Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Product Name
Description
A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.
Version
66005f41fbc3529ffe8d007708756720529da20d
Type
SOFTWARE
Vendor
Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA
Contacts
Adam Langley
security@chromium.org

Validations

Number
Date
Operating Environments
Algorithm Capabilities
Component 2033
8/2/2018
  • Debian Linux 4.9.0 (Rodete) on Intel Xeon CPU E5-2680 with PAA
  • Debian Linux 4.9.0 (Rodete) on Intel Xeon CPU E5-2680 without PAA
  • Ubuntu Linux 18.04 on POWER9 with PAA
  • Ubuntu Linux 18.04 on POWER9 without PAA
  • KAS-ECC Component
    • Function: Key Pair Generation
    • Scheme:
      • Ephemeral Unified:
        • KAS Role: Initiator, Responder
        • KDF without Key Confirmation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-224
              • Curve: P-224
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
    Prerequisites: