Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

DRBG Validation List

This list identifies implementations that have been validated as conforming to the Deterministic Random Bit Generator (DRBG) Algorithm, as specified in Special Publication 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, using tests described in the DRBG Validation Suite (DRBGVS).

As of June 2015, in accordance with SP800-90A Revision 1, and November 2015, in accordance with SP800-131A Revision 1, the use of Dual_EC_DRBG is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
2499
11/9/2018
    2498SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com
    (844) 436-2797

    CryptoComply Server Engine

    2.2


    CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

      • Intel Xeon E3 w/ CentOS 7
    11/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5948
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4699
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3920
    2497FP InovoLabs GmbH
    Prenzlauer Promenade 28
    Berlin, Berlin 13089
    Germany

    Janos Laube
    j.laube@francotyp.com
    +49 30 220660 397

    Hasbi Kabacaoglu
    h.kabacaoglu@francotyp.com
    +49 30 220660 656

    NpsdCrypto

    N-PSD rev. 04 1.1 (Firmware)


    nRevenector Cryptographic Library

      • Maxim MAX32590
    11/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5662
    2496Riverbed Technology
    680 Folsom St
    San Francisco, CA 94107
    USA

    Mike De La Garrigue
    Mike.DeLaGarrigue@riverbed.com
    (805) 262-1655

    Derek Rosen
    Derek.rosen@riverbed.com
    (805) 262-1630

    AOS Crypto Module

    XD-Crypto-1.0 (Firmware)


    Comprehensive module implementing various FIPS approved cryptographic algorithms using modified OpenSSL. This provides necessary crypto functionalities for the user space applications on the access points.

      • Cavium Octeon 7030
      • Cavium Octeon 7130
    11/9/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4698
    2495Western Digital Corporation
    5601 Great Oaks Parkway
    San Jose, CA 95119
    USA

    Michael Williamson
    michael.williamson@wdc.com
    408-717-8458
    Fax: 408-717-7048

    Jithendra Bethur
    jithendra.bethur@wdc.com
    408-717-5951
    Fax: 408-717-7048

    TcgCryptoLib

    SOCFWLIB-0021 (Firmware)


    Cryptographic library support for encryption and decryption features on Western Digital's Self-Encrypting Drives (SEDs).

      • Avago, ARM Cortex R5
    11/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5944
    2494RSA Security LLC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    François Lamoureux
    francois.lamoureux@rsa.com
    +1 781 515 5025

    Tom Fowler
    tom.fowler@rsa.com
    +61 7 3032 5237

    RSA BSAFE Crypto Module

    1.0


    RSA BSAFE(R) Crypto Module 1.0 is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

      • Intel Core i7 without AES-NI w/ Windows 10 Enterprise x64
      • Intel Core i5 with AES-NI w/ Windows 10 Enterprise x86
      • Intel Core i7 without AES-NI w/ Windows Server 2016
      • Intel Core i5 with AES-NI w/ Windows 7 Enterprise SP1 x64
      • Intel Core i7 with AES-NI w/ Windows Server 2016
      • Intel Core i5 without AES-NI w/ Windows 7 Enterprise SP1 x64
      • Intel Core i7 without AES-NI w/ Windows 10 Enterprise x64
      • Intel Core i5 without AES-NI w/ Windows 7 Enterprise SP1 x86
      • Intel Core i5 with AES-NI w/ Windows 7 Enterprise SP1 x86
      • Intel Core i5 without AES-NI w/ Windows 10 Enterprise x86
      • Intel Core i7 with AES-NI w/ Windows 10 Enterprise x64
    11/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5941
    2493Ixia, a Keysight Business
    846 Higuera Street, Suite 2
    San Luis Obispo, CA 93401
    United States

    Fred Strelzoff
    fref.strelzoff@keysight.com
    (512) 600-5400

    Ixia Cryptographic Module

    1.0.1


    The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Intel Core i7-3555LE w/ Linux 4.12.0
    11/9/2018
    • Counter:
      • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5940, TDES #2894
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4693
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3915
    2492Ixia, a Keysight Business
    846 Higuera Street, Suite 2
    San Luis Obispo, CA 93401
    United States

    Fred Strelzoff
    fref.strelzoff@keysight.com
    (512) 600-5400

    Ixia Cryptographic Module for OpenSSL

    2.0.16


    The Ixia Cryptographic Module for OpenSSL is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Intel Core i7-3555LE without PAA w/ Linux 4.12.0
      • Intel Core i7-3555LE with PAA w/ Linux 4.12.0
    11/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5939
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4692
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3914
    2491NETSCOUT Systems, Inc.
    310 Littleton Road
    Westford, MA 01886
    USA

    Steve Swidrak
    Stephen.Swidrak@netscout.com

    NetScout FIPS Object Module

    1.0


    This cryptographic library provides cryptographic services to NETSCOUT products.

      • Intel Xeon X5620 without AES-NI w/ Linux 2.6.39.1
      • Intel Xeon E5 Series without AES-NI w/ Linux 3.7.5
      • Intel Xeon E5-2608L v3 without AES-NI w/ ArbOS 7.0
      • Intel Xeon E5-2697 v3 without AES-NI w/ Linux 3.10
    11/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5672
    2490Socionext Inc.
    Nomura Shin-Yokohama Bldg.2-10-23 Shin-Yokohama
    Kohoku-ku, Yokohama, Kanagawa 222-0033
    Japan

    SoC Solution Engineering Dept. Custom SoC Solution Business

    Socionext Cryptographic Module

    XCZU9EG V01L02R01


    The Socionext Cryptographic module provides the cryptographic functionality found in Socionext Cryptographic products. It implements support for AES, DRBG, SHA2, RSA and ECDSA Digital Signature generation/verification.

      • ARM Cortex-A53 w/ Linux Kernel 4.11
    11/9/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4691
    2489NETSCOUT Systems, Inc.
    310 Littleton Road
    Westford, MA 01886
    USA

    Steve Swidrak
    Stephen.Swidrak@netscout.com

    NetScout FIPS Object Module

    1.0


    This cryptographic library provides cryptographic services to NETSCOUT products.

      • Intel Xeon Gold without AES-NI w/ Linux 3.10
    11/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5936
    2488BAE Systems
    11487 Sunset Hills Rd.
    Reston, VA 20190-5228
    USA

    John Ata
    john.ata@baesystems.com
    (703) 563-8115
    Fax: (703) 668-4224

    STOP Kernel Cryptomodule

    1.2.1


    The STOP Kernel Cryptomodule provides cryptographic services that the STOP kernel uses to implement pseudorandom number generation to applications and file system encryption.

      • Intel Xeon w/ STOP 8.3
    11/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5935
    2487Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6220 w/ Lexmark Linux (64-bit)
    11/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5934
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4689
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3912
    2486Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6270 w/ Lexmark Linux (64-bit)
    11/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5933
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4688
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3911
    2485Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6220 w/ Lexmark Linux (32-bit)
    11/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5932
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4687
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3910
    2484Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6270 w/ Lexmark Linux (32-bit)
    11/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5931
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4686
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3909
    2483SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com

    CryptoComply Server Engine

    2.1


    SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

      • Intel i7 w/ Windows Server 2012 R2
    11/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5930
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4684
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3908
    2482SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com

    CryptoComply Server Engine

    2.1


    SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

      • Intel i7 w/ Red Hat Enterprise Linux 7
    11/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5929
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4683
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3907
    2481Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS OpenSSL Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Broadcom BCM47452
    11/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5928
    2480WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel e3-1225
    11/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5920
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4676
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3900
    2479WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel i3-6100
    11/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5919
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4675
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3899
    2478WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel G4400
    11/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5918
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4674
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3898
    2477NetApp, Inc.
    495 East Java Drive
    Fourth Floor
    Sunnyvale, CA 94089
    USA

    Mike Scanlin
    Michael.Scanlin@netapp.com
    919.476.8578
    Fax: 919.476.4272

    NetApp CryptoMod

    2.1


    NetApp CryptoMod will be integrated into NetApp ONTAP releases for the purpose of supporting FIPS 140-2 compliant data-at-rest encryption and key management.

      • Intel Xeon Platinum w/ Data ONTAP 9.4 without PAA
      • Intel Xeon w/ Data ONTAP 9.4 without PAA
      • Intel Xeon w/ Data ONTAP 9.4 with PAA
      • Intel Xeon Platinum with PAA w/ Data ONTAP 9.4
    11/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5917
    2476WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel G3900
    10/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5914
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4672
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3896
    2475WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel C3558
    10/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5913
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4671
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3895
    2474WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel N3160
    10/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5912
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4670
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3894
    2473WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel N3060
    10/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5911
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4669
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3893
    2472WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • NXP T1024
    10/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5910
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4668
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3892
    2471WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • NXP P1010
    10/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5909
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4667
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3891
    2470Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC Java Cryptographic Library

    1.0 (Firmware)


    The MC Java Cryptographic Library provides the necessary cryptographic services for Java the Management Center firmware developed specifically for use in the Management Center appliances.

      • Intel E5 2418L
    10/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5908
    2469Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC OS Cryptographic Library

    1.0 (Firmware)


    The MC OS Cryptographic Library provides the necessary cryptographic services for the Management Center firmware developed specifically for use in the Management Center appliances.

      • Intel E5 2418L
    10/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5907
    2468Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC VA Java Cryptographic Library

    1.0


    The MC VA Java Cryptographic Library provides the necessary cryptographic services for Java the Management Center software developed specifically for use in the Management Center appliances.

      • Intel E5 4620v4 w/ RHEL 6.9 on ESXi 6.0
    10/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5906
    2467Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC VA Java Cryptographic Library

    1.0


    The MC VA Java Cryptographic Library provides the necessary cryptographic services for Java the Management Center software developed specifically for use in the Management Center appliances.

      • Intel E5 4620v4 w/ RHEL 6.9 on ESXi 6.0
    10/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5905
    2466Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC VA OS Cryptographic Library

    1.0


    The MC VA OS Cryptographic Library provides the necessary cryptographic services for the Management Center software developed specifically for use in the Management Center appliances.

      • Intel E5 4620v4 w/ RHEL 6.9 on ESXi 6.0
    10/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5904
    2465WISeKey
    Rue de la carrière de Bachasson
    Arteparc de Bachasson, Bâtiment A
    Meyreuil, Bouches du Rhone F-13590
    France

    Dupaquis
    vdupaquis@wisekey.com
    +33 442370081

    Benchaalal
    obenchaalal@wisekey.com
    +33 442370025

    Vault-IC 407

    1.0.1 (Firmware)


    The VaultIC407 ASSPs designed to secure various systems against counterfeiting, cloning or identity theft. It is a hardware security module that can be used in many applications such as IP protection, access control or hardware protection.

      • High-performance, Low Enhanced RISC Architecure
    10/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5903
    2464Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (Palo Alto Networks VM-Series and Panorama Virtual Appliances)

    8.1


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-Series and Panorama Virtual Appliances.

      • Intel Multi Core Xeon w/ AWS EC2
      • Intel Multi Core Xeon w/ Hyper-V 2012 r2
      • Intel Multi Core Xeon w/ Google Cloud Platform
      • Intel Multi Core Xeon w/ CentOS 7.2 - KVM
      • Intel Multi Core Xeon w/ VMware ESXi 5.5
      • Intel Multi Core Xeon w/ Azure
    10/22/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5902
    2463Totemo AG
    Freihofstrasse 22
    Kuesnacht, Zuerich 8700
    Switzerland

    Marcel Mock
    marcel.mock@totemo.com
    +41 (0) 44 914 9900

    Totemo Cryptographic Module (TCM)

    3.0


    The Totemo Cryptographic Module supplies the cryptographic services required by the Totemo Security Platform (TSP) and the Totemo products which provides secure email, file transfer, and mobile messaging solutions. These solutions secure all types of communication without any infrastructure prerequisites.

      • Intel Xeon E3-1225v3 w/ Totemo Appliance OS 2.3 with JRE 8.0
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4657
    2462NETSCOUT Systems, Inc.
    310 Littleton Road
    Westford, MA 01886
    USA

    Steve Swidrak
    Stephen.Swidrak@netscout.com

    NetScout FIPS Object Module

    1.0


    This cryptographic library provides cryptographic services to NETSCOUT products.

      • Intel Xeon Gold w/ Linux 3.10
    10/19/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5900
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4656
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3880
    2461Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI shassse3 Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: SHS #4655
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: HMAC #3879
    2460Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI shassse3 Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: SHS #4654
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: HMAC #3878
    2459Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI shagen Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4653
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3877
    2458Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI shagen Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4652
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3876
    2457Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI shaavx Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: SHS #4651
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: HMAC #3875
    2456Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI shaavx Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: SHS #4650
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: HMAC #3874
    2455Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI shaavx2 Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: SHS #4649
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: HMAC #3873
    2454IBM
    10777 Westheimer Rd
    Houston, Texas 77042
    USA

    Glen Jaquette
    jaquette@us.ibm.com
    (713) 278-6279

    IBM CryptoLite for C

    4.14.4.3442 (Firmware)


    IBM CryptoLite for C is used by the IBM® FS9100 FlashCore module, which is a NVMe-connected self-encrypting non-volatile storage module

      • Quad-core ARM(R) Cortex A53 MPcore
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-512
      • Prerequisite: SHS #4648
    2453Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI shaavx2 Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: SHS #4647
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: HMAC #3871
    2452Broadcom Corp.
    270 Innovation Drive
    San Jose, CA 95134
    United States

    Alfonso Ip
    Alfonso.ip@broadcom.com
    408-922-5624
    Fax: 408-922-8050

    RNG

    BCM5820X 1.0 (Firmware)


    SP800-90A DRBG implementation using SHA-256

      • ARM Cortex-A7
    10/19/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4646
    2451Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600)

    8.1 (Firmware)


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600.

      • Intel i7
      • Intel Multi Core Xeon
      • Intel Pentium
      • Intel Celeron
      • Cavium Octeon MIPS64
      • Cavium MIPS64
    10/19/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5890
    2450GE MDS, LLC
    175 Science Parkway
    Rochester, NY 14620
    USA

    Aaron Wright
    aaron.wright@ge.com
    585-242-8354
    Fax: 585-241-5590

    Alex Charissis
    alex.charissis@ge.com
    585-242-8402
    Fax: 585-241-5590

    Mocana DSF

    5.5-gc64c6d83 (Firmware)


    Cryptographic algorithm API and self-test routines implemented by Mocana, Inc.

      • Freescale IMX 6 (ARM)
    10/19/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5887
    2449Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A12 Bionic, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A12 Bionic w/ iOS 12
    10/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5886
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3863
    2448Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A12 Bionic, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A12 Bionic w/ iOS 12
    10/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3862
    2447Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A12 Bionic, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A12 Bionic w/ iOS 12
    10/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5884
    2446Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A12 Bionic, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A12 Bionic w/ iOS 12
    10/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5883
    2445Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A12 Bionic, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A12 Bionic w/ iOS 12
    10/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3861
    2444Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A12 Bionic, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A12 Bionic w/ iOS 12
    10/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5880
    2443Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A12 Bionic, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A12 Bionic w/ iOS 12
    10/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5879
    2442Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI aesni Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    10/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5875
    2441Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI aesgen Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    10/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5874
    2440Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI aesasm Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    10/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5872
    2439Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI aesgen Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    10/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5867
    2438Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 KCAPI aesasm Implementation

    R6-1.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    10/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5865
    2437Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 GnuTLS C Implementation

    R7-2.0.0


    GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    10/12/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5858
    2436Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); Virtual TPM Implementations

    10.0.17134


    The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro April 2018 Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise April 2018 Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE w/ Windows 10 Pro April 2018 Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Core on Hyper-V on Windows Server 2016 (x64)
      • Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet w/ Windows 10 Pro April 2018 Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise April 2018 Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise April 2018 Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro April 2018 Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Home April 2018 Update (x86)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Education April 2018 Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE w/ Windows 10 Enterprise April 2018 Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter Core on Hyper-V on Windows Server (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro April 2018 Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Standard Core on Hyper-V on Windows Server (x64)
      • Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go w/ Windows 10 Pro April 2018 Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise April 2018 Update (x64)
    10/12/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5861
    2435Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); SymCrypt Cryptographic Implementations

    10.0.17134


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go
      • Windows 10 Home April 2018 Update (x86) w/ Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
      • Windows 10 Education April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows Server Core on Hyper-V on Windows Server 2016 (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
      • Windows Server Datacenter Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
      • Windows Server Datacenter Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows Server Standard Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290
      • Windows Server Standard Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop
    10/5/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5847
    2434Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (watchOS 5, S3, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

      • Apple S3 w/ watchOS 5
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3857
    2433Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (watchOS 5, S3, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within watchOS.

      • Apple S3 w/ watchOS 5
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5844
    2432Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (watchOS 5, S3, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within watchOS.

      • Apple S3 w/ watchOS 5
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5841
    2431Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (tvOS 12, A10X Fusion, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within tvOS.

      • Apple A10X Fusion w/ tvOS 12
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3856
    2430Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (tvOS 12, A10X Fusion, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within tvOS.

      • Apple A10X Fusion w/ tvOS 12
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5837
    2429Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (tvOS 12, A10X Fusion, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within tvOS.

      • Apple A10X Fusion w/ tvOS 12
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5836
    2428Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (408)750-6235

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, Xeon, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel Xeon w/ macOS Mojave 10.14
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5835
    2427Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, CoreM, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel CoreM w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3855
    2426Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, Xeon, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Xeon w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3854
    2425Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i9, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i9 w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3853
    2424Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i7, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i7 w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3852
    2423Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i5, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i5 w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3851
    2422Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, CoreM, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Intel CoreM w/ macOS Mojave 10.14
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5834
    2421Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, Xeon, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Intel Xeon w/ macOS Mojave 10.14
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5833
    2420Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i5, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Intel i5 w/ macOS Mojave 10.14
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5832
    2419Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i7, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Intel i7 w/ macOS Mojave 10.14
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5831
    2418Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i9, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Intel i9 w/ macOS Mojave 10.14
    10/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5830
    2417Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, CoreM, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel CoreM w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3850
    2416Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, Xeon, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel Xeon w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3849
    2415Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i7, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel i7 w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3848
    2414Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i5, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel i5 w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3847
    2413Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i9, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel i9 w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3846
    2412Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, CoreM, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel CoreM w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3845
    2411Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, Xeon, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Xeon w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3844
    2410Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i7, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i7 w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3843
    2409Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i5, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i5 w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3842
    2408Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i9, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i9 w/ macOS Mojave 10.14
    10/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3841
    2407Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    securitycertifications@gemalto.com

    Gemalto FIPS Object Module

    2.1.0


    The Gemalto FIPS Object Module is a hardened version of the general purpose OpenSSL FIPS Object module designed to provide FIPS 140-2 validated cryptographic functionality.

      • Qualcomm APQ8064 (ARMv7) w/ Android 4.4
      • Qualcomm MSM8996pro Snapdragon 821 (ARMv8) w/ Android 7.1
      • Apple A6 (ARMv7) w/ IOS 10.3
      • Qualcomm MSM8998 Snapdragon 835 (ARMv8) w/ Android 8.1
      • Apple A11 (ARMv8) w/ IOS 11.4
      • Samsung Exynos7420 (ARMv8) w/ Android 5.1
      • Qualcomm MSM8994 Snapdragon 810(ARMv8) w/ Android 6.0
      • Qualcomm APQ8064 (ARMv7) without PAA w/ Android 4.4
      • Apple A8 (ARMv8) w/ IOS 9.3
    9/28/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5829
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4615
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3840
    2406Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (408)750-6235

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, CoreM, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel CoreM w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5828
    2405Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (408)750-6235

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i9, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel i9 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5827
    2404Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (408)750-6235

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i7, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel i7 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5826
    2403Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (408)750-6235

    Apple CoreCrypto Kernel Module v9.0 for Intel (macOS Mojave 10.14, i5, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel i5 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5824
    2402Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized VNG Assembler implementations.

