Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

DRBG Validation List

This list identifies implementations that have been validated as conforming to the Deterministic Random Bit Generator (DRBG) Algorithm, as specified in Special Publication 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, using tests described in the DRBG Validation Suite (DRBGVS).

As of June 2015, in accordance with SP800-90A Revision 1, and November 2015, in accordance with SP800-131A Revision 1, the use of Dual_EC_DRBG is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
2081Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
4/13/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4314
2080BiObex, LLC
11501 Sunset Hills Rd
Suite 200
Reston, VA 22190
USA

Arthur Joyce
ajoyce@biobex.com
571-313-0969

SAFE-Key device

1.2.0.0 (Firmware)


The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

    • STM32F415
4/13/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4313
2079Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
4/13/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5370
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4312
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3558
2078IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL [1] with the OpenSSL FIPS Object Module [2]

1.0.2o [1]; 2.0.13 [2]


The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
4/13/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5369
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384
    • Prerequisite: SHS #4311
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384
    • Prerequisite: HMAC #3557
2077ClevX, LLC
9306 NE 125th Street
Kirkland, WA 98034
USA

Lev Bolotin
Lev.Bolotin@clevx.com
+1.425.820.9929

Marc Singer
Marc.Singer@clevx.com
425.820.9929

ClevX Datalock Cryptographic Library

ClevX-Datalock-v2.0 (Firmware)


ClevX Datalock Cryptographic Firmware Library

    • STM32L0x
4/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5366
2076VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
4/9/2018
  • Counter:
    • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5365, TDES #2709
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4307
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3553
2075wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

3.14.2


The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

    • Intel x86 w/ NetBSD v6.0.1
4/9/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4306
2074Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd.
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ancrypto.dylib

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • ARMv7 w/ iOS 10.3.3
4/9/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5363
2073Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
4/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5328
2072Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix''s Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
4/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5329
2071Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AES and SHA1 assembler

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5353
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: SHS #4304
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: HMAC #3550
2070Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5352
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4303
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3549
2069Bivio Networks, Inc.
4457 Willow Road, Suite 240
Pleasanton, CA 94588
USA

Raj Srinivasan
raj@bivio.net
(925) 924-8608
Fax: (925) 924-8650

OpenSSL

1.0.2k-8


OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

    • Intel Xeon Skylake w/ RHEL 7.4
3/30/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5349
2068Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
3/30/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4300
2067Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - Kernel

17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon III (CN7130)
    • Cavium Octeon II (CN6335)
    • Intel Xeon C5518
    • Cavium Octeon III (CN7020)
3/30/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3545
2066SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5.1 for TZ, NSA and SuperMassive

6.5.1 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN68XX)
    • Cavium Octeon II (CN66XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon II (CN62XX)
    • Cavium Octeon III (CN71XX)
3/30/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4297
2065Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

Aruba Common Cryptographic Module (CCM)

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • Intel Core i7 w/ Windows 10 64-bit User Mode
    • Intel Core i5 w/ Windows 10 32-bit User Mode
    • ARMv7 w/ Android 7.1
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5345
2064Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL VPAES and SHA1 SSSE3

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5344
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: SHS #4295
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1
    • Prerequisite: HMAC #3541
2063BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.1


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5343
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4294
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-512
    • Prerequisite: HMAC #3540
2062BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.1


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Intel Xeon w/ Windows Server 2016 with Oracle JRE 1.8.0
3/30/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5342
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4293
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-512
    • Prerequisite: HMAC #3539
2061Certes Networks, Inc.
300 Corporate Center Drive
Suite 140
Pittsburgh, PA 15108
USA

Sean Everson
sean.everson@certesnetworks.com
1.412.357.1130
Fax: 1.412.262.2574

Gary Brunner
gary.brunner@certesnetworks.com
1.412.200.2177
Fax: 1.412.262.2574

Certes Enforcement Point Cryptographic Library

1.0.2l (Firmware)


The Certes Enforcement Point Cryptographic Library provides cryptographic functionality for the Certes CEP appliances.

    • Intel Xeon Processor E3 v5 Family
    • Intel Atom Processor C Series
    • Intel Xeon Processor E5 v4 Family
3/30/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5338
2060Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - Authentec

17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon III (CN7020)
    • Broadcom XLP832
    • Cavium Octeon III (CN7130)
    • Cavium Octeon II (CN6335)
3/30/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3534
2059Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

CLint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • Intel Atom
3/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5333
2058Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

OpenSSL - EX4300

Junos OS 17.4 R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

    • Freescale e500mc
3/23/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3528
2057BeyondTrust
5090 N. 40th Street
Suite 400
Phoenix, AZ 85018
USA

David Allen
dallen@beyondtrust.com
1-800-234-9072, 9292

BeyondTrust Cryptographic Library

2.0.10


BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

    • Intel Xeon w/ Windows Server 2012 R2 Standard
3/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5327
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4279
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3525
2056Realia Technologies, S.L
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

Jesus Rodriguez
jrodriguez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Luis Jesus Hernandez
ljhernandez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Cryptosec Dekaton

1.1


The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

    • N/A
3/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5326
2055wolfSSL Inc
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Kaleb Himes
kaleb@wolfssl.com

wolfCrypt

3.12.6


wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

    • NS9210 w/ NET+OS v7.6
3/23/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4277
2054Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

JUNOS 17.3R2 - Kernel

17.3R2 (Firmware)


The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

    • Intel Xeon D
3/23/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3522
2053Digi International, Inc.
11001 Bren Road East
Minnetonka, MN 55343
USA

Donald Schleede
Donald.Scleede@digi.com
952-912-3444

Digi ConnectCore Security Module

1.0


The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

    • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
    • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
3/16/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5323
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4275
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3521
2052Digital Guardian, Inc.
860 Winter Street
Suite 3
Waltham, MA 02541
USA

Craig Hansen
201-572-3784

FIPS Kernel Mode Cryptographic Module (VSEC.SYS)

1.1


Previously called: Digital Guardian Security Kernel v1.1. VSEC.SYS is a Windows kernel mode export driver that provides FIPS Approved cryptographic services to Verdasys applications such as Digital Guardian.

    • Intel i7 Dual Core w/ Microsoft Windows 10 (64-bit)
3/16/2018
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4274
2051Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Kernel - EX4300

Junos OS 17.4 R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

    • Freescale e500mc
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3518
2050Fortinet Inc.
1090 Kifer Road
Sunnyvale, CA 94086-5301
USA

Alan Kaye
akaye@fortinet.com
613-225-9381 x7416
Fax: 613-225-9951

Fortinet FortiMail RNG Cryptographic Library 6.0

6.0 (Firmware)


This focuses on the firmware implementation of the Fortinet FortiMail RNG Cryptographic Library v6.0 running on Intel x86 compatible processors.

