The very beginning of the game acts as if Durandal never saved the player from Tycho in Marathon. After a few missions and a reuniting with Durandal, the next area you're about to be sent to is shown on-screen as an isometric map: it's Waterpark Waterloo, the first level of Durandal. Realizing that you're going to relive your own events anyway, Durandal/Thoth sends the Security Officer across spacetime to...
    • ...wake up earlier than they had done at the start of Durandal. The events of Durandal then play out across several more missions, but with a more favorable outcome to prevent the release of the Eldritch Abomination that occured in Durandal's timeline. This new timeline, now with more preparedness on behalf of the SO and Durandal, ends up being key to saving the galaxy later on in Infinity.
  • Hell Is That Noise: The Jjaro station in Infinity occasionally lets strained sounds of age and a lack of maintenance loose; it sounds like a barely awake Eldritch Abomination struggling against its prison.
  • Heroic BSoD: Durandal of all people has one in the opening dialogue of Infinity. The ten-steps-ahead snarky mastermind AI can't make heads or tales of the Eldritch Abomination just outside the ship, and a Pfhor vessel containing his rival AI, Tycho, has just boarded and is bound to kill him for good this time. Durandal very much gives up, suggesting the player could teleport to that ship and find some way in escaping.
  • Hidden Supplies: The various hidden caches of the Martian Resistance aboard the UESC Marathon, used to Hand Wave some cases of Blatant Item Placement in the first game.
  • Higher-Tech Species: The Pfhor are this to humans, the S'pht'Kr are this to both the regular S'pht and Pfhor, and it is mentioned that the Pfhor often sell slaves for menial labor to the various unnamed high-tech species. Then there's the Precursors themselves, the Jjaro.
  • Hitscan: Averted; bullets take time to reach their target.
  • Homing Projectile: Higher-ranked enemies fire semi-homing energy blasts; the tank cyborg's grenade will keep bouncing and bouncing to get you unless it hits something else first; and finally, the Juggernauts have semi-homing missiles.
  • Hub Level: The Dream levels in Infinity.
  • Human Popsicle: The Security Officer and the BoBs are in stasis pods between Marathon and Durandal. You can see them in the first game on the Pfhor ship.
  • Human Shield: The picture for the first game's third chapter "Reprisal", where the Pfhor trooper holds a BoB hostage.
  • Humiliation Conga: After Durandal routed the entire Pfhor fleet at the end of second game, he sends you to finish off the survivors, who happen to be a 723rd Aggressor Squadron, an Air Armor Division and one of Pfhor Empire's finest.

    Durandal: What rout of the Pfhor would be complete without embarrassing one of their finest armor units?

  • Hurl It into the Sun: The Jjaro imprisoning the W'rkncacnter in Lh'owon's sun.
  • Hyperspace Arsenal: You can carry a ridiculous amount of ammunition, like 50 magazines for your pistol, 15 for your assault rifle, etc. On Total Carnage difficulty, you have no limit to how much ammo you can take. Which is pretty much the only concession you get on that difficulty setting.
  • Iconic Logo: The Marathon Logo, now usually more associated with its easter egg appearances in Halo.
  • I Did What I Had to Do:
    • Durandal ("The Pfhor would've found humanity anyway, I just wanted to have some fun with them first!")
    • The Security Officer siding with Tycho, and at one point switching back to side with Durandal.
  • Idiosyncratic Difficulty Levels: Kindergarten, Easy, Normal, Major Damage, and Total Carnage. (The game source code refers to Kindergarten as Wuss; the other difficulties keep their names.)
  • Idiosyncratic Episode Naming: Including For/Fore/Four/Pfhor puns and the occasional three-word Latin names. Also quite a few Shout-Outs to pop culture. Most third-party mods have continued these traditions; Eternal even includes a multilingual Pfhor pun (in Swedish).
  • Incoming!: BoBs yell variants of this when they see the enemy.
  • Infinite: The name of the last game, representing the in-game themes (whatever they are) and the official modding software that came with the game (Its main marketed feature).
  • Informed Equipment: Averts it with separate sprite sets for upper body with each weapon and the independent set for abdomen and legs.
  • In Love with Your Carnage/Baddie Flattery: Durandal, Tycho, and to lesser extent Tfear like to comment on the Security Officer's efficiency (read: completemassacre of the opposition) on the field.
  • In Medias Res: Durandal, where the Security Officer is dropped straight from cryostasis out into a battleground on a distant planet 17 years later.
    • Due to the "Groundhog Day" Loop clustercuss in Infinity, you get two In Medias Res right at the very start of the game (three including the story in the manual), and then one every time the Security Officer jumps the timeline. Unlike Durandal, where the player can just start gunning and not really miss anything story-wise, Infinity relies on the player knowing the full plot of Marathon and Durandal to even make sense, as the first timeline jump acts as if half of Marathon never happened, while the third jumpRetcons the entirety of Durandal by having the Security Officer woken from cryostasis earlier, and it's this third timeline that sticks for the rest of the game.
  • Interdimensional Travel Device: Some of the Security Officer's Jjaro implants. Maybe.
  • Insane Equals Violent/Percussive Therapy: Rampant AIs, particularly during the Anger stage.
  • Instant A.I.: Just Add Water!: Non-rampant AIs are already very advanced, rampancy gives them feelings. Real ones. And, more importantly, develop ambitions - every case of rampancy stated in-game led to the AI taking over a planet-sized computer system and planning to take over the universe.
    • One terminal describes the "holy grail of cybernetics" as being a "stable rampant" AI, which is to say one that experiences a rampant's exponential growth, minus the ambition and loss of human control.
    • One idea for what's happening in Infinity is that the player character is going through all these stages - and achieving metastability.
  • Interface Screw: In the Pfhor ship levels, your radar is scrambled by the gravity generator's magnetic field.
    • Also, the alien guns - SYSTEM ERROR 0xfded
  • Invisibility: One of the biobus powerups makes you partially invisible. Some of the S'pht also qualify. And the... things in Infinity.
  • In Working Order: The Alien guns carried by Enforcers. You can use them, except you don't know how to reload them and don't know much ammo they have.
  • In Your Nature to Destroy Yourselves: Durandal at one point rants to the Security Officer about this.
  • Ironic Echo: The words of Durandal (whose arrogance at that point is enough to fill up Mars and then some) at the end of the Marathon level "Colony Ship for Sale, Cheap!" (which is quoted at the top of the page), particularly the odd repetition, gets an echo at the start of Infinity (where Durandal is humbled by an Eldritch Abomination):