      • Intel CoreM w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5814
    2401Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized VNG Assembler implementations.

      • Intel Xeon w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5813
    2400Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized VNG Assembler implementations.

      • Intel i7 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5812
    2399Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized VNG Assembler implementations.

      • Intel i9 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5811
    2398Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized VNG Assembler implementations.

      • Intel i5 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5810
    2397Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Xeon w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5804
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3839
    2396Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel CoreM w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5803
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3838
    2395Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i7 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5802
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3837
    2394Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i9 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5801
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3836
    2393Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i5 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5800
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3835
    2392Samsung Electronics Co., Ltd
    416 Maetan-3dong, Yeongtong-gu
    Suwon, Gyeonggi 152-848
    South Korea

    Brian Wood
    be.wood@samsung.com
    +1-973-440-9125

    Jung Ha Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Samsung Kernel Cryptographic Module

    1.7


    Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

      • Qualcomm MSM8996 w/ Android 8.0
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3834
    2391Samsung Electronics Co., Ltd
    416 Maetan-3dong, Yeongtong-gu
    Suwon, Gyeonggi 152-848
    South Korea

    Brian Wood
    be.wood@samsung.com
    +1-973-440-9125

    Jung Ha Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Samsung Kernel Cryptographic Module with Crypto-Extensions

    1.7


    Provides general purpose cryptographic servicesto services in the Linux kernel nand user-space applications, intended to protect data in transit and at rest.

      • Qualcomm MSM8996 w/ Android 8.0
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-256
      • Prerequisite: HMAC #3833
    2390Autotalks
    4 Meir Ariel St. Grand Netter, Building, POB 3846
    Netanya 40593
    Israel

    Ron Ioszpe
    ron.ioszpe@auto-talks.com
    +972-9-886-5300
    Fax: +972-9-886-5372

    Guy Fried
    guy.fried@auto-talks.com
    +972-9-886-5300
    Fax: +972-9-886-5327

    HMAC DRBG

    2.1.2 (Firmware)


    Autotalks Hardware Security Module provide a FIPS 140-2 Level 3 certified, hardened, tamper-resistant environment for secure cryptographic processing needed for Automotive Vehicle-to-Everything communication systems including: ECC Public Key cryptography, Symmetric key cryptography, Key protection, TRNG/DRBG

      • Simulator: Cadence NC-Verilog
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3832
    2389Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A7, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A7 w/ iOS 12
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5794
    2388Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel i5 w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3831
    2387Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Xeon w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3830
    2386Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel CoreM w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3829
    2385Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i9 w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3828
    2384Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i5 w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3827
    2383Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, AVX)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i7 w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3826
    2382Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel i7 w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3825
    2381Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel CoreM w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3824
    2380Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel Xeon w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3823
    2379Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, SSSE3)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using the SSSE3 processor instruction set.

      • Intel i9 w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3822
    2378Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel CoreM w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3821
    2377Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Xeon w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3820
    2376Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i9 w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3819
    2375Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i7 w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3818
    2374Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, AVX2)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i5 w/ macOS Mojave 10.14
    9/28/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3817
    2373Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, Generic_AES-NI)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel Xeon w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5783
    2372Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, Generic_AES-NI)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel CoreM w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5782
    2371Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, Generic_AES-NI)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i9 w/ macOS Mojave 10.14
    9/28/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5781
    2370Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, Generic_AES-NI)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i5 w/ macOS Mojave 10.14
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5780
    2369Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, Generic_AES-NI)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i7 w/ macOS Mojave 10.14
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5779
    2368Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel Xeon w/ macOS Mojave 10.14
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5773
    2367Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel CoreM w/ macOS Mojave 10.14
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5772
    2366Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel i9 w/ macOS Mojave 10.14
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5771
    2365Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel i5 w/ macOS Mojave 10.14
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5770
    2364Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel i7 w/ macOS Mojave 10.14
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5769
    2363Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI shagen Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    9/21/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4591
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3816
    2362Curtiss-Wright Controls, Inc.
    2600 Paramount Place, Suite 200
    Fairborn, OH 45324
    USA

    Paul Davis
    pdavis@curtisswright.com
    937-610-5421
    Fax: 937-252-1480

    Rich Langley
    rlangley@curtisswright.com
    937-610-5455
    Fax: 937-252-1465

    Curtiss-Wright Crypto Firmware

    1.00 (Firmware)


    The Crypto Firmware uses 256-bit encryption keys and provides key management for Data Encryption Keys (DEKs), including two-factor user authentication and secure key import, generation, storage, and zeroization. The Crypto Firmware provides maximum data-at-rest security in commercial and military applications.

      • NXP (Phillips) ARM7 Processor P/N LPC2368FBD100
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3815
    2361ICU Medical
    600 N. Field Drive
    Lake Forest, IL 60045
    USA

    Chaitanya Srinivasamurthy
    Chaitanya.srinivasamurthy@icumed.com
    +1 224-706-2518

    Mark Rohlwing
    Mark.Rohlwing@icumed.com
    +1 480-570-2097

    ICU Medical Lifecare PCA Crypto Library

    lifecare-pca-fips-2.0.16-trunk CL# 649181 (Firmware)


    ICU Medical Lifecare PCA Crypto Library provides secure communication for the Lifecare PCA Infusion Pumps.

      • Net Silicon NS7520 ARM7
    9/21/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4588
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3814
    2360Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A10X Fusion, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10X Fusion w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3813
    2359Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A11 Bionic, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A11 Bionic w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3812
    2358Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A10 Fusion, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10 Fusion w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3811
    2357Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A9X, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9X w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3810
    2356Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A8X, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8X w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3809
    2355Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A9, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9 w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3808
    2354Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A8, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8 w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3807
    2353Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A7, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A7 w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3806
    2352Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A10X Fusion, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A10X Fusion w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5757
    2351Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A11 Bionic, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A11 Bionic w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5756
    2350Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A9X, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A9X w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5755
    2349Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A10 Fusion, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A10 Fusion w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5754
    2348Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A8X, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A8X w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5753
    2347Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A7, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A7 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5752
    2346Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A9, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A9 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5751
    2345Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A8, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A8 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5750
    2344Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A8, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A8 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5749
    2343Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A11 Bionic, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A11 Bionic w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5748
    2342Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A10X Fusion, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A10X Fusion w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5747
    2341Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A10 Fusion, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A10 Fusion w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5746
    2340Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A9X, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A9X w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5745
    2339Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A9, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A9 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5744
    2338Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A8X, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A8X w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5743
    2337Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A8, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A8 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5742
    2336Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Kernel Module v9.0 for ARM (iOS12, A7, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A7 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5741
    2335Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A10X Fusion, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10X Fusion w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3805
    2334Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A11 Bionic, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A11 Bionic w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3804
    2333Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A10 Fusion, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10 Fusion w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3803
    2332Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A9X, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9X w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3802
    2331Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A8X, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8X w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3801
    2330Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A7, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A7 w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3800
    2329Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A8, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8 w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3799
    2328Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A9, VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9 w/ iOS 12
    9/21/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3798
    2327Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A10X Fusion, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A10X Fusion w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5732
    2326Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A9X, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A9X w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5731
    2325Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A11 Bionic, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A11 Bionic w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5730
    2324Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A10 Fusion, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A10 Fusion w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5729
    2323Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A8X, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A8X w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5728
    2322Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A9, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A9 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5727
    2321Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A7, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A7 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5726
    2320Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A8, Assembler_VNG)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A8 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5725
    2319Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A11 Bionic, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A11 Bionic w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5716
    2318Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A10X Fusion, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A10X Fusion w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5707
    2317Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A10 Fusion, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A10 Fusion w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5706
    2316Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A9X, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A9X w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5705
    2315Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A9, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A9 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5704
    2314Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A8X, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A8X w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5703
    2313Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A7, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A7 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5702
    2312Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A8, Assembler)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A8 w/ iOS 12
    9/21/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5701
    2311MobileIron, Inc
    410 East Middlefield Road
    Mountain View, CA 94043
    USA

    Anthony Ungerman
    ps-certifications <ps-certifications@mobileiron.co
    +1.877.819.3451
    Fax: +1.650.919.8006

    MobileIron Mobile@Work client for Android

    OpenSSL 1.0.2h, FIPS 2.0.12


    General purpose cryptographic services available for Android used by the Mobile@Work client to provide secure cryptography

      • Qualcomm MSM8996 Snapdragon 820 on Samsung Galaxy S7 w/ Android 7
      • Qualcomm MSM8998 Snapdragon 835 on Samsung Galaxy Note 8 w/ Android 7
      • Qualcomm SDM845 Snapdragon 845 on Samsung Galaxy S9+ w/ Android 8
      • Qualcomm MSM8996 Snapdragon 820 on Samsung Galaxy Tab S3 w/ Android 7
      • Qualcomm MSM8998 Snapdragon 835 on Samsung Galaxy S8 w/ Android 8
    9/21/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5700
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3797
    2310F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    Eric Raisters
    E.Raisters@f5.com
    206-272-7580

    Cryptographic Module for BIG-IP with AES-NI and SHA SSSE3

    13.1.1


    Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

      • Intel (R) Xeon (R) E5-2697 w/ BIG-IP 13.1.1 on VMware ESXi 6.5
    9/21/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5699
    2309F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    Eric Raisters
    E.Raisters@f5.com
    206-272-7580

    Cryptographic Module for BIG-IP with AES and SHA assembler

    13.1.1


    Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

      • Intel (R) Xeon (R) E5-2697 w/ BIG-IP 13.1.1 on VMware ESXi 6.5
    9/21/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5698
    2308F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    Eric Raisters
    E.Raisters@f5.com
    206-272-7580

    Cryptographic Module for BIG-IP with AES-NI and SHA SSSE3

    13.1.1


    Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

      • Intel (R) Xeon(R) E5-2660 w/ BIG-IP 13.1.1 on Hyper-V 10.0 on Windows Server 2016
    9/21/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5697
    2307F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    Eric Raisters
    206-272-7580
    206-272-7580

    Cryptographic Module for BIG-IP with AES and SHA assembler

    13.1.1


    Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

      • Intel (R) Xeon(R) E5-2660 w/ BIG-IP 13.1.1 on Hyper-V 10.0 on Windows Server 2016
    9/21/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5696
    2306Beijing Sansec Technology Development Co., Ltd
    26F No.3 Building, Triumph Center, No.170 Beiyuan Road
    Chaoyang District
    Beijing, Beijing 100101
    China

    Yongxin Xu
    xuyongxin@sansec.com.cn
    +86 186 6080 5090

    Sansec HSM - CSM Library

    1.0.12 (Firmware)


    The CSM library implements cryptographic algorithms for data encryption, data decryption, signature generation, signature verification, message digest, message authentication code (MAC), and random number generation. The CMS library is part of the Sansec Hardware Security Module (HSM).

      • Intel G3260
    9/21/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5693
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4564
    2305Microsec PTE LTD
    83B Rowell Road
    Singapore, Singapore 208015
    Singapore

    Magzhan Ikram
    mikram@usec.io
    69314227

    Vishram Mishra
    Vishram@usec.io
    69314227

    MICROSEC_RNG-HASH-DRBG

    1.00 (Firmware)


    HASH DRBG is the random number generator for cryptographic algorithms.

      • ARM Cortex M0 - ATSAMD21g18a
      • AVR - ATMega2560
    9/21/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256, SHA-512
      • Prerequisite: SHS #4563
    2304WISeKey
    Rue de la carrière de Bachasson
    Arteparc de Bachasson, Bâtiment A
    Meyreuil, Bouches du Rhone F-13590
    France

    Dupaquis
    vdupaquis@wisekey.com
    +33 442370081

    Benchaalal
    obenchaalal@wisekey.com
    +33 442370025

    Vault-IC 420/460

    1.0 (Firmware)


    The VaultIC420 or VaultIC460 are ASSPs designed to secure various systems against counterfeiting, cloning or identity theft. It is a hardware security module that can be used in many applications such as IP protection, access control or hardware protection.

      • High-performance, Low-power Enhanced RISC architecture
    9/21/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5690
    2303Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
    312 Kings Way
    South Melbourne, Victoria 3025
    Australia

    John Weston
    john.weston@senetas.com
    +61 3 9868 4555
    Fax: +61 3 9821 4899

    CN6000 Series Common Crypto Library

    5.0.1 (Firmware)


    The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

      • Intel ATOM
    9/21/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4561
    2302Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
    312 Kings Way
    South Melbourne, Victoria 3025
    Australia

    John Weston
    john.weston@senetas.com
    +61 3 9868 4555
    Fax: +61 3 9821 4899

    CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library

    5.0.1 (Firmware)


    The CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming. Interface (API) to support security relevant services.

      • ARM Cortex A9
    9/14/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4560
    2301Berryville Holdings, LLC
    2465 Centerville Road
    #J17-812
    Herndon, VA 20171
    USA

    Cael Jacobs
    cael@bvhllc.com
    (703) 782-9840

    Chava Jurado
    chava@bvhllc.com
    (703) 782-9840

    Cryptographic Module for Fognigma

    2.0.16


    The Cryptographic Module for Fognigma is a general purpose cryptographic module integrated in the Fognigma platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information. This module provides the cryptographic services that are used by the Fognigma platform to generate its Virtual Private Network (VPN)

      • ARM Cortex-A53 without PAA w/ Raspbian Stretch
      • Intel® Xeon E5 without PAA w/ Ubuntu 16.04
      • ARM Cortex-A53 with PAA w/ Raspbian Stretch
      • Intel® Xeon E5 with PAA w/ Ubuntu 16.04
    9/14/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5687
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4559
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3788
    2300Canon Inc.
    30-2
    Shimomaruko 3-chome
    Ohta-ku, Tokyo 146-8501
    Japan

    Hiroyuki Takahashi
    oipcertg@jp.canon.com
    +81-3-3758-2111
    Fax: +81-3-3758-1160

    DRBG Library on Canon MFP Security Chip

    V01L01R02 (Firmware)


    The DRBG Library provides cryptographic services for Canon MFP Security Chip.

      • ARM Cortex-M3
    9/14/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4547
    2299Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Cavium Octeon CN7240
    9/14/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5683
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4555
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3784
    2298Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products.

      • N/A
    9/14/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5682
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4554
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3783
    2297
    9/14/2018
      2296Symantec Corporation
      350 Ellis Street
      Mountain View, CA 94043
      USA

      Ian Hall
      ian_hall@symantec.com
      703-598-6876

      Diana Robinson
      diana_robinson@symantec.com
      845-454-6397

      Web Isolation Cryptographic Library

      1.0


      The Web Isolation Cryptographic Library provides the necessary cryptographic services specifically for use in the Web Isolation Virtual Appliance.

        • Intel E5 4620v4 w/ Ubuntu 14.04 on ESXi 6.0
      9/14/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5678
      2295Sonus Networks, Inc.
      4 Technology Park Drive
      Westford, MA 01886
      USA

      Adam Elshama
      aelshama@rbbn.com
      1-855-GO-SONUS
      Fax: 978-614-8101

      Keith Conger
      KConger@rbbn.com
      1-855-GO-SONUS
      Fax: 978-614-8101

      Sonus Cryptographic Library

      3.1 (Firmware)


      Sonus Session Border Controller FIPS-validated cryptographic software module

        • Intel Xeon (Ivy Bridge)
      9/14/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5677
      2294Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon E5-2609
      9/7/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5675
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4546
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3777
      2293Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon E5-2680
      9/7/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5674
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4545
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3776
      2292Dell, Inc
      5450 Great America Parkway
      Santa Clara, CA 95054
      US

      Srihari Mandava
      srihari_mandava@dell.com

      Dell OpenSSL Cryptographic Library

      2.4


      Dell OpenSSL Cryptographic Library v2.4 provides a variety of cryptographic services used by Dell's Data Center hardened Dell Networking OS management and routing features.

        • Intel Atom C2000 w/ Dell EMC Networking OS 9.12(1.0)
      9/7/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5673
      2291NETSCOUT Systems, Inc.
      310 Littleton Road
      Westford, MA 01886
      USA

      Steve Swidrak
      Stephen.Swidrak@netscout.com

      NetScout FIPS Object Module

      1.0


      This cryptographic library provides cryptographic services to NETSCOUT products.

        • Intel Xeon X5620 with AES-NI w/ Linux 2.6.39.1
        • Intel Xeon E5 Series with AES-NI w/ Linux 3.7.5
        • Intel Xeon E5-2608L v3 with AES-NI w/ ArbOS 7.0
        • Intel Xeon E5-2697 v3 with AES-NI w/ Linux 3.10
      9/4/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5669
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4543
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3774
      2290Klas Telecom
      1101 30th Street NW, Suite 500
      Washington, DC 20007
      USA

      Toby Stidham
      toby.stidham@klastelecom.com
      352-406-0560

      Cian Masterson
      cian.masterson@klastelecom.com

      OpenSSL 1.0.1h without a FIPS object module

      1.0.1h


      Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

        • Marvell Prestera 98DX8212 w/ Linux 3.10.70
      9/4/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5668
      2289KeyPair Consulting Inc.
      846 Higuera Street
      Suite 2
      San Luis Obispo, CA 93401
      USA

      Mark Minnoch
      mark@keypair.us
      805-316-5024

      Steve Weymann
      steve@keypair.us
      805-316-5024

      KeyPair Cryptographic Module for OpenSSL

      2.0.16


      The KeyPair Cryptographic Module for OpenSSL expands the list of Tested Configurations (operating system + processor) for the OpenSSL FIPS Object Module v2.0. Please contact KeyPair Consulting to include your desired operating system as a Tested Configuration on a FIPS 140-2 certificate branded in your company's name.

        • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 6
        • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 7
        • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 7
        • Nvidia Tegra X1 with PAA w/ Android 8.1
        • Nvidia Tegra X1 without PAA w/ Android 8.1
        • Intel Xeon E5-2430L (x86) with PAA w/ Ubuntu 16.04
        • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 6
        • Intel Xeon E5-2430L (x86) without PAA w/ Ubuntu 16.04
      9/4/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5667
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4541
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3772
      2288Extreme Networks
      6480 Via Del Oro
      San Jose, CA 95119
      USA

      Sunil Chitnis
      schitnis@extremenetworks.com
      408-352-2407

      Joey Salanga
      jsalanga@extremenetworks.com
      408-352-2439

      Extreme FIPS Cryptographic Library

      2.1 (Firmware)


      The Extreme cryptographic library implements crypto operations in software. This library is present in VDX switch. Applications running in the switch uses the cryptographic library for security and crypto operations.

        • Freescale E500mc
      9/4/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5666
      2287Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Kevin Meagher
      kmeagher@ciena.com
      1-410-865-8936

      OpenSSL FIPS Object Module

      2.0.12


      Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

        • Cavium OCTEON II CN6xxx w/ SAOS 6.17
      8/27/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5665
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3770
      2286FP InovoLabs GmbH
      Prenzlauer Promenade 28
      Berlin, Berlin 13089
      Germany

      Janos Laube
      j.laube@francotyp.com
      +49 30 220660 397

      Hasbi Kabacaoglu
      h.kabacaoglu@francotyp.com
      +49 30 220660 656

      NpsdCrypto

      N-PSD rev. 04 1.0 (Firmware)


      nRevenector Cryptographic Library

        • Maxim MAX32590
      8/27/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
      2285Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Ahmer Sabri
      ahmer@google.com
      201-341-1408

      Hotplug Cryptographic Module Firmware

      1.0 (Firmware)


      C implementation of AES-ECB encryption, C implementation of NIST SP 800-90A Revision 1 CTR_DRBG

        • NIC Processor, FW runtime environment
      8/27/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5659
      2284Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 NSS without AES-NI

      R7-2.0.0


      Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      8/27/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4535
      2283Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      securitycertifications@gemalto.com

      SafeNet Accelerated Cryptographic Library

      1.0 (Firmware)


      The SafeNet Accelerated Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

        • Andretta 2.0
      8/17/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5652
      2282ECI Telecom Ltd
      30 Hasivim Street
      Petach Tikvah 49517
      Israel

      Milind Barve
      milind.barve@ecitele.com
      +91-80-67122000
      Fax: +91-80-67122001

      ECI (OS) Crypto Library

      2.0.16


      ECI (OS) Crypto Library

        • PowerPC w/ Linux
      8/17/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5651
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4532
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3765
      2281SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply Server Engine

      2.1


      SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Windows Server 2012 R2
        • Intel i7 w/ Red Hat Enterprise Linux 7
      8/17/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5650
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4531
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3764
      2280IBM Corporation
      1701 North Street
      Endicott, NY 13760
      USA

      AIX FIPS Security
      aixfips@in.ibm.com

      AIX FIPS Crypto Module for OpenSSL

      2.0.16


      The AIX FIPS Crypto Module for OpenSSL is supported on AIX for the Power 7, Power 8 and Power 9 platforms.

