Cryptographic Algorithm Validation Program CAVP

Description
The Brocade cryptographic library used in Brocade IP products implements crypto operations in software. The Brocade One strategy helps simplify networking infrastructures through innovative technologies and solutions.
Version
FIFIPS07300_0314121830 (Firmware)
Type
SOFTWARE
Vendor
Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA
Contacts
Bipin Agarwal
agarwalb@brocade.com
408-333-4830
408-333-4885

Validations

Number
Date
Operating Environments
Algorithm Capabilities
SHS 1871
8/8/2012
  • Freescale MPC 8544E
    • Freescale MPC 8544E
  • SHA-1
    • Message Length: 0-51200 Increment 8
  • SHA-256
    • Message Length: 0-51200 Increment 8
  • SHA-384
    • Message Length: 0-102400 Increment 8
  • SHA-512
    • Message Length: 0-102400 Increment 8
TDES 1363
8/8/2012
  • Freescale MPC 8544E
    • Freescale MPC 8544E
  • TDES-CBC
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-ECB
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
AES 2150
8/8/2012
  • Freescale MPC 8544E
    • Freescale MPC 8544E
  • AES-CBC
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-ECB
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
DRBG 239
8/8/2012
  • Freescale MPC 8544E
    • Freescale MPC 8544E
HMAC 1317
8/8/2012
  • Freescale MPC 8544E
    • Freescale MPC 8544E
ECDSA 324
8/8/2012
  • Freescale MPC 8544E
    • Freescale MPC 8544E
DSA 668
8/8/2012
  • Freescale MPC 8544E
    • Freescale MPC 8544E
RSA 1106
8/8/2012
  • Freescale MPC 8544E
    • Freescale MPC 8544E
  • RSA SigGen (186-2)
      • Capabilities:
        • Signature Type: PKCS 1.5
        • Modulo: 1024, 1536, 2048, 3072, 4096
        • Hash Algorithm: SHA-1, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • RSA SigVer (186-2)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 1536
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 4096
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
    Prerequisites:
Created October 05, 2016, Updated June 22, 2020