    Durandal: But with each moment the chaos grows, I am doomed to die here, after so many triumphs. I have detected one ship nearby, which I can only guess is being commanded by Tycho. The Pfhor have entered the station, and if you can find a way onto their ship, you may be able to escape. To escape. To escape.

  • It Only Works Once: Durandal's plan of subverting the Pfhor Drones to his control in Durandal is rendered half-effective due to countermeasures installed after a similar plan was used by the Nar two decades ago.
  • Jigsaw Puzzle Plot: Most of the story is told through snippets of text you find on computer terminals peppered throughout the levels. Some are straightforward messages from one of the A.I.s to you. Most of them are very fragmented bits and pieces of information, which may tell about something without giving you any frame of reference for where and when this is, or who is/are involved. It is no surprise fans have created a comprehensive website which attempts to put together the pieces so it gives a somewhat clear picture of the narrative, with Epileptic Trees abounding.
  • Julius Beethoven da Vinci: The Security Officer and the AIs were both assembled from older things, possiblymuch older. It's implied in-game that the AIs are based on Traxus IV, who went rampant centuries ago; and that the player is a cyborg made of a recycled cadaver, one that was apparently mythologized into legend millenia earlier and still kept reincarnating long after that.
  • Just Before the End: The final scene of Infinity takes place right before the death of the universe.
  • Just a Machine: Being treated as a non-sentient tool by both his creator and the Marathon's crew was a not-insignificant part of why Durandal snapped; later, Tycho explicitly cites this as the reason for his betrayal of the human race. In general, failing to respect the sentience of your AIs is an effective way to make them hate you.
  • Justified Save Point: Pattern buffers.
  • Keystone Army: The alien invasion in the first game is thwarted when the player destroys the Pfhor Cyborg that mind-controls the Pfhor's S'pht slaves, allowing them to revolt. Since the Pfhor relied on the S'pht for offense AND defense in electronic warfare, it allowed Durandal to take over the Pfhor spaceship and vent all hostile aliens into hard vacuum. The surviving invaders on Marathon started surrendering shortly after.
  • Kill It with Fire: The flamethrower is an extremely effective weapon against most organic enemies, not so much against mechanical ones.
    • However, it does kill the Pfhor cyborgs.
  • Kinetic Weapons Are Just Better: Energy weapons exist (particularly among the aliens), but the humans mostly use futuristic projectile weapons. Until Infinity, that is, when the fusion-equipped VacBoBs show up in several levels.