        • IBM Power9 (PPC) without PAA w/ AIX 7.2 64-bit
        • IBM Power9 (PPC) with PAA w/ AIX 7.2 32-bit
        • IBM Power9 (PPC) with PAA w/ AIX 7.2 64-bit
        • IBM Power9 (PPC) without PAA w/ AIX 7.2 32-bit
      8/17/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5649
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4530
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3763
      2279Cambium Networks
      3800 Golf Road
      Suite 360
      Rolling Meadows, IL 60008
      USA

      Mark Thomas
      mark.thomas@cambiumnetworks.com
      +44 1364 655500
      Fax: +44 1364 654625

      Nithin Kotekar
      nithin.kotekar@cambiumnetworks.com
      +91 080 67333162

      PTP700-NIST-CTR-DRBG

      01.00 (Firmware)


      NIST_CTR_DRBG follows implementation based on NIST SP 800-90 CTR_DRBG (Random Number Generator) March 2007 Section 10.2.1 and produces deterministic random bits. This is configured to AES 128 bits with Derivation Function based on Section 10.4.2.

        • TI TMS320C6657 - Multicore Fixed and Floating-Point DSP
      8/17/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5648
      2278Konica Minolta, Inc.
      2970, Ishikawa-machi
      Hachioji-shi, Tokyo 192-8505
      Japan

      R&D Administration Division, R&D Headquarters Business Techn

      Konica Minolta PP Crypto Library

      1.2 Rev.1 (Firmware)


      Konica Minolta PP Crypto Library is used in AccurioPress C6100 / C6085 and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generataion/verification, AES, hash function including SHA and HMAC_DRBG.

        • Intel(R) Core(TM) i5-4570S
      8/17/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3760
      2277Blue Cedar
      325 Pacific Avenue
      San Francisco, CA 94111
      USA

      FIPS Admin
      fips@bluecedar.com
      415-329-0401

      Blue Cedar Cryptographic Module

      2.0.16


      The Blue Cedar Cryptographic Module is a general purpose cryptographic module integrated in Blue Cedar's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Nvidia Tegra X1 with PAA w/ Android 8.1
        • Nvidia Tegra X1 without PAA w/ Android 8.1
        • Intel Xeon E5 with PAA w/ Blue Cedar OS 1.0
        • Intel Xeon E5 without PAA w/ Blue Cedar OS 1.0
      8/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5644
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4526
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3759
      2276Q Core Medical Ltd.
      29 Yad Harutsim St.
      Netanya 4250529
      Israel

      Nimrod Schweitzer
      nimrod.schweitzer@qcore.com
      +972-73-2388839
      Fax: +972-73-2388800

      Lee Aydelotte
      laydelotte@silexamerica.com
      801-676-8673
      Fax: 714-258-0730

      QCore OpenSSL FIPS Object Module 2.0.9

      2.0.9


      QCore OpenSSL FIPS Object Module 2.0.9 is used within various QCore Infusion Pumps for providing secure communication between Infusion pumps and an external server.

        • NXP i.MX280 ARM w/ Linux 2.6.35
      8/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5643
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4525
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3758
      2275Sony Imaging Products & Solutions Inc.
      1-7-1 Konan
      Minato-ku, Tokyo 108-0075
      JAPAN

      Toshiaki Ouchi
      sips-pssg-b2b-fipsinfo@sony.com
      +81 50 3140 9893

      Hirokazu Morishita
      sips-pssg-b2b-fipsinfo@sony.com
      +81 50 3140 1739

      Sony IMB DRBG Core-SH

      1.0.0 (Firmware)


      Sony IMB DRBG Core-SH is the firmware module for digital cinema system.

        • Renesas Electronics Corporation SH7724
      8/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4522
      2274Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK shassse3 Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      8/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4521
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3755
      2273Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK shagen Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      8/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4520
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3754
      2272Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK shaavx2 Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      8/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4519
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3753
      2271Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK shaavx Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      8/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4518
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3752
      2270Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK aesni Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      8/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5635
      2269Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK aesgen Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      8/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5634
      2268Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK aesasm Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      8/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5631
      2267Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK aesni Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
      8/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5630
      2266Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK shassse3 Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      8/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4517
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3751
      2265Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK shagen Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      8/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4516
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3750
      2264Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK shaavx2 Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      8/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4515
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3749
      2263Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK shaavx Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      8/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4514
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3748
      2262Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK aesni Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      8/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5627
      2261Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK aesgen Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      8/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5624
      2260Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK aesasm Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      8/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5621
      2259Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK shagen Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
      8/2/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4513
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3747
      2258Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK shassse3 Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
      8/2/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4512
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3746
      2257Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK shaavx2 Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
      8/2/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4511
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3745
      2256Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK shaavx Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
      8/2/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4510
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3744
      2255Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK aesgen Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
      8/2/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5617
      2254Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 UEK aesasm Implementation

      R6-1.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
      8/2/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5614
      2253Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      66005f41fbc3529ffe8d007708756720529da20d


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • POWER9 with PAA w/ Ubuntu Linux 18.04
        • POWER9 without PAA w/ Ubuntu Linux 18.04
        • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
      8/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5612
      2252Feitian Technologies Co., Ltd.
      Floor 17, Tower B, Huizhi Mansion
      No.9 Xueqing Road
      Haidian, Beijing 100085
      China

      Mr. PENG Jie
      pengjie@ftsafe.com
      +8610 62304466ext419
      Fax: +8610 62304477

      Mr. JU Wensheng
      wensheng@ftsafe.com
      +8610 62304466ext527
      Fax: +8610 62304477

      Feitian-FIPS-COS Hardware Cryptographic Library

      1.0 (Firmware)


      The Feitian-FIPS-COS Hardware Cryptographic Library provides cryptographic algorithm support to the Feitian-FIPS-COS cryptographic module.

        • ST23YT66
      8/2/2018
      • Counter:
        • Modes: 3KeyTDEA
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: TDES #2824
      2251BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.2


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • ARMv8 w/ Android 8.1.2 on Venturi K502 Android tablet manufactured by Infomark
      8/2/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5609
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4506
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-512
        • Prerequisite: HMAC #3742
      2250BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.2


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • ARMv8 w/ Android 6.0.1 on BlackBerry Priv
      8/2/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5608
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4505
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-512
        • Prerequisite: HMAC #3741
      2249Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.2R1 QuickSec-MX104

      Junos OS 18.2R1 (Firmware)


      MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

        • Freescale P5021
      8/2/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3739
      2248Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.2R1 OpenSSL-MX104

      Junos OS 18.2R1 (Firmware)


      MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

        • Freescale P5021
      8/2/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3738
      2247Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.2R1 MX104-Kernel

      Junos OS 18.2R1 (Firmware)


      MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

        • Freescale P5021
      8/2/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3736
      2246Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4499
      2245Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4498
      2244Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      3218c1db82718a54e4d41de493d006eaa3ba445c


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • POWER9 with PAA w/ Ubuntu Linux 18.04
        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
        • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
        • POWER9 without PAA w/ Ubuntu Linux 18.04
      7/27/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5598
      2243Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (shassse3) - generic CPU

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: SHS #4495
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3732
      2242Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (shagen) - generic CPU

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4494
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3731
      2241Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (shaavx2) - generic CPU

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4493
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3730
      2240Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (shaavx) - generic CPU

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: SHS #4492
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3729
      2239Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (aesni) - generic CPU

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5594
      2238Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (aesgen) - generic CPU

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5592
      2237Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (aesasm) - generic CPU

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5590
      2236Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4491
      2235Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5586
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4490
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3727
      2234Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4489
      2233Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5584
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4488
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3725
      2232Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5583
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4487
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3724
      2231Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5582
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4486
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3723
      2230Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5581
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4485
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3722
      2229Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5580
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4484
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3721
      2228Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5579
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4483
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3720
      2227Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5578
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4482
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3719
      2226Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5577
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4481
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3718
      2225Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5576
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4480
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3717
      2224Allegro Software Development Corporation
      1740 Massachusetts Avenue
      Boxborough, MA 01719
      USA

      Bob Van Andel
      bva@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Loren Shade
      loren@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Allegro Cryptographic Engine using the EYL QRNG

      6.31


      The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

        • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
        • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4478
      2223Allegro Software Development Corporation
      1740 Massachusetts Avenue
      Boxborough, MA 01719
      USA

      Bob Van Andel
      bva@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Loren Shade
      loren@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Allegro Cryptographic Engine

      6.31


      The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

        • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
        • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
      7/27/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4477
      2222Secure-IC
      15 Rue Claude Chappe
      Bât. B ZAC des Champs Blancs
      Cesson-Sévigné, N.A 35510
      France

      karine lorvellec
      karine.lorvellec@secure-ic.com
      +33 2 99 12 18 72

      florent lozach
      florent.lozach@secure-ic.com
      +33 2 99 12 18 72

      Secure-IC's hardware True Random Number Generator

      2.0


      Secure-IC's hardware True Random Number Generator produces a high quality stream of random data. It embeds a fully digital entropy source that provides seeds for an internal DRBG that strictly follows SP800-90A requirements. The whole system delivers random data to be used by various applications, including secure schemes.

        • N/A
      7/27/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5572
      2221Entrust Datacard Corporation
      Two Lincoln Centre
      5420 LBJ Freeway Suite 300
      Dallas, TX 75240
      USA

      John Gray
      John.Gray@entrustdatacard.com

      John Mahoney
      John.Mahoney@entrustdatacard.com

      Entrust Authority™ Security Toolkit for the Java® Platform DRBG 1.0

      1.0


      The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

        • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
      7/20/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-512
        • Prerequisite: SHS #4475
      2220HP Inc.
      11311 Chinden Blvd
      Boise, Idaho 83714-0021
      USA

      Gerardo Colunga
      gerardo.del.colunga@hp.com
      208-333-5607

      Chris Gunning
      chris.gunning@hp.com
      208-333-6785

      HP FutureSmart QuickSec

      5.1 (Firmware)


      HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

        • Arm Cortex-A8
      7/20/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5567
      2219Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • Intel Core i5 w/ Windows 10 rs3 32 bits
      7/20/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5566
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3710
      2218Curtiss-Wright Controls, Inc.
      2600 Paramount Place, Suite 200
      Fairborn, OH 45324
      USA

      Paul Davis
      pdavis@curtisswright.com
      937-252-5601 x 1363
      Fax: 937-252-2729

      Rich Langley
      rlangley@curtisswright.com
      937-610-5455
      Fax: 937-252-1465

      Curtiss-Wright Controls SW libgcrypt

      5.0


      The libgcrypt software implementation provides cryptographic functionality supporting the CentOS operating system.

        • Intel Atom E3845 w/ CentOS 7.5
        • Intel Core i5-4402E w/ CentOS 7.5
      7/20/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3709
      2217HP Inc.
      11311 Chinden Blvd
      Boise, Idaho 83714-0021
      USA

      Gerardo Colunga
      gerardo.del.colunga@hp.com
      208-333-5607

      Chris Gunning
      chris.gunning@hp.com
      208-333-6785

      HP FutureSmart OpenSSL FIPS Object Module

      2.0.4 (Firmware)


      HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

        • Arm Cortex-A8
      7/20/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5563
      2216Nutanix
      1740 Technology Drive, Suite 150
      San Jose, CA 95110
      USA

      Eric Hammersley
      fips@nutanix.com

      Ashutosh Pangasa
      fips@nutanix.com

      Nutanix Cryptographic Library for OpenSSL

      1.0


      The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

        • Intel E5-2620 w/PAA w/ CentOS 7.4
      7/20/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5562
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4465
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3708
      2215Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • AMD Ryzen5 w/ Windows 2016 64 bits
      7/20/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5560
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3707
      2214Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • Intel Core i5 w/ Windows 10 rs3 64 bits
      7/20/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5559
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3706
      2213Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • Intel Core i5 w/ Mac OS 10.13
      7/20/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5558
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3705
      2212Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • Intel Core i5 w/ CentOS 7.4 64 bits
      7/20/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5557
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3704
      2211Trend Micro Inc.
      8F, No. 198, Tun Hua S. Rd., Sec. 2
      Taipei, na 106
      Taiwan

      Phoenix Liau
      Phoenix_Liau@trend.com.tw
      +886-2-23789666

      Harvey Lee
      Harvey_Lee@trend.com.tw

      Trend Micro Cryptographic Module Core Library

      1.0


      Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

        • AMD A10-7300 RADEON w/ CentOS 7.4 32 bits
      7/20/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5556
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3703
      2210Elster GmbH
      Strothweg 1
      Lotte (Buren) 49504
      Germany

      Michael Habermann
      michael.habermann@honeywell.com
      +49-541-1214-215
      Fax: +49-541-1214-595

      Markus Bölter
      markus.boelter@honeywell.com
      +49-541-1214-114
      Fax: +49-541-1214-595

      elster_cv

      02.02.01 (Firmware)


      elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters.

        • STM32L152RE
      7/20/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5555
      2209Gigamon Inc.
      3300 Olcott Street
      Santa Clara, CA 95054
      USA

      Bhanu Parlapalli
      bhanu.parlapalli@gigamon.com

      Gigamon Linux-Based Cryptographic Module

      1.0 (Firmware)


      The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

        • Intel Atom C Series
        • P2020
        • P2041
      7/13/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5554
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4457
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3702
      2208International Business Machines
      1702 North Street
      Building 256-3
      Endicott, NY 13760
      USA

      Brian W. Hugenbruch
      bwhugen@us.ibm.com
      607-429-3660

      IBM z/VM System SSL

      V6.4


      z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files.

        • IBM z13 w/ IBM z/VM V6.4
      7/13/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-512
        • Prerequisite: SHS #4456
      2207SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply Server Engine

      2.1


      SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel Atom Rangeley & Intel Xeon Broadwell w/ ArubaOS-CX 10.01
      7/13/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5552
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4455
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3700
      2206Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (shassse3)

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      7/13/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: SHS #4454
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3699
      2205Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (shagen)

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      7/13/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4453
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3698
      2204Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (shaavx2)

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      7/13/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4452
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3697
      2203Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (shaavx)

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      7/13/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: SHS #4451
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3696
      2202Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (aesni)

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      7/13/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5548
      2201Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (aesgen)

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      7/13/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5546
      2200Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Linux Kernel crypto API (aesasm)

      6.0


      Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      7/13/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5545
      2199Sierra Nevada Corporation
      444 Salomon Circle
      Sparks, NV 89434
      USA

      Kevin Streander
      Kevin.Streander@sncorp.com
      303-566-9687
      Fax: 775-331-0370

      Red Hat OpenSSL (64bit)

      5.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

        • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
      7/13/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5544
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4450
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3695
      2198Sierra Nevada Corporation
      444 Salomon Circle
      Sparks, NV 89434
      USA

      Kevin Streander
      Kevin.Streander@sncorp.com
      303-566-9687
      Fax: 775-331-0370

      Red Hat NSS Softoken (64bit)

      5.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64 bit word size.

        • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
      7/13/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4449
      2197Geotab Inc.
      2440 Winston Park Drive
      Oakville, Ontario L6H 7V2
      Canada

      Alex Sukhov
      embeddedsecurity@geotab.com

      Geotab Cryptographic Module

      1.0 (Firmware)


      Geotab Cryptographic Module provides a library of functions to perform general purpose cryptographic services.

        • NXP S32K14X
        • Microchip DSPIC33E
      7/13/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3693
      2196Gigamon Inc.
      3300 Olcott Street
      Santa Clara, CA 95054
      USA

      Bhanu Parlapalli
      bhanu.parlapalli@gigamon.com

      Gigamon Linux-Based Cryptographic Module

      1.0


      The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

        • P2020 w/ CentOS 5.8
        • P2041 w/ CentOS 5.8
        • Intel Atom C Series w/ CentOS 6.6
      7/13/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5541
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4447
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3692
      2195Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Allen Ting
      yting@juniper.net
      408-858-5008

      Mounir Hahad
      mhahad@juniper.net

      CryptoCore

      1.0


      Cryptographic module to support the cryptographic functionalities for Juniper products.

        • Intel Core i5 w/ Ubuntu Linux 14.04
        • Intel Xeon (Virtual CPU) w/ Ubuntu Linux 14.04 on VMWare ESXi 6
        • Intel Xeon E5 family w/ Ubuntu Linux 14.04
      7/13/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5540
      2194BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.2


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • Intel Xeon w/ IBM Java 1.8 on Red Hat Enterprise Linux 7
        • Intel Xeon w/ Oracle JRE 1.8 on Windows Server 2016 on VMware ESX 6.5
        • Intel Xeon w/ Oracle JRE 1.8 on SUSE Linux Enterprise 11 on VMware 4.1.5
        • Intel Xeon w/ Oracle JRE 1.8 on Ubuntu Linux 16.04 on VMware ESX 4.1.5
      7/13/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5539
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4445
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-512
        • Prerequisite: HMAC #3690
      2193Konica Minolta, Inc.
      2970, Ishikawa-machi
      Hachioji-shi, Tokyo 192-8505
      Japan

      R&D Administration Division, R&D Headquarters Business Techn

      Konica Minolta PP Crypto Library

      1.1 Rev.1 (Firmware)


      Konica Minolta PP Crypto Library is used in AccurioPress C2060/C2070, AccurioPrint C2060L and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generataion/verification, AES, hash function including SHA and HMAC_DRBG.

        • Intel(R) Core(TM) i5-4570S
        • Intel(R) Pentium G3420
      7/13/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3689
      2192Infosec Global Inc.
      2225 Sheppard Avenue East
      Suite 1402
      Toronto, Ontario M2J 5C2
      Canada

      Brian Neill
      brian.neill@infosecglobal.com
      416-492-3333
      Fax: 647-343-6933

      Ian Laidlaw
      ian.laidlaw@infosecglobal.com
      416-492-3333
      Fax: 647-343-6933

      AgileSec FIPS Provider 1.0

      1.0


      AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards.

        • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
        • Intel Core i5 CPU with AES-NI w/ OSX 10.12
        • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
        • Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
        • Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
        • Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
        • Intel Core i5 CPU without AES-NI w/ OSX 10.12
        • Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
        • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
        • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
        • Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
      7/13/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3686
      2191Accellion, Inc.
      1804 Embarcadero Road
      Suite 200
      Palo Alto, Ca 94303
      USA

      Frank Balonis
      frank.balonis@accellion.com
      650-485-4300

      Sim Han Seah
      hanseah@accellion.com
      +65 6244 5678

      Accellion Cryptographic Module

      2.0.16


      The Accellion Cryptographic Module is a general purpose cryptographic module integrated in Accellion’s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Intel Xeon E5 without PAA w/ CentOS 6
        • Intel Xeon E5 with PAA w/ CentOS 6
      7/6/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5533
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4440
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3685
      2190SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply for Java

      3.0.1


      SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
        • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
      7/6/2018
      • Counter:
        • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5532, TDES #2785
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4439
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3684
      2189Virtual Instruments
      2331 Zanker Road
      San Jose, CA 95131
      USA

      Susanta Pattanayak
      Susanta.pattanayak@virtualinstruments.com
      +1 408 579 4000

      Jay Nitikman
      Jay.nitikman@virtualinstruments.com
      +1 408 579 4000

      Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

      v5.7 (Firmware)


      The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

        • Intel Broadwell Xeon without AES-NI
      6/29/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5528
      2188Cisco Systems, Inc.
      170 W. Tasman Drive
      San Jose, CA 95134
      USA

      Global Certification Team
      certteam@cisco.com

      Adaptive Security Appliance (ASA)

      9.6


      The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

        • Intel Core i5 w/ ASA OS 9.6 w/ ESXi 6.0
      6/29/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-512
        • Prerequisite: SHS #4435
      2187Harris Corporation
      1680 University Avenue
      Rochester, NY 14610
      USA

      Chris Wood
      cwood06@harris.com
      585-720-8730
      Fax: 585-241-8459

      Esther Betancourt
      ebetanco@harris.com
      585-242-3635
      Fax: 585-241-8459

      Harris Broadband Ethernet Radio GPP Cryptographic Library

      6.0 (Firmware)


      This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products

        • Broadcom XLS108
      6/29/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-256
        • Prerequisite: SHS #4434
      2186Broadcom Limited
      1320 Ridder Park Drive
      San Jose, CA 95131
      USA

      Avinash Mahajan
      (408) 433-7461

      Secr_trng_800_90ab_vc1

      1.0 (Firmware)


      Low power hardware implementation of cryptographically secure random number generator. It contains a CTR based DRBG which conforms to SP800-90A and an entropy source with built-in entropy testing which conforms to SP800-90B.

        • Synopsys VCS 2017.03-SP2
      6/29/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #3913
      2185Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone Controller Java Crypto Library

      1.0


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on VMware ESXi 6.5.0
        • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
      6/29/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4375
      2184Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Ingrid Barker
      ibarker@juniper.net

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      18.1R1 - OpenSSL

      18.1R1 (Firmware)


      The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Intel Xeon E312xx Sandy Bridge
      6/29/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3677
      2183Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - OpenSSL

      17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7020)
      6/29/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3676
      2182Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Ingrid Barker
      ibarker@juniper.net

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      18.1R1 - Kernel

      18.1R1 (Firmware)


      The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Intel Xeon E312xx Sandy Bridge
      6/29/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3674
      2181Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (3305)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Xeon E5
      6/29/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5513
      2180Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (2101)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Xeon D
      6/29/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5512
      2179Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (1101)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Pentium D
      6/29/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5511
      2178Virtual Instruments
      2331 Zanker Road
      San Jose, CA 95131
      USA

      Susanta Pattanayak
      Susanta.pattanayak@virtualinstruments.com
      +1 408 579 4000

      Jay Nitikman
      Jay.nitikman@virtualinstruments.com
      +1 408 579 4000

      Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

      v5.7 (Firmware)


      The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

        • Intel Broadwell Xeon with AES-NI
      6/22/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5508
      2177Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      OpenSSL - EX4300

      Junos OS 17.4 R1-S4 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

        • Freescale e500mc
      6/22/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3665
      2176Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Kernel - EX4300

      Junos OS 17.4 R1-S4 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

        • Freescale e500mc
      6/22/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3664
      2175Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI shaavx Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      6/22/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4418
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3662
      2174Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI shamb Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      6/22/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: SHS #4417
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3661
      2173Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 RE1800 - OpenSSL

      Junos OS 18.1R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/22/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3657
      2172Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 RE1800 - Quicksec

      Junos OS 18.1R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/22/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3655
      2171Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 RE1800 - Kernel

      Junos OS 18.1R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/15/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3653
      2170Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 17.4R1-S1 RE1800-Quicksec

      Junos OS 17.4 R1-S1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/15/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3652
      2169Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 17.4R1-S1 RE1800-OpenSSL

      Junos OS 17.4 R1-S1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/15/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3650
      2168Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 17.4R1-S1 RE1800-Kernel

      Junos OS 17.4 R1-S1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/15/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3648
      2167Silvus Technologies
      10990 Wilshire Blvd.
      STE 1500
      Los Angeles, CA 90024
      USA

      Ajit Warrier
      ajit@silvustechnologies.com
      310-479-3333 ext 41
      Fax: 310-479-2225

      Weijun Zhu
      weijun@silvustechnologies.com
      310-479-3333 ext 27
      Fax: 310-479-2225

      Silvus Crypto Module

      3.15.1 (Firmware)


      The Silvus Crypto Library implements cryptographic functions for use in Silvus Technologies SC4000 Series mesh radios.

        • Xilinx Zynq-7000
      6/15/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5496
      2166Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI shaavx2 Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      6/15/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4405
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3646
      2165Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI aesni Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      6/15/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5492
      2164Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI aesgen Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      6/15/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5490
      2163Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI aesasm Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      6/15/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5488
      2162CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security Cryptographic Library for Windows

      1.0


      The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

        • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
      6/15/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5487
      2161CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security Cryptographic Library for Linux

      1.0


      The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

        • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
      6/15/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5486
      2160Securosys SA
      Forrlibuckstrasse 70
      Zurich, Zurich 8005
      Switzerland

      Marcel Dasen
      dasen@securosys.ch
      +41 44 552 31 33

      Robert Rogenmoser
      roro@securosys.ch
      +41 44 552 31 11

      Primus HSM Cryptographic Library

      XC7K160T 2.5.3 (Firmware)


      Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

        • Marvell Armada XP PJ4Bv7
      6/15/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5485
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-512
        • Prerequisite: HMAC #3643
      2159Trend Micro Inc.
      11305 Alterra Parkway
      Austin, TX 78758
      USA

      Paul Tucker
      paul_tucker@trendmicro.com
      512-633-7945

      Trend Micro, TippingPoint Crypto Core OpenSSL

      2.0.13


      The Trend Micro TippingPoint, Threat Protection System (TPS) Crypto Module is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for Trend Micro TippingPoint security products.

        • Intel Core i3 without AES-NI w/ Linux 4.4
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on KVM 1.5.3 on Red Hat Enterprise Linux (RHEL)7
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 5.5
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.5
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.0
        • Intel Xeon E5 with AES-NI w/ Linux 4.4
      6/15/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5484
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4401
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3640
      2158Arista Networks Inc.
      5453 Great America Pkwy
      Santa Clara, CA 95054
      USA

      Richard Whitney
      rw@arista.com
      703-627-6092
      Fax: 408-538-8920

      Ethan Rahn
      erahn@arista.com
      408-547-5825

      EOS MACsec Hybrid Firmware v1.0

      1.0 (Firmware)


      The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

        • Intel Xeon E3
        • AMD GX Series
        • Intel Pentium B9
        • Intel Xeon D-1500
        • AMD GE Series
      6/15/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5482
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4399
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3636
      2157Pure Storage, Inc.
      650 Castro Street
      Suite 400
      Mountain View, CA 94041
      USA

      John Fuchigami
      jfuchigami@purestorage.com
      800-379-7873

      Ram Lakshminarayanan
      rlakshminarayanan@purestorage.com
      800-379-7873

      Flash Array Crypto Library

      1.2.0


      Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel Xeon x64 CPU with AES-NI (E5 Family) w/ Purity 5
        • Intel Xeon CPU with AES-NI (Scalable Processor Family: Silver and Gold) w/ Purity 5
      6/15/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5480
      2156DELL, Inc.
      One Dell Way
      Round Rock, Texas 78682
      USA

      Alaric Silveira
      Alaric.Silveira@dell.com
      TBD

      Dell Crypto Library for Dell iDRAC and Dell CMC

      2.4


      The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

        • SH7758 w/ Linux 3.16.47
      6/15/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5478
      2155DELL, Inc.
      One Dell Way
      Round Rock, Texas 78682
      USA

      TBD
      TBD
      TBD

      Dell Crypto Library for Dell iDRAC and Dell CMC

      2.4


      The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

        • 440EPX w/ Linux 4.9.31
      6/15/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5477
      2154ViaSat, Inc.
      6155 El Camino Real
      Carlsbad, CA 92009
      USA

      David Suksumrit
      david.suksumrit@viasat.com
      760-476-2200
      Fax: 760-929-3941

      Lorenzo Page
      lorenzo.page@viasat.com
      760-893-4198

      EbemCrypto

      13 (Firmware)


      Implements key establishment, random number generation, certificate and private key management, and wrap/unwrap of key material, and controls the FPGA implementation of traffic encryption in Viasat's Enhanced Bandwidth Efficient Modem (EBEM).

        • IBM PowerPC 405GPr
      6/15/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5475
      2153Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      CLint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • PPCe500
        • Intel Xeon w/ ESXI 6.0
      6/8/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5474
      2152Renesas Electronics America Inc.
      1001 Murphy Ranch Road
      Milpitas, CA 95035
      USA

      Mark Schaeffer
      mark.schaeffer@renesas.com
      408-588-5529

      Nick Mori
      Nick.mori@renesas.com
      408-588-6621

      Synergy HW DRBG for Synergy S5 and S7 series MCU devices

      Secure Crypto Engine 7


      The Secure Crypto Engine provides a variety of cryptographic services with hardware acceleration that is strictly managed within the security enclave.

        • N/A
      6/8/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5384
      2151Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 NSS without AES-NI

      R6-1.0.0


      Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      6/8/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4391
      2150Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone Controller Java Crypto Library

      1.0 (Firmware)


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
        • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
      6/8/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4351
      2149Samsung Electronics Co., Ltd
      416 Maetan-3dong, Yeongtong-gu
      Suwon, Gyeonggi 152-848
      South Korea

      Jung Ha Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Brian Wood
      be.wood@samsung.com
      +1-973-440-9125

      Samsung BoringSSL Cryptographic Module

      v1.2.1


      The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

        • Qualcomm SDM845 w/ Android 8.1
        • Samsung Electronics Exynos 9810 w/ Android 8.1
        • Qualcomm MSM8998 w/ Android 8.1
        • Qualcomm SDM450 w/ Android 8.1
      6/8/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5468
      2148Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.1R1 MTRE-QuickSec

      Junos OS 18.1R1 (Firmware)


      Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

        • Intel Xeon CPU E5
      6/8/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3625
      2147Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.1R1 MTRE-OpenSSL

      Junos OS 18.1R1 (Firmware)


      Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

        • Intel Xeon CPU E5
      6/8/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3624
      2146Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.1R1 MTRE-Kernel

      Junos OS 18.1R1 (Firmware)


      Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

        • Intel Xeon CPU E5
      6/8/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3623
      2145Futurex
      864 Old Boerne Road
      Bulverde, TX 78163
      USA

      Futurex Security Certifications
      certifications@futurex.com
      830-980-9782

      Futurex Cryptographic Engine

      6.2.0.1 (Firmware)


      The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

        • TI AM3352
      6/8/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5464
      2144SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5 for TZ, NSA and SuperMassive

      6.5.2 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN62XX)
        • Cavium Octeon II (CN66XX)
        • Cavium Octeon II (CN68XX)
        • Cavium Octeon III (CN70XX)
        • Cavium Octeon III (CN71XX)
      6/8/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4383
      2143Hitachi, Ltd.
      322-2 Nakazato
      Odawara-shi, Kanagawa-ken 250-0872
      Japan

      Hitachi, Ltd. Block Storage System Development Dept.

      Hitachi Flash Module Drive HDE Encryption Engine

      1CK658 and PM8607B1-F3EI J0J0 (Firmware)


      Hitachi Flash Module Drive HDE Encryption Engine provides the cryptographic functionality found in Hitachi Flash Module Drive HDE.

        • 1CK658 and PM8607B1-F3EI
      6/1/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4382
      2142Juniper Networks, Inc
      1133 Innovation Way
      Sunnyvale, California 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 QFX10K-OpenSSL

      Junos OS 18.1R1 (Firmware)


      The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

        • Intel Xeon E3
      6/1/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3617
      2141Juniper Networks, Inc
      1133 Innovation Way
      Sunnyvale, California 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 QFX10K-Kernel

      Junos OS 18.1R1 (Firmware)


      The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

        • Intel Xeon E3
      6/1/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3615
      2140REDCOM Laboratories, Inc
      One REDCOM Center
      Victor, NY 14564-0995
      United States

      Sal Ceravolo
      Sal.ceravolo@redcom.com
      585-905-0451

      Chris Hasenauer
      Chris.hasenauer@redcom.com
      585-905-0451

      REDCOM Encryption 140-2

      3.0.1


      REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

        • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
        • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
      6/1/2018
      • Counter:
        • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5457, TDES #2744
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4377
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3614
      2139Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Junos OS 18.1R1 QuickSec

      Junos OS 18.1R1 (Firmware)


      The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

        • Intel(R) Xeon(R) CPU E5
      5/25/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3613
      2138Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Junos OS 18.1R1 OpenSSL

      Junos OS 18.1R1 (Firmware)


      The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

        • Intel(R) Xeon(R) CPU E5
      5/25/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3612
      2137KeyNexus, Inc.
      205-2657 Wilfert Road
      Victoria, BC V9B6A7
      Canada

      Jason Novecosky
      jason@keynexus.net

      KeyNexus Cryptographic Library

      1.0


      The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

        • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
      5/25/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5453
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4373
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3611
      2136Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Junos OS 18.1R1 Kernel

      Junos OS 18.1R1 (Firmware)


      The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

        • Intel(R) Xeon(R) CPU E5
      5/25/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3609
      2135Hypersecu Information System Inc
      #206-6191 Westminster Hwy
      Richmond, BC V7C 4V4
      Canada

      James Li
      james@hypersecu.com
      (604) 279-2000
      Fax: (604) 272-1233

      HYP ALG Library

      V1.0 (Firmware)


      The HYP ALG Library contains algorithms are as follows: the AES, TDES, CMAC, KDF, SHA, RSA, ECDSA, DRBG.

        • HSC32K1
      5/25/2018
      • Counter:
        • Modes: 3KeyTDEA
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: TDES #2740
      2134Taisys Technologies Co. Ltd.
      7F., No.56, Lane 321
      Yangguang St., Neihu Dist.
      Taipei, Taipei 11491
      Taiwan (R.O.C.)

      Joe Wang
      joe.wang@taisys.com
      +886-2-26270927x6699
      Fax: +886-2-26270619

      Kent Horng
      kent.horng@taisys.com
      +886-2-26562185 #206
      Fax: +886-2-26579657

      TAISYS JUISE-S2-NESLIB

      32 53 (Firmware)


      The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

        • SC300
      5/25/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4369
      2133DocuSign, Inc.
      221 Main St.
      Suite 1000
      San Francisco, CA 94105
      USA

      Ezer Farhi
      Ezer.Farhi@docusign.com
      972-3-9279529

      DocuSign-SA-Main

      8.51.9.0 (Firmware)


      DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization's end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

        • Intel® Xeon Quad-Core
      5/25/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3606
      2132wolfSSL Inc.
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Kaleb Himes
      kaleb@wolfssl.com

      wolfCrypt

      3.14.2


      wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel® Xeon® E5-2650 without AES-NI w/ SUSE Linux Enterprise Server 12 SP3 64-bit on Microsoft Hyper-V 2016 Core Linux Kernel 4.4
        • Intel® Xeon® E5-2403 without AES-NI w/ SUSE Linux Enterprise Server 12 SP3 64-bit on VMWare ESXi 6.5.0 Linux Kernel 4.4
      5/25/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4366
      2121Cisco Systems, Inc.
      170 W Tasman Dr
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      tbd

      CiscoSSL FIPS Object Module

      6.0


      The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

        • Apple A10 w/ iOS 11.x
      5/25/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5434
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4357
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3608
      2131wolfSSL Inc.
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Larry Stefonic
      larry@wolfssl.com
      206-369-4800

      wolfCrypt

      4.0


      wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
      5/18/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4365
      2130IBM
      2455 South Rd
      Poughkeepsie, NY 12601
      USA

      Thomas Morris Jr
      tmorrisj@us.ibm.com
      845-435-5538

      William Santiago
      wsf1@us.ibm.com
      845-435-9265

      Miniboot 6.63 with 00CW683

      Andretta 2.0 (00CW683) MB6.63 Hash D608 BCAD (Firmware)


      Miniboot Implemented Algorithms with hardware acceleration

        • IBM PowerPC 405
      5/18/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4815
      2129Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Petra Manche
      +44 1189 245470

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle OpenSSL FIPS Object Module

      OpenSSL_2.0.13_OracleFIPS_1.0


      Oracle OpenSSL FIPS Object Module is a software library providing a Clanguage application program interface (API) for use by processes that require cryptographic services. It is implemented in products such as Oracle Solaris 11, Oracle Integrated Lights Out Manager (ILOM), and Oracle ZFS Storage Appliance.

        • Intel Xeon E7 with PAA w/ Oracle ZFS Storage OS8.8
        • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
        • Intel Xeon E5 without PAA w/ Intel Xeon E5 without PAA
        • Intel Xeon E5 without PAA w/ Oracle ZFS Storage OS 8.8
        • SPARC S7 with PAA w/ Oracle Solaris 11.4
        • SPARC S7 without PAA w/ Oracle Solaris 11.4
        • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
        • Intel Xeon E7 with PAA w/ Oracle® ZFS Storage OS8.8
        • Intel Xeon E5 with PAA w/ Solaris 11.4
        • Intel Xeon E5 with PAA w/ Oracle ZFS Storage OS 8.8
        • Oracle ILOM SP v2 (ARM 5) without PAA w/ Oracle ILOM OS v3.0
      5/18/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5445
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4364
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3603
      2128Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI shamb Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/18/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: SHS #4363
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3602
      2127Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      OpenSSL

      FIPS 2.0.16


      This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
      5/18/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5443
      2126Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      UnBound EKM DRBG

      2.0.1801.22535


      This component is used for secure random bit generation, as an alternative to the OpenSSL DRBG.

        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Xeon E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
      5/18/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5443
      2125Splunk, Inc.
      270 Brannan Street
      San Francisco, CA 94107
      USA

      Robert Truesdell
      rtruesdell@splunk.com
      412.913.8242

      Splunk Phantom Cryptographic Library

      1.0


      The Splunk Phantom Cryptographic Library provides cryptographic functionality to the Splunk Phantom Cryptographic Module. The associated cryptographic module is a statically linked object module and is classified under FIPS 140-2 as a software based, multi-chip standalone module embodiment.

        • Intel Xeon Silver 4108 with AES-NI w/ CentOS 6
        • Intel Xeon Silver 4108 with AES-NI w/ Red Hat Enterprise Linux Server 7.4
      5/18/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5442
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4361
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3599
      2124Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • n/a
      5/18/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4360
      2123Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

        • n/a
      5/18/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4359
      2122Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • n/a
      5/18/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4358
      2120Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi MCU HW Crypto Engines Module Firmware Component

      CC3235S 4.0.0.5 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

        • na
      5/18/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4355
      2119Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi MCU HW Crypto Engines Module Firmware Component

      CC3235SF 4.0.0.5 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • na
      5/18/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4356
      2118Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi MCU HW Crypto Engines Module Firmware Component

      CC3135R 4.0.0.5 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • na
      5/18/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4354
      2117Cohesity, Inc.
      300 Park Ave
      Suite 800
      San Jose, CA 95110
      USA

      Vivek Agarwal
      vivek@cohesity.com
      +1 (415) 690-7805

      Cohesity OpenSSL FIPS Object Module

      1.0.2


      The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module. It is incorporated into the family of Cohesity storage appliances.