    • Intel Xeon
3/16/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5321
2049Mojo Networks, Inc.
339 N Bernardo Avenue, Suite 200
Mountain View, CA 94043
USA

Hemant Chaskar
hemant.chaskar@mojonetworks.com
(650) 961-1111
Fax: (650) 961-1169

Crypto Core

2.0.16-3-00 (Firmware)


Cryptographic library offering various cryptographic mechanisms in server.

    • Intel Xeon
3/16/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5318
2048Cisco Systems, Inc
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

7.0


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

    • ARMv8 w/ Android 7.1
    • Intel Core i5 w/ Windows 10 (with AES-NI)
    • Intel Core i7 w/ macOS 10.12 (with AES-NI)
    • Intel Core i5 w/ Windows 10
    • Cavium Octeon II 68XX w/ Linux 2.6
    • Intel Xeon w/ Linux 3.10 (with AES-NI)
    • Intel Pentium w/ Linux 3.4
    • ARMv8 w/ iOS 11.2
    • Intel Xeon w/ Linux 3.10 on VMware ESXI 6.0
3/16/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5310
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4267
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3513
2047Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Quicksec

Junos OS 17.4R1-S1 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3512
2046Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Quicksec

Junos OS 17.4R1-S1 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E3
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3511
2045Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Quicksec

Junos OS 17.4R1-S1


The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

    • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3510
2044Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - OpenSSL

Junos OS 17.4R1-S1


The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

    • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3509
2043Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - OpenSSL

Junos OS 17.4R1-S1 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3508
2042Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - OpenSSL

Junos OS 17.4R1-S1 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
3/16/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3507
2041Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Kernel

Junos OS 17.4R1-S1 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
3/9/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3503
2040Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Kernel

Junos OS 17.4R1-S1


The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

    • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
3/9/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3502
2039Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Kernel

Junos OS 17.4R1-S1 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E3
3/9/2018
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3501
2038Ciena Corporation
7035 Ridge Road
Hanover, MD 21076
USA

Patrick Scully
613-670-3207

Ciena Waveserver

1.5.1 (Firmware)


The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

    • Xilinx XC7Z030
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5302
2037Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

10.0.15063.728


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
    • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
    • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
    • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
    • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5300
2036Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); SymCrypt Cryptographic Implementations

10.0.14393.1770


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
    • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
    • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
    • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
    • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5295
2035Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Enterprise LTSB (version 1507); SymCrypt Cryptographic Implementations

10.0.10240.17643


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5291
2034Google LLC
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Adam Langley
security@chromium.org

BoringCrypto

ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

    • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5288
2033Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); SymCrypt Cryptographic Implementations

10.0.10586.1176


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
    • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
    • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/Windows 10 Mobile November Update (ARMv7)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
3/9/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5287
2032Docker, Inc.
144 Townsend Street
San Francisco, California 94107
USA

Rahim Ibrahim
security-team@docker.com
415-941-0376

Docker Enterprise Edition Crypto Library v 1.0

1.0


The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

    • Dual Intel E5-2670v3 w/ Red Hat Enterprise Linux v7.3
3/9/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5286
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4245
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3493
2031Docker, Inc.
144 Townsend Street
San Francisco, California 94107
USA

Rahim Ibrahim
security-team@docker.com
415-941-0376

Docker Enterprise Edition Crypto Library v 1.0

1.0


The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

    • Dual Intel E5-2670v3 w/ CentOS v7.3
3/9/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5285
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4244
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3492
2030DocuSign, Inc.
221 Main St.
Suite 1000
San Francisco, CA 94105
USA

Ezer Farhi
Ezer.Farhi@docusign.com
+972-39279529
Fax: +972-39230864

Moshe Harel
Moshe.Harel@docusign.com
+972-39279578
Fax: +972-39230864

PrivateServer

5.0.3 (Firmware)


PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

    • Intel® E3-1268LV3 Quad-Core
3/9/2018
  • HMAC based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: HMAC #3490
2029Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Key Hardware DRBG

2.0


Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG. The testing is applicable to the SEP HW DRBG implementation.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5279
2028Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple watchOS Secure Key Hardware DRBG

2.0


Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG. The testing is applicable to the SEP HW DRBG implementation.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5278
2027Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

2.0


Cryptographic hardware implementation offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5277
2026Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

2.0


Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5276
2025Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

2.0


Cryptographic hardware implementation offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5275
2024Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

2.0


Cryptographic hardware implementation offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5274
2023Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

2.0


Cryptographic hardware implementation offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5273
2022Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

2.0


Cryptographic hardware implementation offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5272
2021Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

1.2


Cryptographic hardware implementation offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5271
2020Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

1.2


Cryptographic hardware implementation offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
3/2/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5270
2019Splunk
270 Brannan Street
San Francisco, CA 94107
USA

Michael Arrowsmith
415-848-8400

Splunk Cryptographic Module

2.0.16


The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk''s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Intel Xeon E5 without PAA w/ Ubuntu 16.04
    • Intel Xeon E5 with PAA w/ Ubuntu 16.04
2/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5268
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4238
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3487
2018Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL with FOM 6.0

6.0


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Intel Xeon w/ ADE-OS v3.0
2/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5267
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4237
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3486
2017Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS OpenSSL Module

ArubaOS 6.5.1 (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Qualcomm IPQ8064
    • Qualcomm IPQ4029
    • NXP QorIQ T1024
2/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5266
2016IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL [1] with the OpenSSL FIPS Object Module [2]

1.0.2n [1]; 2.0.13 [2]


The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
2/23/2018
  • Counter:
    • Modes: AES-128, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5263
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384
    • Prerequisite: SHS #4234
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-256, SHA-384
    • Prerequisite: HMAC #3483
2015Hangzhou Hikvision Digital Technology Co., Ltd.
No.555 Qianmo Road, Binjiang District
Hangzhou, Zhejiang 310052
China

Jiadong Chen
chenjiadong@hikvision.com
+86 136 5663 1443

HikSSL Library

1.0.0


The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

    • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
2/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5262
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4233
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3482
2014Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

2.0


Cryptographic hardware implementation offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
2/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5261
2013Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Apple Secure Enclave Processor Hardware DRBG

1.2


Cryptographic hardware implementation offering various cryptographic mechanisms to Apple Secure Key Store''s DRBG.