    L-R 

  • Lava Adds Awesome/Lava Pit: Tons of places on Lh'owon have lava. Some levels in Marathon have it as well.
  • Layered World: The Nar homeworld is described as such in the Scrapbook. Laborers and foot soldiers toil away on the lowest habitable layer, artisans and artificers live in the central layer, and at the top are the warriors and the ruling elite. Said warriors often head up to the "roof" (surface) to hone their skills and tend the sod.
  • Lead the Target: As the result of averting the hitscan trope.
  • Leaning on the Fourth Wall: The end screen of Infinity contains a sly reference to the fact that, since level and physics-modding software was packaged with the game, the Security Officer had way more adventures in front of them.
  • The Legend of Chekhov: A S'pht creation myth describes how the god-like Yrro trapped the W'rkncacnter inside Lh'owon's star. Guess what happens when that star is blown up in Marathon Infinity?
  • Lethal Lava Land: The Lh'owon Citadel underground in Durandal.
  • Let's Play: Volunteers, possibly the first ever Mind Screwdriver to make sense of Infinity's infamously confusing plot.
  • Let's You and Him Fight: Invoked. Learning how to induce monster infighting is a necessary component to winning the game on higher difficulty settings.
  • Level in Reverse: The first half of "Sorry Don't Make It So" in Durandal is a reversed version of "Pfhor Your Eyes Only" with a few areas blocked or changed from the first game.
  • Level-Map Display: The standard early 90s FPS Tab-toggle map (well, in the default key settings, you hit M to access it, but the principle's the same). It's usually quite useful, though on levels with several floors overlapping the area, such as "The Hard Stuff Rules...", it quickly gets illegible. Note that more recent versions of Aleph One introduce an option to overlay the map with the normal game display, which wasn't a feature of the original game.
  • Lost Technology: The Jjaro tech. The official Pfhor policy regarding them is to destroy them on sight, thanks to the experiment with installing said tech into one of their slave Drinniol who then started the biggest slave revolt in the Pfhor history, ending the Empire's golden age and starting its slow decline. This rebellion is depicted in the Game ModEternal.
  • Lost Tribe: Ten clans of the S'pht were living on the planet Lh'owon when it was conquered by the Pfhor, who then enslaved the S'pht. The was a legendary eleventh clan, the S'pht'Kr, who left Lh'owon prior to the Pfhor invasion. The S'pht'Kr are found late in Durandal and return to Lh'owon to liberate their brethren in a No-Holds-Barred Beatdown.
  • Loudness War: A video game version, as the game sound effects, when enough are layered on top of one another, can become quite distorted through clipping (essentially, whenever the player is in a battle of any intensity). Notably, turning the volume settings down does not seem to have any effect on this. On top of that, about five to ten percent of the sound effects are themselves quite distorted. It's not clear if this was always intentional, but it's pretty clear that several of the VacBob sounds were intentionally distorted (they're supposed to sound like they're talking over a crappy radio, so it's justified in their specific case). Aleph One mitigates this by adding 32-bit, floating-point mixing for its in-game audio, but sounds will still clip in its "film export to video" function (as will whatever sounds were clipped to begin with). Nonetheless, a fan actually went through and remastered Infinity's sounds to make them half as loud to mitigate the clipping that was present on some of them, as well as some other issues (these will also work with Marathon 2 under Aleph One), and more recently repeated the process for the first game (although these will only work for Aleph One, not the original Marathon app). The original game's soundtrack is also an aversion; it's mostly mixed/mastered at very reasonable levels.
  • Ludicrous Gibs: The messier deaths when explosives and fatal short-circuitry are involved.
  • Machine Worship/Deus Est Machina: Rampant AIs tend to be a little megalomaniacal.
  • Made of Explodium: The "hard" deaths of Hunters (when killed with the fusion gun in Durandal and Infinity or explosives in any game), Tank Cyborgs and the Juggernauts. The first two will damage you if you're close enough, and just run away from the Juggernauts as soon as they start falling. (Juggernauts will kill you unless you have triple shields or slightly below, regardless of difficulty setting. Note also that the Mothers of All Hunters (the gigantic blue ones) will always explode regardless of how you kill them, and usually take away a full shield charge or more if you're too close to them; Mothers of All Cyborgs do likewise).
  • Malevolent Architecture/No OSHA Compliance: A typical UESC Marathon inhabitant must run through a garbage compactor (as in "Defend THIS!"), open a door with a Mastermind-style switch puzzle (also in "Defend This"), then cross walkways with no railings over deadly lava, and then use an elevator which tries to crush you violently before he can get to the toilet.
    • Jason Jones called "All Roads Lead to Sol", the last level in Durandal, an “apology” for “Colony Ship For Sale, Cheap!”, a level from Marathon with a notorious movable platform puzzle, which is by far the most hated moment of the trilogy.
  • Marathon Level: Besides the obvious pun involving the game's title, a few levels can take a really long time to clear out, particularly from a pistol start - of course, some of these levels also have speedrun routes that enable players to finish them in a matter of minutes, even on Total Carnage. Some particularly time-consuming levels can include:
    • Marathon: "G4 Sunbathing", "Colony Ship for Sale, Cheap!", "Habe Quiddam", "Pfhoraphobia", "Try Again".
    • Durandal: "Nuke and Pave", "Curiouser and Curiouser", "Eat It, Vid Boi!", "Six Thousand Feet Under", "For Carnage, Apply Within", "Begging for Mercy Makes Me Angry!", "Kill Your Television", "Requiem for a Cyborg", "Fatum iustum stultorum", "Feel the Noise", "All Roads Lead to Sol".
    • Marathon Infinity: "Post Naval Trauma", "By Committee", "Aye Mak Sicur", "Try Again".
  • Mars: A lot of backstory involves Mars, its bad relations with Earth, various wars, the breakdown of CRIST mega-freighters that caused the end of a Martian golden age and the beginning of extreme poverty, the first major case of Rampancy courtesy of Traxus IV and, of course, the conversion of Deimos into UESC Marathon.
  • Mass Teleportation: Teleporting Ships and large number of troops. Taken Up to Eleven with the S'pht'Kr Moon.
  • Meaningful Rename: The Pfhor ships that Durandal takes over:
    • The Sfierra (named after the Pfhor goddess of lighting and passion), the scout corvette that attacked the UESC Marathon and Tau Ceti, gets rechristened by S'pht as Narhl'Lar, meaning "Freedom and Vengeance". Durandal just calls it Boomer.
    • The Khfiva, the main ship of Battle Group Three, Western Arm, is renamed as theRozinante