        • Intel Xeon with AES-NI w/ CentOS 7
        • Intel Xeon without AES-NI w/ CentOS 7
      5/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5426
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4353
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3591
      2116Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI shaavx Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/10/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4352
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3590
      2115Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      +1 (628)-400-2043

      SDKMS Crypto Library

      1.0.0 (Firmware)


      Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

        • Intel® Xeon E3-1230v5 4-Core, 3.40GHz with AES-NI
      5/10/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5282
      2114Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Kevin Meagher
      kmeagher@ciena.com
      1-410-865-8936

      OpenSSL FIPS Object Module

      2.0.12


      Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

        • Intel Xeon D-1500 w/ SAOS 8.6.1
        • AARCH64(arm) w/ SAOS 6.17
        • Cavium 52xx w/ SAOS 6.17
        • ARMv7 w/ SAOS 6.17
      5/10/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5419
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3589
      2113NIKSUN, Inc.
      457 N. Harrison St.
      3rd Floor
      Princeton, NJ 08540
      USA

      Darryle Merlette
      merlette@niksun.com

      NIKOS FIPS Object Module

      2.0.16


      The NIKOS FIPS Object Module is a software library that provides cryptographic services to a vast array of NIKSUN's networking products.

        • Intel Xeon E5-2680 v2 w/ FreeBSD 11.1
      5/10/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5418
      2112LG Electronics, Inc.
      20 Yoido-dong
      Youngdungpo-gu
      Seoul 152-721
      Republic of Korea

      Donghoon Shin
      hoon.shin@lge.com
      82-10-2280-4056

      LG BoringSSL

      3.0


      General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

        • Snapdragon 845 (SDM845) w/ Android 8.0
        • Qualcomm Snapdragon 821 (MSM8996) w/ Android 8.0
        • Snapdragon 835 (MSM8998) w/ Android 8.0
      5/10/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5417
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4348
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3587
      2111Unisys Corporation
      3199 Pilot Knob Road
      Eagan, MN 55121
      USA

      James Heit
      james.heit@unisys.com
      651-635-7739

      Brian Wegleitner
      brian.wegleitner@unisys.com
      651-635-7548

      OS 2200 Cryptographic Library

      2.0


      General purpose cryptographic software library.

        • Unisys 2200 w/ OS 2200 Operating System
      5/4/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-512
        • Prerequisite: SHS #4347
      2110Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI shassse3 Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/4/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: SHS #4346
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3586
      2109INFINIDAT
      500 Totten Pond Road
      Waltham, MA 02451
      USA

      David Hebert
      davidh@infinidat.com
      +1 860-214-5666

      Steve Sullivan
      steves@infinidat.com
      +1 781-264-1544

      INFINIDAT Cryptographic Module (libcrypto)

      1.0.2k


      The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the main cryptographic functionality for the module.

        • Intel Xeon E5-2697 with AES-NI w/ InfiniBox OS 4.7
      5/4/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5414
      2108Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL VPAES and SHA1 SSSE3

      R6-1.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      5/4/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5351
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1
        • Prerequisite: SHS #4302
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1
        • Prerequisite: HMAC #3548
      2107Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI shagen Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4342
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3583
      2106Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI shaavx2 Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4341
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3582
      2105Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI aesni Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5409
      2104Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI aesgen Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5408
      2103Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 KCAPI aesasm Implementation

      R7-2.0.0


      Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5407
      2102Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x7416
      Fax: 613-225-9951

      Fortinet FortiGate-VM RBG Cryptographic Library v5.4

      5.4


      This document focuses on the software implementation of the Fortinet FortiGate-VM RBG Cryptographic Library v5.4 running on Intel x86 compatible processors.

        • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
      5/3/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
      2101Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK aesni Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5402
      2100Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK aesgen Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5401
      2099Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK aesasm Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5400
      2098Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK shassse3 Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel® Xeon® Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4337
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3578
      2097Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK shagen Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel® Xeon® Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4336
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3577
      2096Qualcomm Technologies, Inc.
      5775 Morehouse Dr
      San Diego, CA 92121
      USA

      Yin Ling Liong
      yliong@qti.qualcomm.com
      858-651-7034
      Fax: 858-845-1523

      QTI Random Number Generator (version 2.3.1)

      Snapdragon 636


      Snapdragon 636 Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

        • N/A
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4334
      2095Qualcomm Technologies, Inc.
      5775 Morehouse Dr
      San Diego, CA 92121
      USA

      Yin Ling Liong
      yliong@qti.qualcomm.com
      858-651-7034
      Fax: 858-845-1523

      QTI Random Number Generator (version 2.3.1)

      Snapdragon 660


      Snapdragon 660 Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

        • N/A
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4333
      2094D'Crypt Pte Ltd
      28 Sin Ming Lane
      #06-133 Midview City
      Singapore, Singapore 573953
      Singapore

      Sales & Marketing
      marketing@d-crypt.com
      (65) 6933-1800
      Fax: (65) 6684-5142

      Quek Gim Chye
      fips@d-crypt.com
      (65) 6933-1823
      Fax: (65) 6684-5142

      D'Crypt Cryptographic Library

      3.8 (Firmware)


      The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications.

        • Intel x86 64 bit
        • ARM Cortex-A
      5/3/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5399
      2093Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK shaavx2 Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4331
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3575
      2092Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 UEK shaavx Implementation

      R7-2.0.0


      Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

        • Intel® Xeon® Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4330
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3574
      2091Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AES and SHA1 assembler

      R7-2.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/3/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5396
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1
        • Prerequisite: SHS #4329
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1
        • Prerequisite: HMAC #3573
      2090Nationz Technologies Inc.
      5F, Building A, IER of Huazhong University of Science and Technology
      #9 Yuexing Ave. 3, Nanshan District
      Shenzhen, Guangdong 518057
      P.R.China

      Max Jiang
      jiang.zhaolai@nationz.com.cn
      +86 185 7675 1645

      Nationz Secure IC

      v1.1 (Firmware)


      The Z32HUB II secure chip is based on the 32bit CPU. Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc.

        • Z32HUB II secure IC, V1.0
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4327
      2089Nationz Technologies Inc.
      5F, Building A, IER of Huazhong University of Science and Technology
      #9 Yuexing Ave. 3, Nanshan District
      Shenzhen, Guangdong 518057
      P.R.China

      Max Jiang
      jiang.zhaolai@nationz.com.cn
      +86 185 7675 1645

      Nationz Z32H330TC TPM 2.0 Cryptographic Engine TCE01

      v1.1 (Firmware)


      Nationz Z32H330TC TPM 2.0 (Trusted Platform Module), Security processor with embedded firmware compliant with TPM Family 2.0 level 00, revision 1.16 Errata Version 1.5.

        • Z32H330TC secure IC, V1.0
      5/3/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4326
      2088Nuvoton Technology Corporation
      No. 4, Creation Rd. III
      Hsinchu Science Park 300
      Taiwan, R.O.C.

      Yossi Talmi
      yossi.talmi@nuvoton.com
      +972-9-9702364
      Fax: +972-9-9702001

      Oren Tanami
      oren.tanami@nuvoton.com
      +972-9-9702390
      Fax: +972-9-9702001

      Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

      LAG019


      Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

        • N/A
      5/3/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5390
      2087Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen, Certification Program Manager
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos 18.1R1 - OpenSSL

      18.1R1 (Firmware)


      The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Intel Xeon E31xx (Sandy Bridge)
        • Freescale e500 dual core (PB0BJSSE1PNB)
      5/3/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3571
      2086Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen, Certification Program Manager
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos 18.1R1 - Kernel

      18.1R1 (Firmware)


      The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Intel Xeon E31xx (Sandy Bridge)
        • Freescale e500 dual core (PB0BJSSE1PNB)
      4/27/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3569
      2085Certicom Corp.
      4701 Tahoe Blvd, Building A
      5th Floor
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder® FIPS Core

      6.3.0


      Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

        • Intel Atom C3558 without AES-NI w/ QNX SDP 7
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
        • Intel Atom C3558 with AES-NI w/ QNX SDP 7
        • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
        • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
        • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
        • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
      4/27/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5387
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4321
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3568
      2084Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - OpenSSL

      17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon II (CN6335)
        • Cavium Octeon III (CN7130)
        • Intel Xeon C5518
      4/27/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3567
      2083Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mike Jamison
      (678) 473-2907
      Fax: (678) 473-8470

      Cloudpath Cryptographic Library for Java

      1.0


      Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

        • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
        • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
      4/27/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5382
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4318
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3565
      2082VMware AirWatch
      1155 Perimeter Center West
      Suite 100
      Atlanta, GA 30338
      USA

      Gary Sturdivant
      sturdivant@vmware.com
      1-650-427-1911
      Fax: 1-650-427-5001

      OpenSSL

      2.0.16


      "Airwatch OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms. The algorithms are implemented by OpenSSL which is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/"

        • Qualcomm MSM8998 w/ Android 7.1
      4/20/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5377
      2081Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit)

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      4/13/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4314
      2080BiObex, LLC
      11501 Sunset Hills Rd
      Suite 200
      Reston, VA 22190
      USA

      Arthur Joyce
      ajoyce@biobex.com
      571-313-0969

      SAFE-Key device

      1.2.0.0 (Firmware)


      The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

        • STM32F415
      4/13/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4313
      2079Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

      R7-2.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      4/13/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5370
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4312
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3558
      2078IBM Corporation
      1787 Sentry Pkwy West
      Building 18, Suite 200
      Blue Bell, PA 19422
      USA

      Sandeep Singhal
      Sandeep.Singhal1@ibm.com
      215-664-1614

      OpenSSL [1] with the OpenSSL FIPS Object Module [2]

      1.0.2o [1]; 2.0.13 [2]


      The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

        • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
      4/13/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5369
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4311
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384
        • Prerequisite: HMAC #3557
      2077ClevX, LLC
      9306 NE 125th Street
      Kirkland, WA 98034
      USA

      Lev Bolotin
      Lev.Bolotin@clevx.com
      +1.425.820.9929

      Marc Singer
      Marc.Singer@clevx.com
      425.820.9929

      ClevX Datalock Cryptographic Library

      ClevX-Datalock-v2.0 (Firmware)


      ClevX Datalock Cryptographic Firmware Library

        • STM32L071C
      4/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5366
      2076VMware, Inc.
      3401 Hillview Ave
      Palo Alto, CA 94303
      USA

      Manoj Maskara
      mmaskara@vmware.com
      650-427-1000
      Fax: 650-475-5001

      VMware BC-FJA (Bouncy Castle FIPS Java API)

      1.0.0


      The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

        • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.7
        • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.7
        • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.7
        • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.7
      4/9/2018
      • Counter:
        • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5365, TDES #2709
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4307
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3553
      2075wolfSSL Inc.
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Larry Stefonic
      larry@wolfssl.com
      206-369-4800

      wolfCrypt

      3.14.2


      The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

        • Intel x86 w/ NetBSD v6.0.1
      4/9/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4306
      2074Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd.
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ancrypto.dylib

      1.0.0


      The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

        • ARMv7 w/ iOS 10.3.3
      4/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5363
      2073Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
      4/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5328
      2072Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
      4/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5329
      2071Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AES and SHA1 assembler

      R6-1.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      3/30/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5353
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1
        • Prerequisite: SHS #4304
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1
        • Prerequisite: HMAC #3550
      2070Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

      R6-1.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      3/30/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5352
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4303
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3549
      2069Bivio Networks, Inc.
      4457 Willow Road, Suite 240
      Pleasanton, CA 94588
      USA

      Raj Srinivasan
      raj@bivio.net
      (925) 924-8608
      Fax: (925) 924-8650

      OpenSSL

      1.0.2k-8


      OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

        • Intel Xeon Skylake w/ RHEL 7.4
      3/30/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5349
      2068Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit)

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      3/30/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4300
      2067Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - Kernel

      17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7130)
        • Cavium Octeon II (CN6335)
        • Intel Xeon C5518
        • Cavium Octeon III (CN7020)
      3/30/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3545
      2066SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5.1 for TZ, NSA and SuperMassive

      6.5.1 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN68XX)
        • Cavium Octeon II (CN66XX)
        • Cavium Octeon III (CN70XX)
        • Cavium Octeon II (CN62XX)
        • Cavium Octeon III (CN71XX)
      3/30/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4297
      2065Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      Aruba Common Cryptographic Module (CCM)

      1.0.0


      The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

        • Intel Core i7 w/ Windows 10 64-bit User Mode
        • Intel Core i5 w/ Windows 10 32-bit User Mode
        • ARMv7 w/ Android 7.1
      3/30/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5345
      2064Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL VPAES and SHA1 SSSE3

      R7-2.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      3/30/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5344
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1
        • Prerequisite: SHS #4295
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1
        • Prerequisite: HMAC #3541
      2063BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.1


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
      3/30/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5343
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4294
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-512
        • Prerequisite: HMAC #3540
      2062BlackBerry Certicom
      5th Floor, 4701 Tahoe Blvd, Building A
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder GSE-J Crypto Core

      2.9.1


      Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

        • Intel Xeon w/ Windows Server 2016 with Oracle JRE 1.8.0
      3/30/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5342
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4293
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-512
        • Prerequisite: HMAC #3539
      2061Certes Networks, Inc.
      300 Corporate Center Drive
      Suite 140
      Pittsburgh, PA 15108
      USA

      Sean Everson
      sean.everson@certesnetworks.com
      1.412.357.1130
      Fax: 1.412.262.2574

      Gary Brunner
      gary.brunner@certesnetworks.com
      1.412.200.2177
      Fax: 1.412.262.2574

      Certes Enforcement Point Cryptographic Library

      1.0.2l (Firmware)


      The Certes Enforcement Point Cryptographic Library provides cryptographic functionality for the Certes CEP appliances.

        • Intel Xeon Processor E3 v5 Family
        • Intel Atom Processor C Series
        • Intel Xeon Processor E5 v4 Family
      3/30/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5338
      2060Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - Authentec

      17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7020)
        • Broadcom XLP832
        • Cavium Octeon III (CN7130)
        • Cavium Octeon II (CN6335)
      3/30/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3534
      2059Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      CLint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • Intel Atom
      3/23/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5333
      2058Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      OpenSSL - EX4300

      Junos OS 17.4 R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

        • Freescale e500mc
      3/23/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3528
      2057BeyondTrust
      5090 N. 40th Street
      Suite 400
      Phoenix, AZ 85018
      USA

      David Allen
      dallen@beyondtrust.com
      1-800-234-9072, 9292

      BeyondTrust Cryptographic Library

      2.0.10


      BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

        • Intel Xeon w/ Windows Server 2012 R2 Standard
      3/23/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5327
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4279
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3525
      2056Realia Technologies, S.L
      Infanta Mercedes 90, 4th floor
      Madrid, Madrid 28020
      Spain

      Jesus Rodriguez
      jrodriguez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Luis Jesus Hernandez
      ljhernandez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Cryptosec Dekaton

      1.1


      The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

        • N/A
      3/23/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5326
      2055wolfSSL Inc
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Kaleb Himes
      kaleb@wolfssl.com

      wolfCrypt

      3.12.6


      wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • NS9210 w/ NET+OS v7.6
      3/23/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4277
      2054Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      JUNOS 17.3R2 - Kernel

      17.3R2 (Firmware)


      The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

        • Intel Xeon D
      3/23/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3522
      2053Digi International, Inc.
      11001 Bren Road East
      Minnetonka, MN 55343
      USA

      Donald Schleede
      Donald.Scleede@digi.com
      952-912-3444

      Digi ConnectCore Security Module

      1.0


      The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

        • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
        • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
      3/16/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5323
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4275
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3521
      2052Digital Guardian, Inc.
      860 Winter Street
      Suite 3
      Waltham, MA 02541
      USA

      Craig Hansen
      201-572-3784

      FIPS Kernel Mode Cryptographic Module (VSEC.SYS)

      1.1


      Previously called: Digital Guardian Security Kernel v1.1. VSEC.SYS is a Windows kernel mode export driver that provides FIPS Approved cryptographic services to Verdasys applications such as Digital Guardian.

        • Intel i7 Dual Core w/ Microsoft Windows 10 (64-bit)
      3/16/2018
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4274
      2051Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Kernel - EX4300

      Junos OS 17.4 R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

        • Freescale e500mc
      3/16/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3518
      2050Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x7416
      Fax: 613-225-9951

      Fortinet FortiMail RNG Cryptographic Library 6.0

      6.0 (Firmware)


      This focuses on the firmware implementation of the Fortinet FortiMail RNG Cryptographic Library v6.0 running on Intel x86 compatible processors.

        • Intel Xeon
      3/16/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5321
      2049Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-3-00 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in server.

        • Intel Xeon
      3/16/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5318
      2048Cisco Systems, Inc
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      7.0


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

        • ARMv8 w/ Android 7.1
        • Intel Core i5 w/ Windows 10 (with AES-NI)
        • Intel Core i7 w/ macOS 10.12 (with AES-NI)
        • Intel Core i5 w/ Windows 10
        • Intel Pentium w/ Linux 3.4
        • ARMv8 w/ iOS 11.2
        • Intel Core i7 w/ macOS 10.12 (without AES-NI)
        • Cavium Octeon II 68XX w/ Wind River Linux 4
        • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
        • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
      3/16/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5310
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4267
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3513
      2047Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Quicksec

      Junos OS 17.4R1-S1 (Firmware)


      The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E5
      3/16/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3512
      2046Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Quicksec

      Junos OS 17.4R1-S1 (Firmware)


      The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E3
      3/16/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3511
      2045Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Quicksec

      Junos OS 17.4R1-S1


      The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

        • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
      3/16/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3510
      2044Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - OpenSSL

      Junos OS 17.4R1-S1


      The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

        • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
      3/16/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3509
      2043Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - OpenSSL

      Junos OS 17.4R1-S1 (Firmware)


      The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E5
      3/16/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3508
      2042Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - OpenSSL

      Junos OS 17.4R1-S1 (Firmware)


      The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E3
      3/16/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3507
      2041Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Kernel

      Junos OS 17.4R1-S1 (Firmware)


      The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E5
      3/9/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3503
      2040Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Kernel

      Junos OS 17.4R1-S1


      The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

        • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
      3/9/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3502
      2039Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Pradeepa M R
      pradeepam@juniper.net

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Junos OS 17.4R1-S1 - Kernel

      Junos OS 17.4R1-S1 (Firmware)


      The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

        • Intel Xeon E3
      3/9/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3501
      2038Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Patrick Scully
      613-670-3207

      Ciena Waveserver

      1.5.1 (Firmware)


      The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

        • Xilinx XC7Z030
      3/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5302
      2037Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

      10.0.15063.728


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
      3/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5300
      2036Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); SymCrypt Cryptographic Implementations

      10.0.14393.1770


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
        • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
        • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
        • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
        • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
        • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
      3/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5295
      2035Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Enterprise LTSB (version 1507); SymCrypt Cryptographic Implementations

      10.0.10240.17643


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
      3/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5291
      2034Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
      3/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5288
      2033Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); SymCrypt Cryptographic Implementations

      10.0.10586.1176


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
        • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
        • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
        • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
        • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/Windows 10 Mobile November Update (ARMv7)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
        • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
        • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
        • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
      3/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5287
      2032Docker, Inc.
      144 Townsend Street
      San Francisco, California 94107
      USA

      Rahim Ibrahim
      security-team@docker.com
      415-941-0376

      Docker Enterprise Edition Crypto Library v 1.0

      1.0


      The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

        • Dual Intel E5-2670v3 w/ Red Hat Enterprise Linux v7.3
      3/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5286
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4245
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3493
      2031Docker, Inc.
      144 Townsend Street
      San Francisco, California 94107
      USA

      Rahim Ibrahim
      security-team@docker.com
      415-941-0376

      Docker Enterprise Edition Crypto Library v 1.0

      1.0


      The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

        • Dual Intel E5-2670v3 w/ CentOS v7.3
      3/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5285
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4244
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3492
      2030DocuSign, Inc.
      221 Main St.
      Suite 1000
      San Francisco, CA 94105
      USA