    • N/A
2/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5260
2012Hangzhou Hikvision Digital Technology Co., Ltd.
No.555 Qianmo Road, Binjiang District
Hangzhou, Zhejiang 310052
China

Jiadong Chen
chenjiadong@hikvision.com
+86 136 5663 1443

HikSSL Library

1.0.0


The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

    • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
2/23/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5259
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4232
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3481
2011Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

Clint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • ARMv8
2/23/2018
  • Counter:
    • Modes: AES-256
    • Derivation Function States: Derivation Function used
    • Prediction Resistance Modes: Not Enabled
    • Prerequisite: AES #5258
2010Samsung Electronics Co., Ltd
416 Maetan-3dong, Yeongtong-gu
Suwon, Gyeonggi 152-848
South Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Samsung BoringSSL Cryptographic Module

v1.2


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • Samsung Electronics Exynos7883 w/ Android 8.0
    • Qualcomm MSM8998 w/ Android 8.0
    • Qualcomm MSM8996 w/ Android 8.0
    • Qualcomm SDM845 w/ Android 8.0
    • Samsung Electronics Exynos8890 w/ Android 8.0
    • Samsung Electronics Exynos9810 w/ Android 8.0
    • Samsung Electronics Exynos8895 w/ Android 8.0
    • Samsung Electronics Exynos7570 w/ Android 8.0
    • Samsung Electronics Exynos7884 w/ Android 8.0
2/16/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5255
2009Mocana Corporation
150 Mathilda Place
Suite 208
Sunnyvale, CA 94086
USA

Srinivas Kumar
fips@mocana.com
1-415-617-0055
Fax: 1-415-617-0056

Mocana Cryptographic Library

6.5.1f


The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

    • Intel Atom E3800 w/ Wind River Linux 6.0
2/16/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5252
2008
2/16/2018
    2007Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Marks
    seceval_us@oracle.com
    650-506-0391

    Oracle Acme Packet Cryptographic Library

    ECz8.0.0 (Firmware)


    The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

      • Intel Core i3
      • Intel Core i7
    2/16/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5247
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4225
    2006wolfSSL Inc
    10016 Edmonds Way
    Suite C-300
    Edmonds, WA 98020
    USA

    Todd Ouska
    todd@wolfssl.com
    503-679-1859

    Kaleb Himes
    kaleb@wolfssl.com

    wolfCrypt

    3.12.4


    wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

      • Intel(R) Core(TM) i5 w/ Windows 10 Pro
      • Intel(R) Xeon(R) E3-1270 w/ Debian 8.7.0
    2/16/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4222
    2005Gemalto
    Avenue du Jujubier
    Z.I Athelia IV
    La Ciotat, 13705
    France

    Frederic Garnier
    Frederic.Garnier@gemalto.com
    +33 442364368
    Fax: +33 442366953

    Didier Bonnet
    Didier.Bonnet@gemalto.com
    +33 442366803
    Fax: +33 442365545

    Gemalto Cryptographic library for IDCore 3130 on SLE78

    Infineon SLE78CLFX400VPHM 1.9 (Firmware)


    IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

      • Infineon SLE78 chip (M7892)
    2/16/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5243
    2004Evertz Microsystems
    5292 John Lucas Dr.
    Burlington, Ontario L7L 5Z9
    Canada

    Naveed Afzal
    nafzal@evertz.com
    905-335-3700

    EXE OpenSSL Cryptographic Module

    2v0_b1 (Firmware)


    Card for 6RU Shelf loaded with Evertz IPX

      • MPC8377E
    2/16/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5242
    2003Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 libgcrypt

    R7-2.0.0


    The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5237
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4217
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3469
    2002Oracle Communications
    100 Crosby Drive
    Bedford, MA 01730
    USA

    George Guo
    george.guo@oracle.com
    (781) 538-7399

    Chris Marks
    chris.marks@oracle.com
    (650) 506-0391

    Oracle Acme Packet Cryptographic Library

    E-CZ 8.0.0


    The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

      • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5236
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4216
    2001Oracle Communications
    100 Crosby Drive
    Bedford, MA 01730
    USA

    George Guo
    george.guo@oracle.com
    (781) 538-7399

    Chris Marks
    chris.marks@oracle.com
    (650) 506-0391

    Oracle Acme Packet Cryptographic Library

    E-CZ 8.0.0 (Firmware)


    The Acme Packet 1100 and 3900 feature Oracle''s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

      • Intel Xeon D-1548 (Intel Broadwell-DE)
      • Intel Atom C2358
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5235
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4215
    2000Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Allison Kim
    Allison.Kim@hpe.com
    +1 832 502 6651

    Catherine Schwartz
    Catherine.Schwartz@hpe.com
    +1 832 502 6140

    HPE Secure Encryption Engine v1.1

    PM8221


    HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

      • N/A
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5234
    1999Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Allison Kim
    Allison.Kim@hpe.com
    +1 832 502 6651

    Catherine Schwartz
    Catherine.Schwartz@hpe.com
    +1 832 502 6140

    HPE Secure Encryption Engine v1.1

    PM8237


    HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

      • N/A
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5233
    1998Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Allison Kim
    Allison.Kim@hpe.com
    +1 832 502 6651

    Catherine Schwartz
    Catherine.Schwartz@hpe.com
    +1 832 502 6140

    HPE Secure Encryption Engine v1.1

    PM8205


    HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

      • N/A
    2/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5232
    1997Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 libgcrypt

    R7-2.0.0


    The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

      • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5231
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4211
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3463
    1996Certicom Corp.
    4701 Tahoe Blvd, Building A
    5th Floor
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder® FIPS Core

    6.3.0


    Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

      • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
      • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
      • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
      • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
      • Intel Atom C3558 without AES-NI w/ QNX SDP 7
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
      • Intel Atom C3558 with AES-NI w/ QNX SDP 7
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5230
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4210
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3462
    1995IBM Corporation
    222 South Riverside Plaza
    Ste 1700
    Chicago, IL 60606
    USA

    Mark Seaborn
    mseaborn@us.ibm.com
    +1 312 423 6640x2354

    IBM Cloud Object Storage System's™ FIPS Cryptographic Module

    1.1


    The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''''''''s ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

      • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
      • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5229
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4209
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3461
    1994Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    libancrypto.so

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • Intel Core i7 w/ Linux 2.6 64-bit
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5228
    1993Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5227
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4207
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3459
    1992Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5226
    1991Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5225
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3458
    1990Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5224
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3457
    1989Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5221
    1988Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5219
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3456
    1987Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5217
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3455
    1986Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5216
    1985Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1 w/ watchOS 4
    2/9/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5215
    1984Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5212
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4202
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3454
    1983Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5211
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4201
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3453
    1982Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5210
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4200
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3452
    1981Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5209
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4199
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3451
    1980Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5208
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4198
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3450
    1979Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5207
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4197
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3449
    1978Gallagher Group
    181 Kahikatea Drive
    Hamilton 3206
    New Zealand

    Andrew Scothern
    andrew.scothern@gallagher.com
    +64-7-838-9800

    Simon Lawrence
    simon.lawrence@gallagher.com
    +64-7-838-9800

    Gallagher OpenSSL Cryptographic Module

    2.0.12


    Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

      • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5206
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4196
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3448
    1977Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5205
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4195
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3447
    1976Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5204
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4194
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3446
    1975Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5203
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4193
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3445
    1974Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3444
    1973Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5201
    1972Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5199
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3443
    1971Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5198
    1970Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5195
    1969Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10X Fusion w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5194
    1968Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5193
    1967Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5192
    1966Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5191
    1965Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5190
    1964Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5189
    1963Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5188
    1962Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5187
    1961Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3442
    1960Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5185
    1959Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3441
    1958Samsung Electronics Co., Ltd.
    R5, Maetan 3-dong Yeongton-gu
    Suwon-si, Gyeonggi 443-742
    Korea