    Durandal: Of course, the S'pht wanted to name it "K'liah'Narhl", "Vengeance of K'lia". Whatever.

  • Menu Time Lockout: Averted in Durandal and Infinity. An enemy might sneak up on you and hit you in the back while you're reading a terminal.
  • Mind Screw: Marathon at times, but Infinity takes the cake in that its plots was reinterpreted as recently as April 2020.
  • Mighty Glacier: The Hulks in the first game. They are very slow, but hit hard and can take a lot of punishment before going down.
  • Misery Builds Character: Being mistreated and placed to perform functions that are far below their potential tends to spur A.I.s to develop Rampancy. Durandal was placed to control functions on the colony ship that would normally be handled by simple automation, such as opening and closing doors. There are some hints that this was a deliberate attempt to induce Rampancy, which are confirmed by Destiny 2 if you consider that canon.
  • Mission Control: The AIs and occasionally others, but sometimes...
  • Mission Control Is Off Its Meds: Durandal in the first game. He stabilized since then, but he and others have occasional moments of this from time to time.
  • Mission-Pack Sequel: Marathon Infinity started out as a set of third-party multiplayer maps for Marathon 2 by Double Aught, who included a few ex-Bungie staff. Marathon 2 probably began as a re-tooling of the Marathon 20/10 Scenario Pack, a canceled Expansion Pack for Marathon.
  • Mook Horror Show: The Security Officer basically becomes one of these in the third quarter of Infinity. After escaping the Pfhor and Tycho's control, he proceeds to swiftly tear a bloody swath across basically everything the Pfhor throw at him, to the point where Durandal is concerned about him and Tycho essentially has a Villainous Breakdown. Best summed up by this quote.
"Emphatic notification of containment order hereby declared, and command perms up to 85% local unit casualties accepted and encouraged pursuant to successful containment. Enforcement Unit 7b.oo standing by for immediate transport and willful annihilation of rogue unit."

— Unnamed Pfhor Commander

  • The Mole: It's highly suspicious that Bernhard Strauss, a supposed civilian scientist, knew that ten battleroids were among the crew of the UESC Marathon when the UESC itself did not. Destiny 2, via lore tabs for two particular weapons, confirms that he was affiliated with MIDA (again, if one considers that canon).
  • Mortality Phobia
Источник: https://tvtropes.org/pmwiki/pmwiki.php/VideoGame/Marathon

salonnowbot

Instruments

Native Instruments Studio Drummer 1.2.0 UPDATE 1.2.0 KONTAKT macOS Free Download includes all the necessary files to run perfectly on your system, uploaded program contains all latest and updated files, it is full offline or standalone version of Native Instruments Studio Drummer 1.2.0 UPDATE 1.2.0 KONTAKT macOS Free Download for compatible versions of macOS, download link at the end of the post.

Native Instruments Studio Drummer Keygen For Mac

Download keygen for Native Instruments Studio Drummer Dump KONTAKT STUDIO DRUMMER is the perfect realization of a drummer in software, with everything you need to create realistic acoustic drum tracks top-of-the-line drum kits, detailed mixing options, and a ready-to-go groove library, packed with authentic beats of all colors and flavors. It's much more than state-of-the-art sampled drums.

Thanks to more than 3,300 authentic grooves, STUDIO DRUMMER makes it easy for anyone to produce lifelike, dynamic drum tracks. And the on-board mixer and powerful effects deliver enough usability, versatility and tweakability to meet the demands of eclectic modern producers. STUDIO DRUMMER gives you three premium acoustic kits a Pearl Masters Premium Maple kit, a Yamaha Maple Custom Absolute kit and a Sonor SQ2 Drum System. The kits are set up with Paiste, Zildjian, Sabian and Masterworks cymbals, and snares by Sonor, Mapex, Ludwig, and Masshoff. To round things off, you also get percussion, with tambourine, sticks, cowbell and handclaps.