      Ezer Farhi
      Ezer.Farhi@docusign.com
      +972-39279529
      Fax: +972-39230864

      Moshe Harel
      Moshe.Harel@docusign.com
      +972-39279578
      Fax: +972-39230864

      PrivateServer

      5.0.3 (Firmware)


      PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

        • Intel® E3-1268LV3 Quad-Core
      3/9/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3490
      2029Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Hardware DRBG (Apple T2 - iBridge2,1)

      2.0


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple Apple T2 (iBridge2,1) SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5279
      2028Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple S3)

      2.0


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple S3 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5278
      2027Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple A10X)

      2.0


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A10X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG for tvOS 4.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5277
      2026Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple S1P)

      2.0


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple S1P SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5276
      2025Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple A9)

      2.0


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A9 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5275
      2024Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple A10X)

      2.0


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A10X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5274
      2023Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple A10)

      2.0


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A10 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5273
      2022Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple A9X)

      2.0


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A9X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5272
      2021Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple A8X)

      1.2


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A8X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5271
      2020Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple A8)

      1.2


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A8 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      3/2/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5270
      2019Splunk, Inc.
      270 Brannan Street
      San Francisco, CA 94107
      USA

      Michael Arrowsmith
      415-848-8400

      Splunk Cryptographic Module

      2.0.16


      The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Intel Xeon E5 without PAA w/ Ubuntu 16.04
        • Intel Xeon E5 with PAA w/ Ubuntu 16.04
      2/23/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5268
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4238
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3487
      2018Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL with FOM 6.0

      6.0


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon w/ ADE-OS v3.0
      2/23/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5267
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4237
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3486
      2017Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS OpenSSL Module

      ArubaOS 6.5.1 (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Qualcomm IPQ8064
        • Qualcomm IPQ4029
        • NXP QorIQ T1024
      2/23/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5266
      2016IBM Corporation
      1787 Sentry Pkwy West
      Building 18, Suite 200
      Blue Bell, PA 19422
      USA

      Sandeep Singhal
      Sandeep.Singhal1@ibm.com
      215-664-1614

      OpenSSL [1] with the OpenSSL FIPS Object Module [2]

      1.0.2n [1]; 2.0.13 [2]


      The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

        • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
      2/23/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5263
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4234
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384
        • Prerequisite: HMAC #3483
      2015Hangzhou Hikvision Digital Technology Co., Ltd.
      No.555 Qianmo Road, Binjiang District
      Hangzhou, Zhejiang 310052
      China

      Jiadong Chen
      chenjiadong@hikvision.com
      +86 136 5663 1443

      HikSSL Library

      1.0.0


      The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

        • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
      2/23/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5262
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4233
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3482
      2014Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple A11)

      2.0


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A11 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      2/23/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5261
      2013Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Enclave Processor Hardware DRBG (Apple A7)

      1.2


      Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A7 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

        • N/A
      2/23/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5260
      2012Hangzhou Hikvision Digital Technology Co., Ltd.
      No.555 Qianmo Road, Binjiang District
      Hangzhou, Zhejiang 310052
      China

      Jiadong Chen
      chenjiadong@hikvision.com
      +86 136 5663 1443

      HikSSL Library

      1.0.0


      The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

        • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
      2/23/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5259
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4232
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3481
      2011Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • ARMv8
      2/23/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5258
      2010Samsung Electronics Co., Ltd
      416 Maetan-3dong, Yeongtong-gu
      Suwon, Gyeonggi 152-848
      South Korea

      Jung Ha Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Samsung BoringSSL Cryptographic Module

      v1.2


      The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

        • Samsung Electronics Exynos7883 w/ Android 8.0
        • Qualcomm MSM8998 w/ Android 8.0
        • Qualcomm MSM8996 w/ Android 8.0
        • Qualcomm SDM845 w/ Android 8.0
        • Samsung Electronics Exynos8890 w/ Android 8.0
        • Samsung Electronics Exynos9810 w/ Android 8.0
        • Samsung Electronics Exynos8895 w/ Android 8.0
        • Samsung Electronics Exynos7570 w/ Android 8.0
        • Samsung Electronics Exynos7884 w/ Android 8.0
      2/16/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5255
      2009Mocana Corporation
      150 Mathilda Place
      Suite 208
      Sunnyvale, CA 94086
      USA

      Srinivas Kumar
      fips@mocana.com
      1-415-617-0055
      Fax: 1-415-617-0056

      Mocana Cryptographic Library

      6.5.1f


      The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

        • Intel Atom E3800 w/ Wind River Linux 6.0
      2/16/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5252
      2008
      2/16/2018
        2007Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Marks
        seceval_us@oracle.com
        650-506-0391

        Oracle Acme Packet Cryptographic Library

        ECz8.0.0 (Firmware)


        The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

          • Intel Core i3
          • Intel Core i7
        2/16/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5247
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1
          • Prerequisite: SHS #4225
        2006wolfSSL Inc
        10016 Edmonds Way
        Suite C-300
        Edmonds, WA 98020
        USA

        Todd Ouska
        todd@wolfssl.com
        503-679-1859

        Kaleb Himes
        kaleb@wolfssl.com

        wolfCrypt

        3.12.4


        wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

          • Intel(R) Core(TM) i5 w/ Windows 10 Pro
          • Intel(R) Xeon(R) E3-1270 w/ Debian 8.7.0
        2/16/2018
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4222
        2005Gemalto
        Avenue du Jujubier
        Z.I Athelia IV
        La Ciotat, 13705
        France

        Frederic Garnier
        Frederic.Garnier@gemalto.com
        +33 442364368
        Fax: +33 442366953

        Didier Bonnet
        Didier.Bonnet@gemalto.com
        +33 442366803
        Fax: +33 442365545

        Gemalto Cryptographic library for IDCore 3130 on SLE78

        Infineon SLE78CLFX400VPHM 1.9 (Firmware)


        IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

          • Infineon SLE78 chip (M7892)
        2/16/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5243
        2004Evertz Microsystems
        5292 John Lucas Dr.
        Burlington, Ontario L7L 5Z9
        Canada

        Naveed Afzal
        nafzal@evertz.com
        905-335-3700

        EXE OpenSSL Cryptographic Module

        2v0_b1 (Firmware)


        Card for 6RU Shelf loaded with Evertz IPX

          • MPC8377E
        2/16/2018
        • Counter:
          • Modes: AES-128, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5242
        2003Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 7 libgcrypt

        R7-2.0.0


        The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

          • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5237
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4217
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3469
        2002Oracle Communications
        100 Crosby Drive
        Bedford, MA 01730
        USA

        George Guo
        george.guo@oracle.com
        (781) 538-7399

        Chris Marks
        chris.marks@oracle.com
        (650) 506-0391

        Oracle Acme Packet Cryptographic Library

        E-CZ 8.0.0


        The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

          • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
        2/9/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5236
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1
          • Prerequisite: SHS #4216
        2001Oracle Communications
        100 Crosby Drive
        Bedford, MA 01730
        USA

        George Guo
        george.guo@oracle.com
        (781) 538-7399

        Chris Marks
        chris.marks@oracle.com
        (650) 506-0391

        Oracle Acme Packet Cryptographic Library

        E-CZ 8.0.0 (Firmware)


        The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

          • Intel Xeon D-1548 (Intel Broadwell-DE)
          • Intel Atom C2358
        2/9/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5235
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1
          • Prerequisite: SHS #4215
        2000Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Allison Kim
        Allison.Kim@hpe.com
        +1 832 502 6651

        Catherine Schwartz
        Catherine.Schwartz@hpe.com
        +1 832 502 6140

        HPE Secure Encryption Engine v1.1

        PM8221


        HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

          • N/A
        2/9/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5234
        1999Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Allison Kim
        Allison.Kim@hpe.com
        +1 832 502 6651

        Catherine Schwartz
        Catherine.Schwartz@hpe.com
        +1 832 502 6140

        HPE Secure Encryption Engine v1.1

        PM8237


        HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

          • N/A
        2/9/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5233
        1998Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Allison Kim
        Allison.Kim@hpe.com
        +1 832 502 6651

        Catherine Schwartz
        Catherine.Schwartz@hpe.com
        +1 832 502 6140

        HPE Secure Encryption Engine v1.1

        PM8205


        HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

          • N/A
        2/9/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5232
        1997Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 7 libgcrypt

        R7-2.0.0


        The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

          • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5231
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4211
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3463
        1996Certicom Corp.
        4701 Tahoe Blvd, Building A
        5th Floor
        Mississauga, Ontario L4W 0B5
        Canada

        Certicom Support
        support@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Certicom Sales
        sales@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Security Builder® FIPS Core

        6.3.0


        Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

          • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
          • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
          • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
          • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
          • Intel Atom C3558 without AES-NI w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
          • Intel Atom C3558 with AES-NI w/ QNX SDP 7
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5230
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4210
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3462
        1995IBM Corporation
        222 South Riverside Plaza
        Ste 1700
        Chicago, IL 60606
        USA

        Mark Seaborn
        mseaborn@us.ibm.com
        +1 312 423 6640x2354

        IBM Cloud Object Storage System's™ FIPS Cryptographic Module

        1.1


        The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe's ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

          • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
          • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5229
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4209
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3461
        1994Aruba, a Hewlett Packard Enterprise company
        3333 Scott Blvd
        Santa Clara, CA 95054
        USA

        Steve Weingart
        steve.weingart@hpe.com
        512-319-2480

        libancrypto.so

        1.0.0


        The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

          • Intel Core i7 w/ Linux 2.6 64-bit
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5228
        1993Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5227
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4207
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3459
        1992Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S3 w/ watchOS 4
        2/9/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5226
        1991Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S1P w/ watchOS 4
        2/9/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5225
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3458
        1990Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S3 w/ watchOS 4
        2/9/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5224
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3457
        1989Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S1P w/ watchOS 4
        2/9/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5221
        1988Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S3 w/ watchOS 4
        2/9/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5219
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3456
        1987Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S1P w/ watchOS 4
        2/9/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5217
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3455
        1986Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S3 w/ watchOS 4
        2/9/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5216
        1985Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple S1P w/ watchOS 4
        2/9/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5215
        1984Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5212
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4202
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3454
        1983Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2/AVX, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5211
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4201
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3453
        1982Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2/AVX, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5210
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4200
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3452
        1981Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5209
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4199
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3451
        1980Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5208
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4198
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3450
        1979Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5207
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4197
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3449
        1978Gallagher Group
        181 Kahikatea Drive
        Hamilton 3206
        New Zealand

        Andrew Scothern
        andrew.scothern@gallagher.com
        +64-7-838-9800

        Simon Lawrence
        simon.lawrence@gallagher.com
        +64-7-838-9800

        Gallagher OpenSSL Cryptographic Module

        2.0.12


        Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

          • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5206
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4196
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3448
        1977Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5205
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4195
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3447
        1976Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (Full CPU set, x86_64, 32-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/9/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5204
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4194
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3446
        1975Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        OpenSSL (Full CPU set, x86_64, 64-bit library)

        6.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
        2/2/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5203
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4193
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3445
        1974Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3444
        1973Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5201
        1972Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5199
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3443
        1971Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5198
        1970Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A11 Bionic w/ iOS 11
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5195
        1969Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10X Fusion w/ iOS 11
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5194
        1968Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9X w/ iOS 11
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5193
        1967Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10 Fusion w/ iOS 11
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5192
        1966Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8 w/ iOS 11
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5191
        1965Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9 w/ iOS 11
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5190
        1964Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8X w/ iOS 11
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5189
        1963Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5188
        1962Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5187
        1961Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Kernel Module v8.0 (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3442
        1960Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5185
        1959Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        2/2/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3441
        1958Samsung Electronics Co., Ltd.
        R5, Maetan 3-dong Yeongton-gu
        Suwon-si, Gyeonggi 443-742
        Korea

        JungHa Paik
        jungha.paik@samsung.com
        +82-10-8861-0858

        Samsung Kernel Cryptographic Module

        1.9


        Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

          • Exynos 9810 w/ Android 8 Kernel 4.9
          • SDM845 w/ Android 8 (Kernel 4.9)
        2/2/2018
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3439
        1957Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A11 Bionic w/ iOS 11
        2/2/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5182
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3438
        1956Centrify Corporation
        3300 Tannery Way
        Santa Clara, California 95054
        USA

        Kitty Shih
        kitty.shih@centrify.com
        669-444-5238

        Centrify Cryptographic Library

        2.1


        Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

          • Intel Xeon X5650 x86_64 w/ RHEL 7.2
        2/2/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5181
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4185
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3437
        1955Samsung Electronics Co., Ltd
        416 Maetan-3dong, Yeongtong-gu
        Suwon, Gyeonggi 152-848
        South Korea

        Brian Wood
        be.wood@samsung.com
        +1-973-440-9125

        Jung Ha Paik
        jungha.paik@samsung.com
        +82-10-8861-0858

        Samsung SCrypto Library

        v2.2


        Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

          • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
          • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
          • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
        2/2/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5180
        1954iStorage Limited
        iStorage House
        13 Alperton Lane
        Perivale
        Middlesex UB6 8DH
        England

        John Michael
        john@istorage-uk.com
        +44 (0)20 8991 6260
        Fax: +44 (0)20 8991 6277

        iStorage diskAshur2 Cryptographic Library

        00.04.17.01 (Firmware)


        The iStorage diskAshur2 cryptographic library is a firmware library that provides cryptographic functions for iStorage diskAshur2 range of PIN authenticated, hardware encrypted portable data storage devices. The cryptographic functions include AES-ECB-256, AES-CTR-256, SHA256, HMAC256, KWAE, KWAD and DRBG.

          • IST28398Q
        1/26/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5179
        1953Datrium
        385 Moffett Park Dr #205
        Sunnyvale, CA 94089
        USA

        R. Hugo Patterson
        info@datrium.com
        +1 (669) 721-9444

        Datrium FIPS Object Module

        2.0.12


        The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

          • Intel Xeon E5-2618L v4 w/ Linux 3.10
          • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
          • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
        1/26/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5178
        • Hash based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4182
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3434
        1952Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Module v8.0 (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        1/26/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3433
        1951Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5175
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3432
        1950Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Module v8.0 (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5173
        1949Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple ibridgeOS CoreCrypto Module v8.0 (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5172
        1948Samsung Electronics Co., Ltd.
        1-1, Samsungjeonja-ro
        Hwaseong-si, Gyeonggi-do 18448
        KOREA

        Jisoo Kim
        jisoo74.kim@samsung.com
        82-31-8096-2832
        Fax: 823180008000(+62832)

        RFX DRBG

        RFX DRBG V1.0 (Firmware)


        PM 1643 Series is high-performance Self-Encrypting SSD supporting SAS 12G Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, RSA-PSS 2048 for FW authentication, and Hash_DRBG for key generation.

          • Cortex R7 ARM-based CPU
        1/26/2018
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4178
        1947SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Sales
        sales@safelogic.com

        CryptoComply® Server

        2.1


        CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

          • Intel i7 w/ Windows Server 2012 R2
        1/26/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5170
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4177
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3431
        1946Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW FIPS Object Module

        2.0.14


        Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

          • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
          • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
          • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
          • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
          • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
        1/26/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5168
        1945Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW FIPS Object Module

        2.0.13


        Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
        1/26/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5167
        1944Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW FIPS Java API

        1.0.0


        Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

          • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
        1/26/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5166
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-512
          • Prerequisite: SHS #4173
        1943Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10 Fusion w/ iOS 11
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5165
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3426
        1942Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10X Fusion w/ iOS 11
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5164
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3425
        1941Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8X w/ iOS 11
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5163
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3424
        1940Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9X w/ iOS 11
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5162
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3423
        1939Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8 w/ iOS 11
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5161
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3422
        1938Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9 w/ iOS 11
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5160
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3421
        1937Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5159
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3420
        1936Mojo Networks, Inc.
        339 N Bernardo Avenue, Suite 200
        Mountain View, CA 94043
        USA

        Hemant Chaskar
        hemant.chaskar@mojonetworks.com
        (650) 961-1111
        Fax: (650) 961-1169

        Crypto Core

        2.0.16-1-01 (Firmware)


        Cryptographic library offering various cryptographic mechanisms in sensor and access point.

          • ARMv7
        1/26/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5158
        1935Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11 Fusion
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5157
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3418
        1934Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A11 Bionic w/ iOS 11
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5156
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3417
        1933Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10 Fusion w/ iOS 11
        1/26/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5155
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3416
        1932Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9X w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5154
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3415
        1931Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9 w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5153
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3414
        1930Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8X w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5152
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3413
        1929Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5151
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3412
        1928Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8 w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5150
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3411
        1927Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple A10X Fusion w/ tvOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5149
        1926Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A10X Fusion w/ tvOS 11
        1/19/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3410
        1925Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A10X w/ tvOS 11 Fusion
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5145
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3409
        1924Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple A10X Fusion w/ tvOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5143
        1923Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A11 Bionic w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5131
        1922Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

          • Apple S3 w/ watchOS 4
        1/19/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3408
        1921Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

          • Apple S1P w/ watchOS 4
        1/19/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3407
        1920Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within watchOS.

          • Apple S3 w/ watchOS 4
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5128
        1919Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within watchOS.

          • Apple S1P w/ watchOS 4
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5127
        1918Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

          • Apple S3 w/ watchOS 4
        1/19/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3406
        1917Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

          • Apple S1P w/ watchOS 4
        1/19/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3405
        1916Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within watchOS.

          • Apple S1P w/ watchOS 4
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5126
        1915Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Kernel Module v8.0 (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within watchOS.

          • Apple S3 w/ watchOS 4
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5125
        1914GDC Technology (USA) LLC
        1016 West Magnolia Boulevard
        Burbank, California 91506
        USA

        Pranay Kumar
        pranay@gdc-tech.com
        (852) 2507 9565
        Fax: (852) 2579 1131

        ChernYue Kwok
        Chernyue.kwok@gdc-tech.com
        (852) 2507 9552
        Fax: (852) 2579 1131

        Standalone IMB Cryptographic Module

        2.0.11 (Firmware)


        A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

          • Xilinx Zynq Ultrascale+
        1/19/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5122
        1913Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10 Fusion w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5118
        1912Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9X w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5115
        1911Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A9 w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5114
        1910Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A10X Fusion w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5110
        1909Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8X w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5106
        1908Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A8 w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5103
        1907Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple Secure Key Store CoreCrypto Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

          • Apple A7 w/ iOS 11
        1/19/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5102
        1906Silver Spring Networks
        230 W Tasman Drive
        San Jose, CA 95134
        USA

        Andrew Pendray
        support@ssni.com
        +1 669 770 4000
        Fax: +1 886 776 0015

        Silver Spring Networks Endpoint Security Module

        130-0117-02


        Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard crytographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

          • N/A
        1/19/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-512
          • Prerequisite: HMAC #3402
        1905Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Timothy McDonough
        timothy.mcdonough@hpe.com

        Hewlett Packard Enterprise SSL Crypto Module

        2.1


        Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

          • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
        1/12/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5099
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4147
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3401
        1904Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone SSL Crypto Library

        1.0


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
          • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
        1/12/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5098
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4146
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3400
        1903Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone SSL Crypto Library

        1.0 (Firmware)


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
          • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
        1/12/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5097
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4145
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3399
        1902Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Access Point SSL Crypto Library

        1.0 (Firmware)


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

          • Qualcomm IPQ8068
          • Qualcomm IPQ8064
          • Qualcomm IPQ8065
        1/12/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5096
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4144
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3398
        1901Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (678) 473-2907
        Fax: (678) 473-8470

        Mike Jamison
        (678) 473-2907
        Fax: (678) 473-8470

        Cloudpath Cryptographic Library

        1.0


        Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

          • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
          • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
        1/12/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5095
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4143
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3397
        1900Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

          • Apple S3 w/ watchOS 4
        1/12/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3396
        1899Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

          • Apple S1P w/ watchOS 4
        1/12/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3395
        1898Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within watchOS.