    JungHa Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Samsung Kernel Cryptographic Module

    1.9


    Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

      • Exynos 9810 w/ Android 8 Kernel 4.9
      • SDM845 w/ Android 8 (Kernel 4.9)
    2/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3439
    1957Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    2/2/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5182
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3438
    1956Centrify Corporation
    3300 Tannery Way
    Santa Clara, California 95054
    USA

    Kitty Shih
    kitty.shih@centrify.com
    669-444-5238

    Centrify Cryptographic Library

    2.1


    Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

      • Intel Xeon X5650 x86_64 w/ RHEL 7.2
    2/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5181
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4185
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3437
    1955Samsung Electronics Co., Ltd
    416 Maetan-3dong, Yeongtong-gu
    Suwon, Gyeonggi 152-848
    South Korea

    Brian Wood
    be.wood@samsung.com
    +1-973-440-9125

    Jung Ha Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Samsung SCrypto Library

    v2.2


    Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

      • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
      • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
      • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
    2/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5180
    1954iStorage Limited
    iStorage House
    13 Alperton Lane
    Perivale
    Middlesex UB6 8DH
    England

    John Michael
    john@istorage-uk.com
    +44 (0)20 8991 6260
    Fax: +44 (0)20 8991 6277

    iStorage diskAshur2 Cryptographic Library

    00.04.17.01 (Firmware)


    The iStorage diskAshur2 cryptographic library is a firmware library that provides cryptographic functions for iStorage diskAshur2 range of PIN authenticated, hardware encrypted portable data storage devices. The cryptographic functions include AES-ECB-256, AES-CTR-256, SHA256, HMAC256, KWAE, KWAD and DRBG.

      • IST28398Q
    1/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5179
    1953Datrium
    385 Moffett Park Dr #205
    Sunnyvale, CA 94089
    USA

    R. Hugo Patterson
    info@datrium.com
    +1 (669) 721-9444

    Datrium FIPS Object Module

    2.0.12


    The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

      • Intel Xeon E5-2618L v4 w/ Linux 3.10
      • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
      • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5178
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4182
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3434
    1952Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3433
    1951Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5175
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3432
    1950Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5173
    1949Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5172
    1948Samsung Electronics Co., Ltd.
    1-1, Samsungjeonja-ro
    Hwaseong-si, Gyeonggi-do 18448
    KOREA

    Jisoo Kim
    jisoo74.kim@samsung.com
    82-31-8096-2832
    Fax: 823180008000(+62832)

    RFX DRBG

    RFX DRBG V1.0 (Firmware)


    PM 1643 Series is high-performance Self-Encrypting SSD supporting SAS 12G Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, RSA-PSS 2048 for FW authentication, and Hash_DRBG for key generation.

      • Cortex R7 ARM-based CPU
    1/26/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4178
    1947SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Sales
    sales@safelogic.com

    CryptoComply® Server

    2.1


    CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

      • Intel i7 w/ Windows Server 2012 R2
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5170
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4177
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3431
    1946Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Object Module

    2.0.14


    Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

      • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
      • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5168
    1945Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Object Module

    2.0.13


    Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

      • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5167
    1944Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Java API

    1.0.0


    Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

      • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
    1/26/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5166
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-512
      • Prerequisite: SHS #4173
    1943Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5165
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3426
    1942Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10X Fusion w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5164
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3425
    1941Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5163
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3424
    1940Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5162
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3423
    1939Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5161
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3422
    1938Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5160
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3421
    1937Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5159
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3420
    1936Mojo Networks, Inc.
    339 N Bernardo Avenue, Suite 200
    Mountain View, CA 94043
    USA

    Hemant Chaskar
    hemant.chaskar@mojonetworks.com
    (650) 961-1111
    Fax: (650) 961-1169

    Crypto Core

    2.0.16-1-01 (Firmware)


    Cryptographic library offering various cryptographic mechanisms in sensor and access point.

      • ARMv7
    1/26/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5158
    1935Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11 Fusion
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5157
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3418
    1934Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5156
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3417
    1933Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    1/26/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5155
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3416
    1932Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5154
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3415
    1931Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5153
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3414
    1930Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5152
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3413
    1929Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5151
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3412
    1928Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5150
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3411
    1927Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A10X Fusion w/ tvOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5149
    1926Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10X Fusion w/ tvOS 11
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3410
    1925Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A10X w/ tvOS 11 Fusion
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5145
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3409
    1924Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A10X Fusion w/ tvOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5143
    1923Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5131
    1922Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3408
    1921Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

      • Apple S1 w/ watchOS 4
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3407
    1920Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5128
    1919Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within watchOS.

      • Apple S1 w/ watchOS 4
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5127
    1918Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3406
    1917Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

      • Apple S1 w/ watchOS 4
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3405
    1916Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within watchOS.

      • Apple S1 w/ watchOS 4
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5126
    1915Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5125
    1914GDC Technology (USA) LLC
    1016 West Magnolia Boulevard
    Burbank, California 91506
    USA

    Pranay Kumar
    pranay@gdc-tech.com
    (852) 2507 9565
    Fax: (852) 2579 1131

    ChernYue Kwok
    Chernyue.kwok@gdc-tech.com
    (852) 2507 9552
    Fax: (852) 2579 1131

    Standalone IMB Cryptographic Module

    2.0.11 (Firmware)


    A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

      • Xilinx Zynq Ultrascale+
    1/19/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5122
    1913Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5118
    1912Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5115
    1911Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5114
    1910Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10X Fusion w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5110
    1909Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5106
    1908Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5103
    1907Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    1/19/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5102
    1906Silver Spring Networks
    230 W Tasman Drive
    San Jose, CA 95134
    USA

    Andrew Pendray
    support@ssni.com
    +1 669 770 4000
    Fax: +1 886 776 0015

    Silver Spring Networks Endpoint Security Module

    130-0117-02


    Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard crytographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

      • N/A
    1/19/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-512
      • Prerequisite: HMAC #3402
    1905Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Timothy McDonough
    timothy.mcdonough@hpe.com

    Hewlett Packard Enterpprise SSL Crypto Module

    2.1


    Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

      • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5099
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4147
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3401
    1904Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone SSL Crypto Library

    1.0


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
      • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5098
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4146
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3400
    1903Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone SSL Crypto Library

    1.0 (Firmware)


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
      • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5097
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4145
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3399
    1902Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Access Point SSL Crypto Library

    1.0 (Firmware)


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

      • Qualcomm IPQ8068
      • Qualcomm IPQ8064
      • Qualcomm IPQ8065
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5096
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4144
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3398
    1901Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (678) 473-2907
    Fax: (678) 473-8470

    Mike Jamison
    (678) 473-2907
    Fax: (678) 473-8470

    Cloudpath Cryptographic Library

    1.0


    Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

      • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
      • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
    1/12/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5095
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4143
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3397
    1900Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3396
    1899Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

      • Apple S1P w/ watchOS 4
    1/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3395
    1898Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5092
    1897Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5091
    1896Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Bishakha Banerjee
    408-745-2000
    Fax: 408-745-2100

    JUNOS 17.3R2 RE1800 - Kernel

    17.3R2 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon LC5518
    1/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3393
    1895Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    JUNOS 17.3R2 RE1800 - OpenSSL

    17.3R2 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon LC5518
    1/12/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3392
    1894Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5088
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3391
    1893Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

      • Apple S1P w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5087
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3390
    1892Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within watchOS.