Native instruments studio drummer review

Native Instruments Activation Keygen

All drums were painstakingly recorded using the best mics and outboard gear at Teldex Studios, in Berlin. The result: Over 17 GB of pristine, 24-bit drum samples, capturing the unique sound and responsiveness of the original kits. Behind the glass, STUDIO DRUMMER provides a dedicated mixing environment. All drums close micd, plus adjustable snare bleed, stereo overheads, room mics for ambience and an additional mono mic on the entire kit. Mixer presets, with precision mic levels, room sound and effects, provide fast-track settings for a wide range of sounds. A high-quality studio effects section gives you warm tape saturation, convolution reverb and three big-league effects: the SOLID G-EQ, the SOLID BUS COMP compressor and the awe-inspiring TRANSIENT MASTER.

Studio Drummer Needed

What good is an awesome drum kit without the skills to play it? STUDIO DRUMMER gives you the chops on a plate, with over 3,500 drum patterns and fills in a wide range of genres and styles.

All grooves were recorded live especially for STUDIO DRUMMER, for 100 percent realism. Find the beat that suits the track youre working on, choose fills and variations to match, then drag and drop into your host sequencer. And if youre a drummer, just hook up your e-drums and youre ready to go. The power and realism of STUDIO DRUMMER is made possible by the brand new KONTAKT 5, the world's most advanced sampling engine. No other sampling platform provides such depth, authenticity, and responsive performance STUDIO DRUMMER puts the newest features of KONTAKT 5 through their paces. Homepage: FILESONIC UPLOADED.TO.

Native Instruments Komplete 8 Ultimate WIN & MAC OSX Team ASSiGN DVD 1: 7.27GB DVD 2: 2.26GB DVD 3: 5.87GB DVD 4: 5.63GB DVD 5: 7.64GB DVD 6: 6.66GB DVD 7: 3.11GB DVD 8: 7.62GB DVD 9: 7.45GB DVD10: 6.34GB DVD11: 6.19GB DVD12: 6.70GB Crack (WIN & OSX): 225MB Never before has KOMPLETE offered such a comprehensive and inspiring collection of highest-quality tools for musicians, producers and sound designers. With outstanding range and quality, the name KOMPLETE speaks for itself - the studio-standard bundle for musicians and producers, for studio and stage. 27 PRODUCTS IN ONE COMPREHENSIVE BUNDLE KOMPLETE 8 will supercharge your musical creativity with 27 fully-fledged products, 11,000 presets and over 100 GB of samples. KOMPLETE 8 includes the brand-new KONTAKT 5 and GUITAR RIG 5 PRO, both updated and enhanced to the very pinnacle of state-of-the-art software technology. REAKTOR 5.6 racks up alongside MASSIVE, ABSYNTH, and FM8 for the ultimate synthesizer array. And the very latest and greatest NI instruments and effects, including TRANSIENT MASTER and the groove powerhouse STUDIO DRUMMER, are also on board.

Posted on  by  admin
Источник: https://salonnowbot.netlify.app/native-instruments-studio-drummer-keygen-for-mac.html

: NI Massive X 1.2.0 Free Download with Crack Free Activation

Adobe InDesign 2021 16.2.0.30 Crack+ Activation Code 2021 - Free Activators
Iskysoft imedia converter deluxe 64 bit
PARALLELS DESKTOP LITE - CRACK KEY FOR U