          • Apple S3 w/ watchOS 4
        1/12/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5092
        1897Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within watchOS.

          • Apple S3 w/ watchOS 4
        1/12/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5091
        1896Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Bishakha Banerjee
        408-745-2000
        Fax: 408-745-2100

        JUNOS 17.3R2 RE1800 - Kernel

        17.3R2 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Intel Xeon LC5518
        1/12/2018
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3393
        1895Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        JUNOS 17.3R2 RE1800 - OpenSSL

        17.3R2 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Intel Xeon LC5518
        1/12/2018
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3392
        1894Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

          • Apple S3 w/ watchOS 4
        1/12/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5088
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3391
        1893Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

          • Apple S1P w/ watchOS 4
        1/12/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5087
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3390
        1892Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within watchOS.

          • Apple S1P w/ watchOS 4
        1/12/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5086
        1891Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple watchOS CoreCrypto Module v8.0 (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within watchOS.

          • Apple S1P w/ watchOS 4
        1/12/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5085
        1890Toshiba Memory Corporation
        1-1, Shibaura 1-chome
        Minato-ku, Tokyo 105-8001
        Japan

        Akihiro Kimura
        akihero.kimura@toshiba.co.jp
        +81-45-890-2856
        Fax: +81-45-890-2593

        Crypto Library Hash_DRBG

        1.0.0 (Firmware)


        a library of unique software cipher solutions which are standard encryption algorithm-based to provide Toshiba Memory Corporation enterprise SSD products and the systems using them a robust and secure data storage environment

          • Cortex-M3
        1/12/2018
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4128
        1889Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

          • Intel i5 w/ macOS 10.13
        1/5/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5072
        1888Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

          • Intel i7 w/ macOS 10.13
        1/5/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5071
        1887SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sanagala
        usanagala@sonicwall.com
        408-962-6248
        Fax: 408-745-9300

        SonicWall Crypto Library

        SonicOS 6.2.5 (Firmware)


        SonicWall Crypto Library

          • Cavium Octeon
        1/5/2018
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4130
        1886Infineon Technologies AG
        Alter Postweg 101
        Augsburg, BY 86159
        Germany

        Roland Ebrecht
        Roland.Ebrecht@infineon.com
        +49-821-25851-68
        Fax: +49-821-25851-40

        Thomas Hoffmann
        Thomas.Hoffmann@infineon.com
        +49-821-25851-24
        Fax: +49-821-25851-40

        Trusted Platform Module 2.0 SLB 9670

        SLB 9670 7.83 (Firmware)


        Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

          • Infineon SLB 9670 security controller IC
        1/5/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5069
        1885Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel i7 w/ macOS 10.13
        1/5/2018
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3382
        1884Huawei Technologies Co., Ltd
        Huawei Industrial Base, Bantian Longgang
        Shenzhen, Guangdong 518129
        China

        SPENCER HE
        heshunbin@huawei.com
        +86-755-28979041

        EulerOS 2.0

        EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

          • Intel Xeon w/ EulerOS 2.0
        1/5/2018
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5066
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4126
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3381
        1883Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

          • Intel Xeon w/ macOS 10.13
        1/5/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5065
        1882Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

          • Intel i5 w/ macOS 10.13
        1/5/2018
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5063
        1881Silver Peak Systems, Inc.
        2860 De La Cruz Blvd.
        Santa Clara, CA 95050
        USA

        Damon Ennis
        (408) 935-1836

        Anusha Vaidyanathan
        (408) 935 1800
        Fax: (408) 588-1608

        Silver Peak Cryptographic library

        1.0 (Firmware)


        Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

          • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
          • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
        1/5/2018
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5060
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4125
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3380
        1880Hewlett Packard Enterprise
        8 Technology Drive
        Westborough, MA 01581
        USA

        Aftab Alan
        aftab.alan@hpe.com
        917 576-6680

        OmniStack Cryptographic Library

        2.1


        The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

          • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
        12/22/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5059
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4124
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3379
        1879Private Machines, Inc
        164 20th Street
        4A-4B
        Brooklyn, NY 11232
        USA

        Sumeet Bajaj
        sumeet@privatemachines.com

        Radu Sion
        sion@privatemachines.com

        Private Machines Enforcer DRBG Library

        L4-1 1.0.1 (Firmware)


        The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

          • MAX32550 Cortex M3
        12/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3385
        1878Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel Core M w/ macOS 10.13
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5057
        1877Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel Xeon w/ macOS 10.13
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5056
        1876Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel i5 w/ macOS 10.13
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5055
        1875Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel i7 w/ macOS 10.13
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5054
        1874Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel Core M w/ macOS 10.13
        12/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3377
        1873Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel i5 w/ macOS 10.13
        12/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3376
        1872Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • intel Xeon w/ macOS 10.13
        12/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3375
        1871Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel i7 w/ macOS 10.13
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5051
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3374
        1870Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel Core M w/ macOS 10.13
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5050
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3373
        1869Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel Xeon w/ macOS 10.13
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5049
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3372
        1868Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Intel i5 w/ macOS 10.13
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5048
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3371
        1867Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton
        bshelton@juniper.net
        408-745-2000

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS Version 17.3R2 - OpenSSL

        17.3R2 (Firmware)


        The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

          • Intel Xeon D
        12/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3367
        1866Hewlett Packard Enterprise
        8 Technology Drive
        Westborough, MA 01581
        USA

        Aftab Alan
        aftab.alan@hpe.com
        917 576-6680

        OmniStack Cryptographic Library

        2.1


        The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

          • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
        12/22/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5045
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4110
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3365
        1865SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5.0 for TZ, NSA and SuperMassive

        FW Version 6.5.0 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium OCTEON III (CN7XXX)
          • Cavium OCTEON II (CN6XXX)
        12/22/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4109
        1864DocuSign, Inc.
        221 Main St.
        Suite 1000
        San Francisco, CA 94105
        USA

        Ezer Farhi
        Ezer.Farhi@docusign.com
        972-3-9279529

        DocuSign-SA-MAIN

        8.5 (Firmware)


        DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization's end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

          • Intel® Xeon Quad-Core
        12/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3363
        1863Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto Kernel Module v8.0 (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within tvOS.

          • Apple A10X Fusion w/ tvOS 11
        12/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3362
        1862Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within tvOS.

          • Apple A10X Fusion w/ tvOS 11
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5040
        1861Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

          • Apple A10X Fusion w/ tvOS 11
        12/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3361
        1860Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto Kernel Module v8.0 (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within tvOS.

          • Apple A10X Fusion w/ tvOS 11
        12/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5039
        1859Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 7 GnuTLS C Implementation

        R7-2.0.0


        GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

          • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
        12/22/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5038, AES #5042
        1858Extreme Networks
        6480 Via Del Ora
        San Jose, CA 95119
        USA

        Craig J Ficik
        cficik@extremenetworks.com
        603-9525922
        Fax: 404-806-5377

        Extreme Networks Summit Series

        22.3 (Firmware)


        Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

          • Cavium Octeon II
        12/15/2017
        • Counter:
          • Modes: AES-128, AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5037
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: HMAC #3359
        1857Extreme Networks
        6480 Via Del Ora
        San Jose, CA 95119
        USA

        Craig J Ficik
        cficik@extremenetworks.com
        603-952-5922
        Fax: 404-806-5377

        Extreme Networks Summit Series

        22.3 (Firmware)


        Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

          • Intel Atom C series
        12/15/2017
        • Counter:
          • Modes: AES-128, AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5036
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: HMAC #3358
        1856Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A10 Fusion w/ iOS 11
        12/15/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3357
        1855Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A11 Bionic w/ iOS 11
        12/15/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3356
        1854Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A10X Fusion w/ iOS 11
        12/15/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3355
        1853Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A9X w/ iOS 11
        12/15/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3354
        1852Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A9 w/ iOS 11
        12/15/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3353
        1851Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A8X w/ iOS 11
        12/15/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3352
        1850Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A8 w/ iOS 11
        12/15/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3351
        1849Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

          • Apple A7 w/ iOS 11
        12/15/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3350
        1848Infotecs
        77 Water Street
        office 853
        New York, NY 10005
        USA

        Aleksandr Tkachev
        Aleksandr.Tkachev@infotecs.us
        +1 (646) 589-8571

        Andrey Krasikov
        krasikov@infotecs.us
        1(646) 274-1494

        ViPNet Common Crypto Core Library (Kernel)

        2.0


        The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code.

          • Intel® Core i5-3337U w/ Linux Debian 7.11 (64 bit)
          • Intel® Core i7-3632QM w/ Windows 10 (64-bit)
        12/15/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5035
        1847Infotecs
        77 Water Street
        office 853
        New York, NY 10005
        USA

        Aleksandr Tkachev
        Aleksandr.Tkachev@infotecs.us
        +1 (646) 589-8571

        Vladimir Kuryndin
        kurindinvv@infotecs.us
        +7 (495) 737-6192
        Fax: +7 (495) 737-7278

        ViPNet Common Crypto Core Library (User Space)

        2.0


        n/a

          • n/a w/ Windows 10 (64-bit)
        12/15/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5034
        1846Infotecs
        77 Water Street
        office 853
        New York, NY 10005
        USA

        Aleksandr Tkachev
        Aleksandr.Tkachev@infotecs.us
        +1 (646) 589-8571

        Andrey Krasikov
        krasikov@infotecs.us
        1(646) 274-1494

        ViPNet Common Crypto Core Library (User Space)

        2.0


        The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code.

          • Intel® Core i5 w/ MacOS X 10.12
          • Apple A10 Fusion w/ iOS 10.3.3
          • Samsung Exynos 7880 w/ Android 7.0
          • Intel® Core i5-3337U w/PAA w/ Linux Debian 7.11 (64-bit)
          • Intel® Core i7-3632QM w/ Windows 10 (64-bit)
          • Intel® Core i5-3337U w/ Linux Debian 7.11 (64-bit)
        12/15/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5033
        1845Samsung Electronics Co., Ltd.
        1-1, Samsungjeonja-ro
        Hwaseong-si, Gyeonggi-do 18448
        KOREA

        Jisoo Kim
        jisoo74.kim@samsung.com
        82-31-8096-2832
        Fax: 823180008000(+62832)

        EPiC2 DRBG

        EPiC2 DRBG V1.0 (Firmware)


        PM1723b Series is high-performance Self-Encrypting SSD supporting NVMe Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and Hash_DRBG for key generation.

          • Cortex R7 ARM-based CPU
        12/15/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4072
        1844DELL, Inc.
        One Dell Way
        Round Rock, Texas 78682
        USA

        Alaric Silveira
        Alaric.Silveira@dell.com

        Gang Liu
        gang_liu@dell.com
        +1 512 728 5545

        Dell Crypto Library for Dell iDRAC and Dell CMC

        2.4


        The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

          • ARMv7 NPCMX50 w/ Linux 4.1.12
        12/8/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5032
        1843McAfee, Inc.
        2821 Mission College Blvd.
        Santa Clara, CA 95054
        USA

        Andy Nissen
        andy.nissen@intel.com
        651-770-6151

        McAfee Advanced Threat Defense

        4.0


        A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

          • Intel Xeon w/ Linux 4.4.27
        12/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5031
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4090
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3345
        1842Certes Networks, Inc.
        300 Corporate Center Drive
        Suite 140
        Pittsburgh, PA 15108
        USA

        Sean Everson
        sean.everson@certesnetworks.com
        1.412.357.1130
        Fax: 1.412.262.2574

        Gary Brunner
        gary.brunner@certesnetworks.com
        1.412.200.2177
        Fax: 1.412.262.2574

        CryptoFlow Net Creator Java Crypto Module

        1.0


        The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

          • Intel Xeon E3-1270v5 w/ CentOS 6.7
        12/8/2017
        • Counter:
          • Modes: AES-128, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5028
        1841RSA Security LLC
        174 Middlesex Turnpike
        Bedford, MA 01730
        USA

        FIPS Program
        fips-program@rsa.com

        RSA BSAFE® Crypto-J JSAFE and JCE Software Module

        6.2.4


        RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

          • Intel Core i5 w/ Windows 10 (64-bit)
          • Intel Xeon w/ CentOS 7.3
          • Qualcomm Snapdragon w/ Android 7.1.2
        12/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #5026
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #4085
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: HMAC #3340
        1840Konica Minolta, Inc.
        2970, Ishikawa-machi
        Hachioji-shi, Tokyo 192-8505
        Japan

        R&D Administration Division, R&D Headquarters Business Techn

        Konica Minolta PP Crypto Library

        1.0 Rev.1 (Firmware)


        Konica Minolta PP Crypto Library is used in bizhub PRO 1100 and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generation/verification, AES, hash function including SHA and HMAC_DRBG.

          • Intel(R) Pentium G3420
        12/8/2017
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3339
        1839Ruckus Wireless, Inc.
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Suneetha Sarala
        Suneetha.Sarala@arris.com
        650-265-4200

        Julie Lu
        Julie.Lu@arris.com
        650-265-4200

        BRCD-IP-CRYPTO-VER-4.0

        BRCD-IP-CRYPTO-VER-4.0 (Firmware)


        Firmware algorithm for the Brocade FastIron Series

          • Freescale P2041
        12/8/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5024
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4083
        1838Ruckus Wireless, Inc.
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Suneetha Sarala
        Suneetha.Sarala@arris.com
        650-265-4200

        Julie Lu
        Julie.Lu@arris.com
        650-265-4200

        BRCD-IP-CRYPTO-VER-4.0

        BRCD-IP-CRYPTO-VER-4.0 (Firmware)


        Firmware algorithm for the Brocade FastIron Series

          • ARM Cortex A57
        12/8/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5023
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4082
        1837Ruckus Wireless, Inc.
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Suneetha Sarala
        Suneetha.Sarala@arris.com
        650-265-4200

        Julie Lu
        Julie.Lu@arris.com
        650-265-4200

        BRCD-IP-CRYPTO-VER-4.0

        BRCD-IP-CRYPTO-VER-4.0 (Firmware)


        Firmware algorithm for the Brocade FastIron Series

          • ARM Cortex A9
        12/8/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5022
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4081
        1836SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sangala
        usanagala@SonicWALL.com
        408-962-6248
        Fax: 408-745-9300

        Mike Vache
        mvache@sonicwall.com
        408-962-6760
        Fax: 408-745-9300

        avcrypto

        12.1.0 (Firmware)


        Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

          • Intel Core i5 with AES-NI
          • Intel Xeon with AES-NI
        12/8/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5020
        1835Neopost Technologies, S.A.
        42-46 Avenue Aristide Briand
        Bagneux, Hauts-de-Seine 92220
        France

        Adriana Rosca
        a.rosca@neopost.com
        +33 1 45 36 61 04
        Fax: +33 1 45 36 30 10

        Neopost PSD

        A0038116B (Firmware)


        Neopost Postal Secure Device (PSD) for low to high range of franking machines

          • NXP LPC3220 Microprocessor
        11/30/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #2874
        1834HGST, a Western Digital company
        3403 Yerba Buena Road
        San Jose, CA 95119
        USA

        Michael Williamson
        michael.williamson@wdc.com
        408-717-8458

        Vishal Tanna
        Vishal.Tanna@wdc.com
        408-801-2499

        TCG Crypto Library

        SVN Revision 2038 (Firmware)


        Cryptographic library support for Western Digital's HGST branded Self-Encrypting Drives (SEDs).

          • Marvell ARM Cortex R5
        11/30/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3333
        1833Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within tvOS.

          • Apple A10X Fusion w/ tvOS 11
        11/30/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3332
        1832Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

          • Apple A10X w/ tvOS 11 Fusion
        11/30/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3331
        1831Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within tvOS.

          • Apple A10X Fusion w/ tvOS 11
        11/30/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5015
        1830Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple tvOS CoreCrypto Module v8.0 (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within tvOS.

          • Apple A10X Fusion w/ tvOS 11
        11/30/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5014
        1829Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple A10X Fusion w/ iOS 11
        11/30/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5009
        1828Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        Cisco Security Crypto Virtual

        F6.2


        The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

          • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
        11/30/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5008
        1827Brocade Communications Systems LLC
        120 Holger Way
        San Jose, CA 95110
        USA

        Hamid Sabouti
        hamid.sobouti@broadcom.com
        408-333-4150
        Fax: 408-333-3844

        Brocade Fabric OS FIPS Cryptographic Module

        8.2.0


        Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

          • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
          • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
        11/30/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #5006
        1826SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE NSS on x86 with AES-NI

        2.0


        SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        11/30/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4070
        1825SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE NSS on x86 without AES-NI

        2.0


        SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        11/30/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4069
        1824SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE NSS z13

        2.0


        SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

          • z13 w/ SUSE Linux Enterprise Server 12 SP2
        11/30/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4068
        1823SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sangala
        usanagala@SonicWALL.com
        408-962-6248
        Fax: 408-745-9300

        Mike Vache
        mvache@sonicwall.com
        408-962-6760
        Fax: 408-745-9300

        avcrypto

        12.1.0 (Firmware)


        Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

          • Intel Xeon with AES-NI
        11/30/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5001
        1822SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        Usha Sangala
        usanagala@SonicWALL.com
        408-962-6248
        Fax: 408-745-9300

        Mike Vache
        mvache@sonicwall.com
        408-962-6760
        Fax: 408-745-9300

        avcrypto

        12.1.0 (Firmware)


        Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

          • Intel Core i5 with AES-NI
        11/30/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #5000
        1821Lexmark International, Inc.
        740 West New Circle Road
        Lexington, KY 40550
        USA

        Graydon Dodson
        gdodson@lexmark.com
        +1 859 232-6483

        Crypto Module (user)

        3.2


        Lexmark Crypto Module (user)

          • Marvell MV78460-B0 w/ Lexmark Linux v4
        11/22/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4998
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4064
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3321
        1820Lexmark International, Inc.
        740 West New Circle Road
        Lexington, KY 40550
        USA

        Graydon Dodson
        gdodson@lexmark.com
        +1 859 232-6483

        Crypto Module (user)

        3.2


        Lexmark Crypto Module (user)

          • Marvell 88PA6270C0 w/ Lexmark Linux v4
        11/22/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4997
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4063
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3320
        1819Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AVX)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

          • Intel i5 w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3319
        1818Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

          • Intel Core M w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3318
        1817Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

          • Intel Xeon w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3317
        1816Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

          • Intel i7 w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3316
        1815Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

          • Intel i5 w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3315
        1814Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AVX2)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

          • Intel Core M w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3314
        1813Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AVX2)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

          • Intel Xeon w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3313
        1812Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AVX2)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

          • Intel i7 w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3312
        1811Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AVX2)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

          • Intel i5 w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3311
        1810Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AVX)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

          • Intel Core M w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3310
        1809Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AVX)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

          • Intel i7 w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3309
        1808Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (AVX)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

          • Intel Xeon w/ macOS 10.13
        11/22/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3308
        1807Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Intel Core M w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4988
        1806Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Intel Xeon w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4987
        1805Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Intel i5 w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4986
        1804Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Intel i7 w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4985
        1803Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple A11 Bionic w/ iOS 11
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4984
        1802Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple A10 Fusion w/ iOS 11
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4983
        1801Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple A9X w/ iOS 11
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4982
        1800Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple A8 w/ iOS 11
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4981
        1799Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple A9 w/ iOS 11
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4980
        1798Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple A8X w/ iOS 11
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4979
        1797Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

          • Apple A7 w/ iOS 11
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4978
        1796Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Intel Core M w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4976
        1795Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Intel i7 w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4975
        1794Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Intel i5 w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4974
        1793Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Intel Xeon w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4973
        1792Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

          • Intel Core M w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4972
        1791Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

          • Intel Xeon w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4971
        1790Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

          • Intel i5 w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4970
        1789Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

          • Intel i7 w/ macOS 10.13
        11/22/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4969
        1788Qualcomm Technologies, Inc.
        5775 Morehouse Dr
        San Diego, CA 92121
        USA

        Yin Ling Liong
        yliong@qti.qualcomm.com
        858-651-7034
        Fax: 858-845-1523

        QTI Pseudo Random Number Generator (Version 2.3.1)

        Snapdragon 845


        Snapdragon 845 Pseudo Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

          • N/A
        11/22/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #4047
        1787Cisco Systems, Inc.
        170 W Tasman Dr
        San Jose, CA 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        919.392.6520

        CiscoSSL FIPS Object Module

        6.0 (Firmware)


        The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

          • Apple A10 on iOS 10.x
        11/17/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4956
        • Hash based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4046
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3304
        1786Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AVX2)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

          • Intel Xeon w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3303
        1785Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AVX2)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

          • Intel Core M w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3302
        1784Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AVX2)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

          • Intel i7 w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3301
        1783Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AVX2)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

          • Intel i5 w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3300
        1782Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AVX)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

          • Intel Xeon w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3299
        1781Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AVX)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

          • Intel Core M w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3298
        1780Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AVX)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

          • Intel i7 w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3297
        1779Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (AVX)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

          • Intel i5 w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3296
        1778Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

          • Intel Core M w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3295
        1777Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

          • Intel Xeon w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3294
        1776Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

          • Intel i7 w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3293
        1775Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

          • Intel i5 w/ macOS 10.13
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3292
        1774Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

          • Intel Xeon w/ macOS 10.13
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4947
        1773Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

          • Intel Core M w/ macOS 10.13
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4946
        1772Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

          • Intel i5 w/ macOS 10.13
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4945
        1771Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

          • Intel i7 w/ macOS 10.13
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4944
        1770Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        Pradeepa M R
        pradeepam@juniper.net

        Junos FIPS Version 15.1X49 - SRX345 - OpenSSL

        15.1 X49-D110 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Cavium Octeon III (CN7130)
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3291
        1769Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        Pradeepa M R
        pradeepam@juniper.net

        Junos FIPS Version 15.1X49 - SRX345 - Authentec

        15.1 X49-D110 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Cavium Octeon III (CN7130)
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3289
        1768Renesas Electronics Corporation
        5-20-1 Jousuihon-cho
        Kodaira-shi, Tokyo 187-8588
        Japan

        Hideyuki Tanaka
        hideyuki.tanaka.jc@renesas.com
        +81-42-312-6926
        Fax: +81-42-328-4374

        TSIP

        RX Family RX65N Version 1.03 (Firmware)


        The TSIP is hardware which consists of cryptographic accelerator, random number generator and access management circuit based on the chip-unique-ID. The TSIP is embedded in the general purpose MCUs, RX65N and RX651. Therefore, RX65N and RX651 can provide the TSIP secure cryptographic functions including strong key management.