      • Apple S1P w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5086
    1891Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within watchOS.

      • Apple S1P w/ watchOS 4
    1/12/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5085
    1890Toshiba Memory Corporation
    1-1, Shibaura 1-chome
    Minato-ku, Tokyo 105-8001
    Japan

    Akihiro Kimura
    akihero.kimura@toshiba.co.jp
    +81-45-890-2856
    Fax: +81-45-890-2593

    Crypto Library Hash_DRBG

    1.0.0 (Firmware)


    a library of unique software cipher solutions which are standard encryption algorithm-based to provide Toshiba Memory Corporation enterprise SSD products and the systems using them a robust and secure data storage environment

      • Cortex-M3
    1/12/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4128
    1889Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

      • Intel i5 w/ macOS 10.13
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5072
    1888Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

      • Intel i7 w/ macOS 10.13
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5071
    1887SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sanagala
    usanagala@sonicwall.com
    408-962-6248
    Fax: 408-745-9300

    SonicWall Crypto Library

    SonicOS 6.2.5 (Firmware)


    SonicWall Crypto Library

      • Cavium Octeon
    1/5/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4130
    1886Infineon Technologies AG
    Alter Postweg 101
    Augsburg, BY 86159
    Germany

    Roland Ebrecht
    Roland.Ebrecht@infineon.com
    +49-821-25851-68
    Fax: +49-821-25851-40

    Thomas Hoffmann
    Thomas.Hoffmann@infineon.com
    +49-821-25851-24
    Fax: +49-821-25851-40

    Trusted Platform Module 2.0 SLB 9670

    SLB 9670 7.83 (Firmware)


    Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

      • Infineon SLB 9670 security controller IC
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5069
    1885Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i7 w/ macOS 10.13
    1/5/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3382
    1884Huawei Technologies Co., Ltd
    Huawei Industrial Base, Bantian Longgang
    Shenzhen, Guangdong 518129
    China

    SPENCER HE
    heshunbin@huawei.com
    +86-755-28979041

    EulerOS 2.0

    EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

      • Intel Xeon w/ EulerOS 2.0
    1/5/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5066
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4126
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3381
    1883Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

      • Intel Xeon w/ macOS 10.13
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5065
    1882Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

      • Intel i5 w/ macOS 10.13
    1/5/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5063
    1881Silver Peak Systems, Inc.
    2860 De La Cruz Blvd.
    Santa Clara, CA 95050
    USA

    Damon Ennis
    (408) 935-1836

    Anusha Vaidyanathan
    (408) 935 1800
    Fax: (408) 588-1608

    Silver Peak Cryptographic library

    1.0 (Firmware)


    Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

      • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
      • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
    1/5/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5060
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4125
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3380
    1880Hewlett Packard Enterprise
    8 Technology Drive
    Westborough, MA 01581
    USA

    Aftab Alan
    aftab.alan@hpe.com
    917 576-6680

    OmniStack Cryptographic Library

    2.1


    The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

      • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
    12/22/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5059
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4124
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3379
    1879Private Machines, Inc
    164 20th Street
    4A-4B
    Brooklyn, NY 11232
    USA

    Sumeet Bajaj
    sumeet@privatemachines.com

    Radu Sion
    sion@privatemachines.com

    Private Machines Enforcer DRBG Library

    L4-1 1.0.1 (Firmware)


    The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

      • MAX32550 Cortex M3
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3385
    1878Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Core M w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5057
    1877Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Xeon w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5056
    1876Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i5 w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5055
    1875Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i7 w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5054
    1874Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Core M w/ macOS 10.13
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3377
    1873Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i5 w/ macOS 10.13
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3376
    1872Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Xeon w/ macOS 10.13
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3375
    1871Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i7 w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5051
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3374
    1870Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Core M w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5050
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3373
    1869Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Xeon w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5049
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3372
    1868Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i5 w/ macOS 10.13
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5048
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3371
    1867Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    JUNOS Version 17.3R2 - OpenSSL

    17.3R2 (Firmware)


    The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

      • Intel Xeon D-1531
      • Intel Xeon D
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3367
    1866Hewlett Packard Enterprise
    8 Technology Drive
    Westborough, MA 01581
    USA

    Aftab Alan
    aftab.alan@hpe.com
    917 576-6680

    OmniStack Cryptographic Library

    2.1


    The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

      • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
    12/22/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5045
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4110
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3365
    1865SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    George Duo
    gduo@sonicwall.com
    (408) 962-7049

    SonicOS 6.5.0 for TZ, NSA and SuperMassive

    FW Version 6.5.0 (Firmware)


    The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

      • Cavium OCTEON III (CN7XXX)
      • Cavium OCTEON II (CN6XXX)
    12/22/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4109
    1864DocuSign
    221 Main St.
    Suite 1000
    San Francisco, CA 94105
    USA

    Ezer Farhi
    Ezer.Farhi@docusign.com
    972-3-9279529

    DocuSign-SA-MAIN

    8.5 (Firmware)


    DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

      • Intel® Xeon Quad-Core
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3363
    1863Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3362
    1862Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5040
    1861Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3361
    1860Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5039
    1859Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 GnuTLS C Implementation

    R7-2.0.0


    GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    12/22/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5038, AES #5042
    1858Extreme Networks
    6480 Via Del Ora
    San Jose, CA 95119
    USA

    Craig J Ficik
    cficik@extremenetworks.com
    603-9525922
    Fax: 404-806-5377

    Extreme Networks Summit Series

    22.3 (Firmware)


    Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

      • Cavium Octeon II
    12/15/2017
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5037
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3359
    1857Extreme Networks
    6480 Via Del Ora
    San Jose, CA 95119
    USA

    Craig J Ficik
    cficik@extremenetworks.com
    603-952-5922
    Fax: 404-806-5377

    Extreme Networks Summit Series

    22.3 (Firmware)


    Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

      • Intel Atom C series
    12/15/2017
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5036
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3358
    1856Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A10 Fusion w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3357
    1855Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A11 Bionic w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3356
    1854Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A10X Fusion w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3355
    1853Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A9X w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3354
    1852Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A9 w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3353
    1851Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A8X w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3352
    1850Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A8 w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3351
    1849Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A7 w/ iOS 11
    12/15/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-384, SHA-512
      • Prerequisite: HMAC #3350
    1848Infotecs
    77 Water Street
    office 853
    New York, NY 10005
    USA

    Aleksandr Tkachev
    Aleksandr.Tkachev@infotecs.us
    +1 (646) 589-8571

    Vladimir Kuryndin
    kurindinvv@infotecs.us
    +7 (495) 737-6192
    Fax: +7 (495) 737-7278

    ViPNet Common Crypto Core Library (Kernel)

    2.0


    The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code.