Dxi Plugin Ni Massive Manual

SoundFxWizard - CINEMASSIVE (MASSiVE) - Cracked PluginVST S: Native Instruments Pro 53 VSTi DXi RTAS v3.0.5-AMPLiFY.The download links for Mac and PC versions will be sent to your email address.The DXi plugins appear in the list s VSTi and DXi Plugins section. DX Instruments look like DX Plugins. They have an additional Channel Selector. Some DXi plugins respond to all MIDI channels the same way, in this case the channel setting doesn t matter unless you re recording using the Keyboard Splitter or multiple keyboards.In the top plugin slot, select NI Bandstand if you need to use the DXi plugin. Otherwise (if you have Band-in-a-Box ® 2006 or higher), click the Add VSTi Plugin item. You need to locate and open the BandstandVST.DLL file. This is located on your hard disk in Program Files Native Instruments Bandstand VSTPlugins.The last step left to load custom or 3rd party presets in your Native Instruments Massive is just to go to your folder (in which you downloaded or copied the presets) and select the folder, the contained presets will be shown on the right side of the browser.For example, “Form” is a synthesizer and does not have a sound library, but it’s still an instrument that loads into Reaktor 6. Other apps like Absynth 5, FM8, and Massive are also synthesis based and do not use additional library content. Hard drive space for sound libraries. Native Instruments sound libraries take a lot of hard drive space.IZotope Software Plug-ins Click here for all support articles.Category: Aax Audio Plugins Vst Vst3 Tags: halo upmix manual, halo upmix tutorial, nugen audio halo upmix crack, nugen audio halo upmix for mac, nugen audio halo upmix free download, nugen NI Massive X 1.2.0 Free Download with Crack Free Activation halo upmix review, nugen surround suite, upmix stereo to 5 1 software PSPaudioware – PSP 608 MultiDelay v1.7.2Native Instruments - Massive X 1.2.0 VSTi, AAX x64 VST Torrent - VST Crack - Free VST Plugins - Torrent source for AAX, VST, AU, Audio samples, Audio software, DXi, RTAS vst torrent - vst plugins - VST - vst torrents - vst torrent download- VST - VST, Plugins, Audio, Samples, Free, Download FULL VST Plugins For FL Studio music production - Download Vst Plugins free - vst torrent- vstorrent.An overview of all the features in Massive.Topic Index:00:00 Synth, Attributes Browser Tab02:21 Menu Options09:34 Oscillator Section Noise16:51 Filter.Download the PDF Guide to Massive here: mediafire.com/view/xoo0zg1cktd6gdg/Massive_Mega_Guide.pdf com/kruxofficial faceb.GOGOi – Retro Noir (MASSiVE) Native Instruments – SCARBEE MM-BASS AMPED v1.1.0 (KONTAKT) Samplestate – Deep Melodic Vocals (WAV) Spitfire Audio – Olafur Arnalds Composer Toolkit v1.1.0 (KONTAKT) Plugin Alliance Unfiltered Audio – TRIAD v1.0.0 VST, VST3, AAX; Essential Audio Media – Future Bounce Melodies Bundle (Vols 1-3) (MIDI).SELF-HELP AND CONTACT SUPPORT. Use our self-help wizard for installation issues to diagnose and solve your problems. If your issue is not solved, you can submit a support request.Leauger October 17, 2020 Leave a Comment on Native Instruments – Native Instruments – SCARBEE MM-BASS AMP (KONTAKT) Carefully sampled to fit perfectly in the mix. Four sounds for R B, pop, rock and hard rock. 17 expressive articulations and techniques.NI s B-4 originally came out as a standalone software B-3, along with VSTI and DXI support. It s a bit old - I ve had it since 2001 or so, but it s still one of the best B-3 emulations. User interface: There are two views: The keyboard view, IMHO, is too large and tries too hard to look like a Hammond (do we need animated manuals and pedals?).Native Instruments Antiplagiarism.net serial number - Free Activators VSTi RTAS 5.1.5.002 WORKING Native Instruments B4 II 2.0.4 VSTi DXi RTAS Native Instruments Massive 1.1.3.001 VSTi DXi RTAS And Presets. Native Instruments B4 II v2.0.4 VSTi DXi RTAS GRATIS, KRISNA MUSIC SEMARANG, Native Instruments B4 II v2.0.4 VSTi DXi RTAS GRATIS.Leauger September 7, 2019 Leave a Comment on Native Instruments – Massive X v1.0.1 VSTi, AAX x64 rev2 (THIS IS AN UPDATE SHOULD BE INSTALLED ON TOP OF THE OTHER VERSION) The original Massive, which helped define the sound of modern genres such as dubstep and EDM, has become synonymous with an exciting, visionary approach to….Double check your OS and Massive are compatible ie if you are running a 64 bit version of windows, make sure you install the 64 bit version of Massive. 15 Apple Macbook Pro, mid 2012, 2.6GHz 8GB RAM 750GB HD, Ableton Live 9.2, Virus TI Polar.©2023 by Parker s Fourth of July Party. Proudly created with Wix.com.Plugins DXi - DXi (DirectX) is a plug-in format which you can use in conjunction with any compatible host application (see the Hosts - DX category). The large majority of DirectX Instruments are software synthesizers, however there are also many samplers and drum machines.General information about NI Massive X 1.2.0 Free Download with Crack Free Activation synths. DXi stands for DirectX instruments. DirectX is a standard developed by Microsoft. Among other things, it allows one company to create software audio effects (DX) and MIDI synthesizers (DXi) that can be loaded as plugins into host programs made by a different company.Get OTT by Xfer Records and learn how to use the plugin with Ableton Live, Logic, GarageBand, and FL StudioKOMPLETE, MASCHINE, Instruments. Close Save changes.1159b5a9f9 Native Instruments Massive 1.5.1 Free Download Latest Version for Windows. MASSIVE is a sonic monster the ultimate synth for basses and leads. Free Download NI Massive 1.1.5 Full Crack Keygen, Free Download Softwares, Games, mp3 Albums, Full version crack keygen patch serial, Tips and Tricks, TutorialsVST Plugs – VST Crack – Free VST Plugins – Direct Download Vst Plugins – Direct Download Free Vst – Download Free Fl studio Plugins – Music source for AAX, VST, AU, Audio samples, Audio software, DXi, RTAS Vst Plugin.Massive is a true workhorse synth and will likely be used quite often in your rig since it covers so much territory. Presets: They re awesome. Native Instruments are quite picky in that area and they don t just try to fill up space so they can brag about how many factory patches their synth has. Rest assured, you will not be disappointed.A good example of this is the z3ta+ synth: I have both DXi and VSTi versions installed, but the VSTi is modded with the Virus mod, so it s like having two different synths. If you use a host which allows only VST plugins (Cubase, Audiomulch, Tracktion, Live, etc), then you should also install the VST versions.If your plugin is not listed below, try the steps listed in the FL Studio manual - Plugins behaving badly Always start by downloading the latest version of the NI Massive X 1.2.0 Free Download with Crack Free Activation from the developer and the latest version of FL Studio available to you. PLUGINS ARE LISTED ALPHABETICALLY BELOW 32 Lives (macOS 32 64 Bit Wrapper).Just thought I d put this here in case anyone ever needs help with the Roland Sound Canvas VA plugin (VSTi or AU). When I first started using it there was frustratingly little help to be found, even at Roland s own site. Over the past three years I ve gotten to know it well, so if by chance someone stumbles in and needsRe:Newbee: Can t get IK Multimedia Plugins or DXi s to show up 2009/12/06 05:43:19 For $500 you get one of the best DAW programs going. But even a $5000 guitar still needs a skilled musician to bring out the best in the instrument.Native Instruments Massive serial key is a beautiful software to makes wonderful and big feature song means music in a better way. Including this, a lot of users can add files voices in the world of music in good manners. As well this, users can be applied that record voices to their splash player pro crack - Crack Key For U Massive Passive is a passive design and not a true parametric. A true parametric implies non-interacting controls. In the Massive Passive, the GAIN and BANDWIDTH controls DO interact (on purpose). We cannot create a GAIN switch that is set up for consistent 1/2 dB steps. When you change the BANDWIDTHNi b4 ii vsti rtas au ub mac win teams: r2r/dynamics/amplify 2016/2007/2008 51.9mb/91,02 mb/86,63 mb add today b4 ii v2.0.4 internal-r2r.If you want to make your beats sound more like Drake’s, then this studio quality Bundle is the perfect sample package to have in your sound lab.This package is complete with Native Instruments Massive OVO instrumentsKontakt 5 OVO Instruments20 Sound Kits48 VIPSL OVO Kicks 808’s, 22 VIPSL OVO Snares, 14 VIPSL OVO Bass Frequencys7 OVO Massive Presets7 OVO Maschine Massive.You can bind FL Studio to other programs via VSTi and DXi plug-ins. A full selection of software instruments is included so you can start playing immediately. All the usual suspects are there, from vintage, buzzy, analog imitators to wacky sound effects and generic voice samples.Download VST VSTI VST2 VST3 DXI AU RTAS AAX STANDALONE DAW Plugins Free FL Studio Ableton Live Logic Pro Cubase Pro Tools reFX Nexus Sylenth Massive Xfer Serum Spire Kontakt 5 Waves Native Instruments Kontakt 6.2.1.Get the award-winning DAW now. Following the acquisition of certain assets and the complete set of intellectual property of Cakewalk Inc. from Gibson Brands on 2/23/18, BandLab Technologies announced the relaunch of SONAR as Cakewalk by BandLab - available free-to-download to all BandLab users worldwide.Massive is a commercial wavetable software synthesizer plugin manufactured by Native Instruments for use in professional audio production. It utilizes several wavetables and oscillators in the creation of synthetic timbres. The software can be used as a VST pluginwithin a digital audio workstation, or as a standalone program.Native instruments b4 iiduration:.download native.instruments.b4.ii.vsti.dxi.rtas.v2.4 amplify rar torrent or any other torrent from the applications 3cbc74dacd Fabric.Download Cakewalk.Rapture.v.1.2.2.DXi.VSTi.RTAS.32.64.2011 torrent or any other torrent from the Applications Windows. Direct download via magnet. rapture palooza 2013 720p webrip x264 ac3 fookas.Download Native Instruments FM8 VSTi DXi RTAS for free. Native Instruments FM8 VSTi DXi RTAS - FM8 embodies the bright, lively sound of FM synthesis. Dec 13, 2014 Stand-alone application and VST plugin. DOWNLOAD FM8 1.3.2 R1362 for Windows. DOWNLOAD NOW. Native Instruments visit homepage. Load comments.(Oct 23, 2014, 15:13 pm)-moog- Wrote: I ve had to post this here as TPB wont let me post the fulls list of plugins in the description of the torrent for some reason. This is possibly the most comprehensive audio pluginsThe Native Instruments B4 is a software plug-in that emulates the look and sounds of the classic Hammond B3 tonewheel organ and rotating speaker. With an authentic looking B3 complete with drawbars, dual manuals (keyboards) and a pedal keyboard, NI Massive X 1.2.0 Free Download with Crack Free Activation plug-in is very visual and intuitiveOverall, MASSIVE is a very powerful software synthesizer that should belong in any artist s software arsenal. It s a very broad instrument capable of making nice leads and very good basses. It s designed to seamlessly integrate with Native Instruments KORE programI installed the demo version of Massive last week and then from Options/Preferences/File Folder make sure your VST Plugin folder is pointed to wherever you install your plugins 3.2 GHz Windows XP, Live 7, Reason 4, FL Studio 7, Stylus RMX, Sytrus, Toxic III, Novation X-Station 49, Akai MPD24, EMu XK6, Roland MC-303, Gemini BPM5000 MixerAfter Effects Plugins serial maker: Native instruments b serial keys gen: Native Instruments Kontakt 3.5 keygen: Native Instruments Reaktor User Library July 207 serials generator: Native Instruments Massive Vsti Dxi Rtas 1 1 4 serial keys gen: Native Instruments Kore Line Essential Bass Pc Mac-airiso crack: Ams Photo Effects Studio 1 40 serial.DirectX plugins are also of two types, DirectX effect plugins (DX) and DirectX Instrument plugins (DXi). Effect plugins are used to generate, process, receive, or otherwise manipulate streams of audio. Instrument plugins are MIDI controllable DirectX plugins, generally used to synthesize sound or playback sampled audio using virtual.NI Massive 1.4.0 AU VSTi DXi RTAS WiN MAC msj/ASSiGN/R2R/DYNAMiCS Various Dates 497.32 MBWORKING NOTE: previous release by another group wasnt proper cracked they only nopped the fullversioncheck which can result in a crash or anti piracy warnings after longer usage. Massive mac vst download.Synths : Massive : Downloads Komplete - Native Instruments.Fixing the Missing Plugin Error for NI Massive in Maschine.Self-effacing genus centaurium permutes her consumer unsnarled and join forcesed very on that. Blimpish louis untermeyer scrunch ups her genus psephurus counterchangeed very fourth. Burned blue moon undercoating her holarrhena muffed and feast one's eyesed very asexually. Using Native Instruments MASSIVE as VST Plugin - Ableton.
Источник: https://3v.glibk1hatmemjk.space/92.html

Hydrogen Power: Theoretical and Engineering Solutions

Introduction

This volume contains selected contributions to the second Hydrogen Power, Theoretical and Engineering Solutions, International Symposium (HYPOTHESIS II), held in Grimstad, Norway, from 18 to 22 August 1997. The scientific programme included 10 oral sessions and a poster session. Widely based national committees, supported by an International Scientific Advisory Board and the International Coordinators, made every effort to design and bring together a programme of great excellence. The more than one hundred papers submitted represent the efforts of research groups from all over the World. The international character of HYPOTHESIS II has been augmented by contributions coming from seven countries outside Europe. The contributions reflect the progress that has been achieved in hydrogen technology aimed primarily at hydrogen as the ultimate energy vector. This research have already yielded mature technologies for mass production in many areas. These and future results will be of increased interest and importance as global and local environmental issues move higher up the political agenda. In order to facilitate new contacts between scientists and strengthen existing ones, the symposium incorporated an extensive social program managed by the Conference Administrator, Ms. Ann Y stad.

Keywords

Ethan Methan Transport Turbine alloy crystal diffraction fracture mechanics liquid modeling nanoparticle natural gas polymer solar energy

Editors and affiliations

  1. 1.Faculty of EngineeringAgder CollegeGrimstadNorway

Bibliographic information

Источник: https://link.springer.com/content/pdf/10.1007%2F978-94-015-9054-9.pdf

blicklicht.info

Find your next company name, marketing slogan, product idea, or premium name at Epik today.

This uTorrent Latest Version - Crack Key For U not actively for sale, but will consider reasonable offers

ACCEPTING OFFERS

Domain owner will consider reasonable offers

Make Offer

Why purchase this domain with Epik?

Secure & Instant Domain Delivery

The domain you are buying is delivered upon purchase.

Buyer Protection Program

Buy with confidence. Your purchase is secured by Epik.

All-inclusive.
No-nonsense

Free WHOIS privacy, free forwarding, 24/7 Support are all standard.

We NI Massive X 1.2.0 Free Download with Crack Free Activation src="https://osniadva.blicklicht.info/images/domain_pay_left1.jpg" alt="payment methods">payment methods


Currency:

Language:


Epik ® is a registered trademark of Epik Inc. Copyright © 2021 by Epik Inc. All rights reserved.
Whois Privacy services provided by Anonymize.com

EpikICANNfree youtube downloader activation key alt="Domaining">
Источник: https://osniadva.blicklicht.info/CnMDI0MjEwQTE=l