          • n/a
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4940
        1767Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A11 Bionic w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4939
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3288
        1766Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple 10X Fusion w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4938
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3287
        1765Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A9X w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4937
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3286
        1764Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A10 Fusion w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4936
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3285
        1763Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

          • Apple A8 w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4935
        1762Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A8X w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4934
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3284
        1761Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A9 w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4933
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3283
        1760Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

          • Apple A10X Fusion w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4932
        1759Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A7 w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4931
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3282
        1758Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

          • Apple A8 w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4930
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3281
        1757Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

          • Apple A11 Bionic w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4929
        1756Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

          • Apple A10 Fusion w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4928
        1755Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

          • Apple A9X w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4927
        1754Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

          • Apple A9 w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4926
        1753Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

          • Apple A8X w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4925
        1752Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

          • Apple A7 w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4924
        1751Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A11 Bionic w/ iOS 11
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3280
        1750Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A10X Fusion w/ iOS 11
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3279
        1749Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A10 Fusion w/ iOS 11
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3278
        1748Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A9X w/ iOS 11
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3277
        1747Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A8X w/ iOS 11
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3276
        1746Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Apple A11 Bionic w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4923
        1745Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A9 w/ iOS 11
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3275
        1744Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A8 w/ iOS 11
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3274
        1743Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Apple A9 w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4922
        1742Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Apple A10X Fusion w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4921
        1741Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Apple A8X w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4920
        1740Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Apple A10 Fusion w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4919
        1739Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Apple A9X w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4918
        1738Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Apple A8 w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4917
        1737Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

          • Apple A7 w/ iOS 11
        11/17/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4916
        1736Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Kernel Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A7 w/ iOS 11
        11/17/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3273
        1735Cisco Systems, Inc.
        170 West Tasman Dr.
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        Cisco Security Crypto

        F6.2 (Firmware)


        The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

          • Intel Atom C2xxx Family, Intel Xeon 34xx Family
          • Intel Xeon E Family
          • Intel Xeon D Family
        11/17/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4905
        1734Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Microsoft Surface Hub Virtual TPM Implementations

        10.0.15063.674


        The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
        11/17/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4904
        1733Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations

        10.0.16299


        The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
          • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
        11/17/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4903
        1732Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Microsoft Surface Hub SymCrypt Cryptographic Implementations

        10.0.15063.674


        The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
        11/17/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4902
        1731Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

        10.0.15254


        The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

          • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
          • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
          • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
          • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
        11/17/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4901
        1730Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

        10.0.16299


        The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
          • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
          • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
          • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
        11/9/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4897
        1729Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A9X w/ iOS 11
        11/9/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3266
        1728Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A10X Fusion w/ iOS 11
        11/9/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3265
        1727Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A11 Bionic w/ iOS 11
        11/9/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3264
        1726Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A8 w/ iOS 11
        11/9/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3263
        1725Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A8X w/ iOS 11
        11/9/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3262
        1724Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A7 w/ iOS 11
        11/9/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3261
        1723Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A9 w/ iOS 11
        11/9/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3260
        1722Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Module (VNG)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

          • Apple A10 Fusion w/ iOS 11
        11/9/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3259
        1721Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple A10 Fusion w/ iOS 11
        11/9/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4877
        1720Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple A8X w/ iOS 11
        11/9/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4876
        1719Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple A11 Bionic w/ iOS 11
        11/9/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4875
        1718Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple A10X Fusion w/ iOS 11
        11/9/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4874
        1717Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple A9 w/ iOS 11
        11/9/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4873
        1716Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple A9X w/ iOS 11
        11/9/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4872
        1715Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple A8 w/ iOS 11
        11/9/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4871
        1714Apple Inc.
        1 Infinite Loop
        Cupertino, CA 95014
        USA

        Shawn Geddis
        geddis@apple.com
        (669)227-3579
        Fax: (866)315-1954

        Apple iOS CoreCrypto v8 Userspace Module (Assembler)

        8.0


        Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

          • Apple A7 w/ iOS 11
        11/9/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4870
        1713Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tinri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2680 @ 2399MHz without AES-NI w/ Tintri OS 4.5
        11/9/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4861
        1712Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2620 @ 2100MHz without AES-NI w/ Tintri OS 4.5
        11/9/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4860
        1711Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA
        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          11/9/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4860
          1710Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2609 @ 1699MHz without AES-NI w/ Tintri OS 4.5
          11/9/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4859
          1709Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2680 @ 2399MHz with AES-NI w/ Tintri OS 4.5
          11/9/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4858
          1708Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2620 @ 2100MHz with AES-NI w/ Tintri OS 4.5
          11/9/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4857
          1707Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms by the module have been made.

            • Intel Xeon E5-2609 @ 1699MHz with AES-NI w/ Tintri OS 4.5
          11/9/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4856
          1706Ciena Corporation
          7035 Ridge Road
          Hanover, MD 21076
          USA

          Kevin Meagher
          KMeagher@ciena.com

          Ciena 6500 Packet Optical Family

          12.3


          Ciena's Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

            • PowerQUICC II w/ VxWorks 6.1
            • PowerQUICC II w/ VxWorks 6.3
          11/3/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4855
          1705Hewlett Packard Enterprise
          8000 Foothills Blvd.
          Roseville, CA 95747
          USA

          Susan Scotten
          susan.scotten@hpe.com
          1-916-540-1109

          Aruba Campus Switch Series Crypto Library

          16.04 (Firmware)


          Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

            • Freescale P2020 Dual Core
            • Dual Core ARM Coretex
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4853
          1704Gemalto
          20 Colonnade Road, Suite 200
          Ottawa, ON K2E7M6
          Canada

          Security and Certifications Team
          SecurityCertifications@gemalto.com

          SafeXcel 3120 Chip

          SF114-011206-001A, v2.9.5


          The Gemalto SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution.

            • N/A
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4849
          1703Thales e-Security Inc.
          900 South Pine Island Road
          Suite 710
          Plantation, FL 33324
          USA

          Natalya Robert
          natalya.robert@thalesesec.com
          954-888-6268

          Robert Burns
          robert.burns@thalesesec.con
          954-888-6215

          Vormetric Data Security Manager Virtual Appliance Module

          6.0.2


          The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

            • Intel Xeon w/ Centos 7.2 on VMware ESXi 6.5.
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4846
          1702Thales e-Security Inc.
          900 South Pine Island Road
          Suite 710
          Plantation, FL 33324
          USA

          Natalya Robert
          natalya.robert@thalesesec.com
          954-888-6268

          Robert Burns
          robert.burns@thalesesec.con
          954-888-6215

          Vormetric Data Security Manager Module

          6.0.2 (Firmware)


          The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

            • Intel Xeon
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4845
          1701Pure Storage, Inc.
          650 Castro Street
          Suite 400
          Mountain View, CA 94041
          USA

          John Fuchigami
          jfuchigami@purestorage.com
          800-379-7873

          Flash Array Crypto Library

          1.2.0


          Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

            • Intel Xeon x64 CPU with AES-NI (E3/E5/E7 Family) w/ Purity 4
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4844
          1700F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP vCMP on B4450 OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4841
          1699SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE libgcrypt using generic C implementation

          3.0


          This test covers generic C implementation of multiple algorithms.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          11/3/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4840
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3982
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3241
          1698F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP vCMP on B2250 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4839
          1697F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP 10350F TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4838
          1696F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B4450N TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4837
          1695F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038
          Fax: ~

          BigIP B2250 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4836
          1694F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP vCMP on B4450 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4835
          1693F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B4000 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4834
          1692F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP i5820 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1630
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4833
          1691F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP B7000 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E3-1275
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4832
          1690F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP i7820 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1650
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4834
          1689F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BigIP i4000 TMM Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1630
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4830
          1688F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP B4450N OpenSSL Software Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658A
          11/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4829
          1687F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP B2250 OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          10/27/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4828
          1686F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP 10350F OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          10/27/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4827
          1685F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP vCMP on B2250 OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-2658
          10/27/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4826
          1684F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP B4000 OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU
          10/27/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4825
          1683F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP i4000 OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1630
          10/27/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4824
          1682F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP i7820 OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1650
          10/27/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4823
          1681F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP i5820 OpenSSL Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

            • Intel(R) Xeon(R) CPU E5-1630
          10/27/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4822
          1680F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          BIGIP B7000 OpenSSL Software Implementation

          13.1.0 (Firmware)


          F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP and VIPRION hardware

            • Intel(R) Xeon(R) CPU E3-1275
          10/27/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4821
          1679McAfee, Inc.
          2821 Mission College Blvd.
          Santa Clara, CA 95054
          USA

          Mark Hanson
          Mark_Hanson@McAfee.com

          McAfee NSP NS Crypto Lib

          n.a 2.0.5_9.1.17.2 (Firmware)


          Cryptographic services for the McAfee NSP Intrusion Prevention appliance

            • Intel Atom C Family
            • Intel Xeon E5 Family
          10/27/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4820
          1678
          10/27/2017
            1677McAfee, Inc.
            2821 Mission College Blvd.
            Santa Clara, CA 95054
            USA

            Mark Hanson
            Mark_Hanson@McAfee.com

            McAfee NSP NS Crypto Lib

            n.a 2.0.5_9.1.17.2 (Firmware)


            Cryptographic services for the McAfee NSP Intrusion Prevention appliance

              • Intel Atom C Family
            10/20/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4817
            1676Synopsys, Inc.
            690 East Middlefield Road
            Mountain View, CA 94043
            USA

            Dana Neustadter
            danan@synopsys.com
            +1(613)595-9836

            DWC Cryptography Software Library

            4.2.0


            The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

              • ARC® EM7D Processor with CryptoPack w/ n/a
            10/20/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4816
            1675IBM
            2455 South Rd
            Poughkeepsie, NY 12601
            USA

            Thomas Morris Jr
            tmorrisj@us.ibm.com
            1-845-435-5538

            William Santiago
            wsf1@us.ibm.com
            1-845-435-9265

            Miniboot 1.30 with 00CW683

            Andretta 2.0 (00CW683) MB1.30 Hash E215 7B6F (Firmware)


            Miniboot implemented algorithms with hardware acceleration

              • IBM PowerPC 405
            10/20/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4815
            1674IBM
            2455 South Rd
            Poughkeepsie, NY 12601
            USA

            Thomas Morris Jr
            tmorrisj@us.ibm.com
            1-845-435-5538

            William Santiago
            wsf1@us.ibm.com
            1-845-435-9265

            Miniboot 1.30 with 00KP899

            Andretta 2.0 (00KP899) MB1.30 Hash E215 7B6F (Firmware)


            Miniboot implemented algorithms with hardware acceleration

              • IBM PowerPC 405
            10/20/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4814
            1673Tandberg Data
            10155 Westmoor Dr., Suite 155
            Westminster, CO 80021
            USA

            Neil Donohoe
            ndonohoe@overlandstorage.com
            720-598-7265

            Dan Walkes
            dwalkes@overlandstorage.com
            720-598-7264

            RDX RNG

            1.0.1 (Firmware)


            DRBG implementation

              • Altera Nios Classic
            10/20/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3955
            1672IBM Corporation
            9032 S Rita Road
            Tucson, AZ 85744
            USA

            Kevin D. Butt
            kdbutt@us.ibm.com
            520-799-5280

            IBM LTO 7 Cryptographic Firmware Library

            1.0 (Firmware)


            Firmware cryptographic implementation that adds secure key channel capabilities to the IBM LTO 7 tape drive.

              • IBM PowerPC 405
            10/13/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-512
              • Prerequisite: SHS #3954
            1671Infoblox
            3111 Coronado Drive
            Santa Clara, CA 95054
            USA

            Dave Funk
            dfunk@infoblox.com
            408-986-5591

            NIOS Cryptographic Library

            2.0 (Firmware)


            Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

              • Intel Xeon w/ VMware ESXi 5
              • Intel Xeon
              • Intel Xeon w/ VMware ESXi 6
              • Intel Core i3
            10/13/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4805
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3953
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3215
            1670McAfee, Inc.
            2821 Mission College Blvd.
            Santa Clara, CA 95054
            USA

            Mark Hanson
            Mark_Hanson@McAfee.com
            972.963.7326

            McAfee NSP NS Crypto Lib

            2.0.5_9.1.17.1 (Firmware)


            Cryptographic services for the McAfee NSP Intrusion Prevention appliances

              • Intel Xeon Gold Family
            10/13/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4801
            1669Tintri, Inc.
            303 Ravendale Drive
            Mountain View, CA 94043
            USA

            Farzam Tajbakhsh
            ftajbakhsh@tintri.com
            (650) 810-8266

            Tintri Cryptographic Module

            1.0


            The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

              • Intel Xeon E5-2680 @ 2399MHz without AES-NI w/ Tintri Linux version 4.4.0.1
            10/6/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4800
            1668Tintri, Inc.
            303 Ravendale Drive
            Mountain View, CA 94043
            USA

            Farzam Tajbakhsh
            ftajbakhsh@tintri.com
            (650) 810-8266

            Tintri Cryptographic Module

            1.0


            The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

              • Intel Xeon E5-2620 @ 2100MHz without AES-NI w/ Tintri Linux version 4.4.0.1
            10/6/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4799
            1667Tintri, Inc.
            303 Ravendale Drive
            Mountain View, CA 94043
            USA

            Farzam Tajbakhsh
            ftajbakhsh@tintri.com
            (650) 810-8266

            Tintri Cryptographic Module

            1.0


            The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

              • Intel Xeon E5-2609 @ 1699MHz without AES-NI w/ Tintri Linux version 4.4.0.1
            10/6/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4798
            1666Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Bill Shelton
            bshelton@juniper.net
            408-745-2000
            Fax: 408-745-2100

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS Version 17.3R1-OpenSSL

            17.3R1 (Firmware)


            The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

              • Intel Xeon D-1531
            10/6/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3202
            1665Zebra Technologies Corporation
            3 Overlook Point
            Lincolnshire, IL 60069
            USA

            Erv Comer
            Erv.Comer@zebra.com
            480-628-7901

            Rob Franzo
            Rob.Franzo@zebra.com
            631-291-2341

            DRBG of QTI Cryptographic Module on Crypto 5 Core

            5.f4-64


            This cryptographic module implements block ciphers including AES, Triple-DES, hash functions SHA-1 and SHA-256, Message Authentication Code functions HMAC and CMAC and DRBG 800-90A.

              • Snapdragon 650 w/ Android 6.0.1
            9/29/2017
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4792
            1664Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Linux Kernel crypto API (shaavx)

            5.0


            Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            9/29/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3931
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-512
              • Prerequisite: HMAC #3194
            1663Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Linux Kernel crypto API (shassse3)

            5.0


            Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            9/29/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3930
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-512
              • Prerequisite: HMAC #3193
            1662SafeLogic, Inc.
            530 Lytton Ave
            Suite 200
            Palo Alto, CA 94301
            USA

            SafeLogic Sales
            na

            CryptoComply Server Engine

            2.1


            CryptoComply | Server is a standards-based "drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at restencryption, and secure communications to a trusted implemntation.

              • Intel i7 w/ CentOS 7
            9/29/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4790
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3929
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3192
            1661MediaTek Inc.
            No.1, Dusing Rd. 1, Hsinchu Science Park
            Hsinchu, Taiwan 30078
            Taiwan

            William Cheng
            William.cheng@mediatek.com
            +1-858-731-9200
            Fax: +1-858-731-9201

            MingHsien Hsieh
            minghsien.hsieh@mediatek.com
            +886-3-567-0766
            Fax: +886-3-578-7610

            MTK CryptoCore V1.0 Secure Core

            MTK CryptoCoreV1.0 S Core


            The MTK CryptoCore cryptographic module (hereafter referred to as “the module”) is designed to provide foundational security services for the platform, including secure boot, secure life cycle state, platform identity and key management. It offers high-throughput cryptography operations, suitable for a diverse set of use cases.

              • N/A
            9/26/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4789
            1660Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Linux Kernel crypto API (shagen)

            5.0


            Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            9/26/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3925
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3189
            1659Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Linux Kernel crypto API (aesni)

            5.0


            Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            9/26/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4787
            1658Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Linux Kernel crypto API (aesgen)

            5.0


            Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            9/26/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4786
            1657Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Linux Kernel crypto API (aesasm)

            5.0


            Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            9/26/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4784
            1656Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Linux Kernel crypto API (shaavx2)

            5.0


            Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            9/26/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3924
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3188
            1655Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Bhadresh Udani
            bhadresh.udani@hpe.com
            +91 9886399320

            Premnath M
            premnath.mangal@hpe.com
            +91 9845369405

            HPE BladeSystem c-Class Virtual Connect Firmware OpenSSL libcrypto Library 1.0.2j

            4.65 (Firmware)


            This is a standalone general-purpose cryptography library providing all necessary crypto functionality.

              • FreeScale MPC8535
            9/26/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4777
            1654Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Hridya Valakkadavil Thilakan
            hridya-valakkadavil.thilakan@hpe.com

            Aprana Shrivastava
            aprana.shrivastava@hpe.com

            HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libcrypto Library 1.0.2h

            4.71 (Firmware)


            The module provides administrative control of HPE BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure.

              • PowerPC 440EPx
            9/26/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4776
              </