      • Intel® Core i5-3337U w/ Linux Debian 7.11 (64 bit)
      • Intel® Core i7-3632QM w/ Windows 10 (64-bit)
    12/15/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5035
    1847Infotecs
    77 Water Street
    office 853
    New York, NY 10005
    USA

    Aleksandr Tkachev
    Aleksandr.Tkachev@infotecs.us
    +1 (646) 589-8571

    Vladimir Kuryndin
    kurindinvv@infotecs.us
    +7 (495) 737-6192
    Fax: +7 (495) 737-7278

    ViPNet Common Crypto Core Library (User Space)

    2.0


    n/a

      • n/a w/ Windows 10 (64-bit)
    12/15/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5034
    1846Infotecs
    77 Water Street
    office 853
    New York, NY 10005
    USA

    Aleksandr Tkachev
    Aleksandr.Tkachev@infotecs.us
    +1 (646) 589-8571

    Vladimir Kuryndin
    kurindinvv@infotecs.us
    +7 (495) 737-6192
    Fax: +7 (495) 737-7278

    ViPNet Common Crypto Core Library (User Space)

    2.0


    The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code.

      • Intel® Core i5 w/ MacOS X 10.12
      • Apple A10 Fusion w/ iOS 10.3.3
      • Samsung Exynos 7880 w/ Android 7.0
      • Intel® Core i5-3337U w/PAA w/ Linux Debian 7.11 (64-bit)
      • Intel® Core i7-3632QM w/ Windows 10 (64-bit)
      • Intel® Core i5-3337U w/ Linux Debian 7.11 (64-bit)
    12/15/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5033
    1845Samsung Electronics Co., Ltd.
    1-1, Samsungjeonja-ro
    Hwaseong-si, Gyeonggi-do 18448
    KOREA

    Jisoo Kim
    jisoo74.kim@samsung.com
    82-31-8096-2832
    Fax: 823180008000(+62832)

    EPiC2 DRBG

    EPiC2 DRBG V1.0 (Firmware)


    PM1723b Series is high-performance Self-Encrypting SSD supporting NVMe Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and Hash_DRBG for key generation.

      • Cortex R7 ARM-based CPU
    12/15/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4072
    1844DELL, Inc.
    One Dell Way
    Round Rock, Texas 78682
    USA

    Alaric Silveira
    Alaric.Silveira@dell.com

    Gang Liu
    gang_liu@dell.com
    +1 512 728 5545

    Dell Crypto Library for Dell iDRAC and Dell CMC

    2.4


    The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

      • ARMv7 NPCMX50 w/ Linux 4.1.12
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5032
    1843McAfee, Inc.
    2821 Mission College Blvd.
    Santa Clara, CA 95054
    USA

    Andy Nissen
    andy.nissen@intel.com
    651-770-6151

    McAfee Advanced Threat Defense

    4.0


    A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

      • Intel Xeon w/ Linux 4.4.27
    12/8/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5031
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4090
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3345
    1842Certes Networks, Inc.
    300 Corporate Center Drive
    Suite 140
    Pittsburgh, PA 15108
    USA

    Sean Everson
    sean.everson@certesnetworks.com
    1.412.357.1130
    Fax: 1.412.262.2574

    Gary Brunner
    gary.brunner@certesnetworks.com
    1.412.200.2177
    Fax: 1.412.262.2574

    CryptoFlow Net Creator Java Crypto Module

    1.0


    The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

      • Intel Xeon E3-1270v5 w/ CentOS 6.7
    12/8/2017
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5028
    1841RSA Security LLC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    FIPS Program
    fips-program@rsa.com

    RSA BSAFE® Crypto-J JSAFE and JCE Software Module

    6.2.4


    RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

      • Intel Core i5 w/ Windows 10 (64-bit)
      • Intel Xeon w/ CentOS 7.3
      • Qualcomm Snapdragon w/ Android 7.1.2
    12/8/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5026
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • Prerequisite: SHS #4085
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
      • Prerequisite: HMAC #3340
    1840Konica Minolta, Inc.
    2970, Ishikawa-machi
    Hachioji-shi, Tokyo 192-8505
    Japan

    R&D Administration Division, R&D Headquarters Business Techn

    Konica Minolta PP Crypto Library

    1.0 Rev.1 (Firmware)


    Konica Minolta PP Crypto Library is used in bizhub PRO 1100 and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generation/verification, AES, hash function including SHA and HMAC_DRBG.

      • Intel(R) Pentium G3420
    12/8/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3339
    1839Brocade Communications Systems, Inc.
    130 Holger Way
    San Jose, CA 95134
    USA

    Suneetha Sarala
    ssarala@brocade.com
    408-333-4090

    Chris Marks
    marksc@brocade.com
    408-333-0480

    BRCD-IP-CRYPTO-VER-4.0

    BRCD-IP-CRYPTO-VER-4.0 (Firmware)


    Firmware algorithm for the Brocade FastIron Series

      • Freescale P2041
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5024
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4083
    1838Brocade Communications Systems, Inc.
    130 Holger Way
    San Jose, CA 95134
    USA

    Suneetha Sarala
    ssarala@brocade.com
    408-333-4090

    Viola Chin
    Viola.Chin@brocade.com
    408-333-8000

    BRCD-IP-CRYPTO-VER-4.0

    BRCD-IP-CRYPTO-VER-4.0 (Firmware)


    Firmware algorithm for the Brocade FastIron Series

      • ARM Cortex A57
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5023
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4082
    1837Brocade Communications Systems, Inc.
    130 Holger Way
    San Jose, CA 95134
    USA

    Suneetha Sarala
    ssarala@brocade.com
    408-333-4090

    Chris Marks
    marksc@brocade.com
    408-333-0480

    BRCD-IP-CRYPTO-VER-4.0

    BRCD-IP-CRYPTO-VER-4.0 (Firmware)


    Firmware algorithm for the Brocade FastIron Series

      • ARM Cortex A9
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5022
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4081
    1836SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    avcrypto

    12.1.0 (Firmware)


    Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

      • Intel Core i5 with AES-NI
      • Intel Xeon with AES-NI
    12/8/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5020
    1835Neopost Technologies, S.A.
    42-46 Avenue Aristide Briand
    Bagneux, Hauts-de-Seine 92220
    France

    Adriana Rosca
    a.rosca@neopost.com
    +33 1 45 36 61 04
    Fax: +33 1 45 36 30 10

    Neopost PSD

    A0038116B (Firmware)


    Neopost Postal Secure Device (PSD) for low to high range of franking machines

      • NXP LPC3220 Microprocessor
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #2874
    1834HGST, a Western Digital company
    3403 Yerba Buena Road
    San Jose, CA 95119
    USA

    Michael Williamson
    michael.williamson@wdc.com
    408-717-8458

    Vishal Tanna
    Vishal.Tanna@wdc.com
    408-801-2499

    TCG Crypto Library

    SVN Revision 2038 (Firmware)


    Cryptographic library support for Western Digital's HGST branded Self-Encrypting Drives (SEDs).

      • Marvell ARM Cortex R5
    11/30/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3333
    1833Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    11/30/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3332
    1832Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

      • Apple A10X w/ tvOS 11 Fusion
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3331
    1831Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5015
    1830Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Module v8.0 (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5014
    1829Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A10X Fusion w/ iOS 11
    11/30/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5009
    1828Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Cisco Security Crypto Virtual

    F6.2


    The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

      • Intel Xeon E series w/ ESXi 6.0
      • Intel Xeon D series w/ ESXi 6.0
      • Intel Xeon D series w/ NFVIS
      • Intel Xeon E series w/ ESXi 5.5
      • Intel Xeon E series w/ NFVIS
      • Intel Xeon Scalable series w/ ESXi 6.0
    11/30/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5008
    1827Brocade Communications Systems LLC
    120 Holger Way
    San Jose, CA 95110
    USA

    Hamid Sabouti
    hamid.sobouti@broadcom.com
    408-333-4150
    Fax: 408-333-3844

    Brocade Fabric OS FIPS Cryptographic Module

    8.2.0


    Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

      • e500v2 w/ Fabric Operating System(FOS) v8.2.0
      • e500mc w/ Fabric Operating System(FOS) v8.2.0
    11/30/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5006
    1826SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS on x86 with AES-NI

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4070
    1825SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS on x86 without AES-NI

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4069
    1824SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS z13

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • z13 w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4068
    1823SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    avcrypto

    12.1.0 (Firmware)


    Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

      • Intel Xeon with AES-NI
    11/30/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5001
    1822SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    avcrypto

    12.1.0 (Firmware)


    Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

      • Intel Core i5 with AES-NI
    11/30/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5000
    1821Lexmark International, Inc.
    740 West New Circle Road
    Lexington, KY 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Crypto Module (user)

    3.2


    Lexmark Crypto Module (user)

      • Marvell MV78460-B0 w/ Lexmark Linux v4
    11/22/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #4998
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4064
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3321
    1820Lexmark International, Inc.
    740 West New Circle Road
    Lexington, KY 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Crypto Module (user)

    3.2


    Lexmark Crypto Module (user)

      • Marvell 88PA6270C0 w/ Lexmark Linux v4
    11/22/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #4997
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4063
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3320
    1819Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3319
    1818Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3318
    1817Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3317
    1816Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3316
    1815Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3315
    1814Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3314
    1813Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3313
    1812Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3312
    1811Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3311
    1810Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3310
    1809Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3309
    1808Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3308
    1807Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4988
    1806Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4987
    1805Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4986
    1804Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4985
    1803Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A11 Bionic w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4984
    1802Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A10 Fusion w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4983
    1801Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A9X w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4982
    1800Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A8 w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4981
    1799Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A9 w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4980
    1798Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A8X w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4979
    1797Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

      • Apple A7 w/ iOS 11
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4978
    1796Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4976
    1795Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4975
    1794Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4974
    1793Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4973
    1792Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel Core M w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4972
    1791Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel Xeon w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4971
    1790Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i5 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4970
    1789Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i7 w/ macOS 10.13
    11/22/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4969
    1788Qualcomm Technologies, Inc.
    5775 Morehouse Dr
    San Diego, CA 92121
    USA

    Yin Ling Liong
    yliong@qti.qualcomm.com
    858-651-7034
    Fax: 858-845-1523

    QTI Pseudo Random Number Generator (Version 2.3.1)

    Snapdragon 845


    Snapdragon 845 Pseudo Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

      • N/A
    11/22/2017
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4047
    1787Cisco Systems, Inc
    170 W Tasman Dr
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    919.392.6520

    CiscoSSL FIPS Object Module

    6.0 (Firmware)


    The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

      • Apple A10 on iOS 10.x
    11/17/2017
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #4956
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4046
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3304
    1786Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3303
    1785Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Core M w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3302
    1784Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i7 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3301
    1783Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX2)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i5 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3300
    1782Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3299
    1781Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel Core M w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3298
    1780Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i7 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3297
    1779Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (AVX)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

      • Intel i5 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3296
    1778Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

      • Intel Core M w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3295
    1777Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

      • Intel Xeon w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3294
    1776Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

      • Intel i7 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3293
    1775Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

      • Intel i5 w/ macOS 10.13
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3292
    1774Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel Xeon w/ macOS 10.13
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4947
    1773Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel Core M w/ macOS 10.13
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4946
    1772Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i5 w/ macOS 10.13
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4945
    1771Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

      • Intel i7 w/ macOS 10.13
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4944
    1770Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 15.1X49 - SRX345 - OpenSSL

    15.1 X49-D110 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7130)
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3291
    1769Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 15.1X49 - SRX345 - Authentec

    15.1 X49-D110 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7130)
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3289
    1768Renesas Electronics Corporation
    5-20-1 Jousuihon-cho
    Kodaira-shi, Tokyo 187-8588
    Japan

    Hideyuki Tanaka
    hideyuki.tanaka.jc@renesas.com
    +81-42-312-6926
    Fax: +81-42-328-4374

    TSIP

    RX Family RX65N Version 1.03 (Firmware)


    The TSIP is hardware which consists of cryptographic accelerator, random number generator and access management circuit based on the chip-unique-ID. The TSIP is embedded in the general purpose MCUs, RX65N and RX651. Therefore, RX65N and RX651 can provide the TSIP secure cryptographic functions including strong key management.

      • n/a
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Prerequisite: AES #4940
    1767Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4939
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3288
    1766Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple 10X Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4938
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3287
    1765Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A9X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4937
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3286
    1764Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4936
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3285
    1763Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A8 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4935
    1762Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A8X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4934
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3284
    1761Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A9 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4933
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3283
    1760Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A10X Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4932
    1759Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A7 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4931
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3282
    1758Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A8 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4930
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3281
    1757Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4929
    1756Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4928
    1755Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A9X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4927
    1754Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

      • Apple A9 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4926
    1753Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A8X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4925
    1752Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

      • Apple A7 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4924
    1751Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3280
    1750Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10X Fusion w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3279
    1749Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3278
    1748Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9X w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3277
    1747Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8X w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3276
    1746Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4923
    1745Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9 w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3275
    1744Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8 w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3274
    1743Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A9 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4922
    1742Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A10X Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4921
    1741Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A8X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4920
    1740Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4919
    1739Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A9X w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4918
    1738Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A8 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4917
    1737Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

      • Apple A7 w/ iOS 11
    11/17/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4916
    1736Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A7 w/ iOS 11
    11/17/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3273
    1735Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Cisco Security Crypto

    F6.2 (Firmware)


    The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

      • Intel Atom C2xxx Family, Intel Xeon 34xx Family
      • Intel Xeon E Family
      • Intel Xeon D Family
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4905
    1734Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub Virtual TPM Implementations

    10.0.15063.674


    The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4904
    1733Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations

    10.0.16299


    The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4903
    1732Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub SymCrypt Cryptographic Implementations

    10.0.15063.674


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4902
    1731Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

    10.0.15254


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
    11/17/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4901
    1730Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

    10.0.16299


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
    11/9/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4897
    1729Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9X w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3266
    1728Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10X Fusion w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3265
    1727Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A11 Bionic w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3264
    1726Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8 w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3263
    1725Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A8X w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3262
    1724Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A7 w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3261
    1723Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A9 w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3260
    1722Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Module (VNG)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

      • Apple A10 Fusion w/ iOS 11
    11/9/2017
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3259
    1721Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A10 Fusion w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4877
    1720Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A8X w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4876
    1719Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A11 Bionic w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4875
    1718Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A10X Fusion w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4874
    1717Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A9 w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4873
    1716Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A9X w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4872
    1715Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A8 w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4871
    1714Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Assembler)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

      • Apple A7 w/ iOS 11
    11/9/2017
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4870
    1713Tintri, Inc.
    303 Ravendale Drive
    Mountain View, CA 94043
    USA

    Farzam Tajbakhsh
    ftajbakhsh@tinri.com
    (650) 810-8266

    Tintri Cryptographic Module

    1.0


    The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

      • Intel Xeon E5-2680 @ 2399MHz without AES-NI w/ Tintri OS 4.5
    11/9/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #4861
    1712Tintri, Inc.
    303 Ravendale Drive
    Mountain View, CA 94043
    USA

    Farzam Tajbakhsh
    ftajbakhsh@tintri.com
    (650) 810-8266

    Tintri Cryptographic Module

    1.0


    The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

      • Intel Xeon E5-2620 @ 2100MHz without AES-NI w/ Tintri OS 4.5
    11/9/2017
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #4860
    1711Tintri, Inc.
    303 Ravendale Drive
    Mountain View, CA 94043
    USA
    Tintri Cryptographic Module

    1.0


    The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4860
      1710Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tintri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

        • Intel Xeon E5-2609 @ 1699MHz without AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4859
      1709Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tintri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

        • Intel Xeon E5-2680 @ 2399MHz with AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4858
      1708Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tintri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

        • Intel Xeon E5-2620 @ 2100MHz with AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4857
      1707Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tintri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms by the module have been made.

        • Intel Xeon E5-2609 @ 1699MHz with AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4856
      1706Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Kevin Meagher
      KMeagher@ciena.com

      Ciena 6500 Packet Optical Family

      12.3


      Ciena''s Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

        • PowerQUICC II w/ VxWorks 6.1
        • PowerQUICC II w/ VxWorks 6.3
      11/3/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4855
      1705Hewlett Packard Enterprise
      8000 Foothills Blvd.
      Roseville, CA 95747
      USA

      Susan Scotten
      susan.scotten@hpe.com
      1-916-540-1109

      Aruba Campus Switch Series Crypto Library

      16.04 (Firmware)


      Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

        • Freescale P2020 Dual Core
        • Dual Core ARM Coretex
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4853
      1704Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      SecurityCertifications@gemalto.com

      SafeXcel 3120 Chip

      SF114-011206-001A, v2.9.5


      The Gemalto SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution.

        • N/A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4849
      1703Thales e-Security Inc.
      900 South Pine Island Road
      Suite 710
      Plantation, FL 33324
      USA

      Natalya Robert
      natalya.robert@thalesesec.com
      954-888-6268

      Robert Burns
      robert.burns@thalesesec.con
      954-888-6215

      Vormetric Data Security Manager Virtual Appliance Module

      6.0.0


      The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

        • Intel Xeon w/ Centos 7.2 on VMware ESXi 6.5.
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4846
      1702Thales e-Security Inc.
      900 South Pine Island Road
      Suite 710
      Plantation, FL 33324
      USA

      Natalya Robert
      natalya.robert@thalesesec.com
      954-888-6268

      Robert Burns
      robert.burns@thalesesec.con
      954-888-6215

      Vormetric Data Security Manager Module

      6.0.0 (Firmware)


      The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

        • Intel Xeon
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4845
      1701Pure Storage, Inc.
      650 Castro Street
      Suite 400
      Mountain View, CA 94041
      USA

      John Fuchigami
      jfuchigami@purestorage.com
      800-379-7873

      Flash Array Crypto Library

      1.2.0


      Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel Xeon x64 CPU with AES-NI (E3/E5/E7 Family) w/ Purity 4
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4844
      1700F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP vCMP on B4450 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

        • Intel(R) Xeon(R) CPU E5-2658A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4841
      1699SUSE, LLC
      10 Canal Park, Suite 200
      Cambridge, MA 02141
      USA

      Andreas Stieger
      astieger@suse.com
      +49 911 74053 384

      Thomas Biege
      thomas@suse.de
      +49 911 74053 500

      SUSE libgcrypt using generic C implementation

      3.0


      This test covers generic C implementation of multiple algorithms.

        • z13 w/ SUSE Linux Enterprise Server 12 SP2
      11/3/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4840
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #3982
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3241
      1698F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP vCMP on B2250 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4839
      1697F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP 10350F TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4838
      1696F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP B4450N TMM Implementation

      tbd 13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4837
      1695F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038
      Fax: ~

      BigIP B2250 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4836
      1694F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP vCMP on B4450 TMM Implementation

      tbd 13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

        • Intel(R) Xeon(R) CPU E5-2658A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4835
      1693F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP B4000 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4834
      1692F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP i5820 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1630
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4833
      1691F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP B7000 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E3-1275
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4832
      1690F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP i7820 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1650
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4834
      1689F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BigIP i4000 TMM Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1630
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4830
      1688F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP B4450N OpenSSL Software Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658A
      11/3/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4829
      1687F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP B2250 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4828
      1686F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP 10350F OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4827
      1685F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP vCMP on B2250 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-2658
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4826
      1684F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP B4000 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4825
      1683F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP i4000 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1630
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4824
      1682F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP i7820 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1650
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4823
      1681F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP i5820 OpenSSL Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

        • Intel(R) Xeon(R) CPU E5-1630
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4822
      1680F5 Networks
      401 Elliott Avenue West
      Seattle, WA 98119
      USA

      Maryrita Steinhour
      m.steinhour@f5.com
      206-272-7351

      John Hughes
      j.hughes@f5.com
      206-272-6038

      BIGIP B7000 OpenSSL Software Implementation

      13.1.0 (Firmware)


      F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP and VIPRION hardware

        • Intel(R) Xeon(R) CPU E3-1275
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4821
      1679McAfee, Inc.
      2821 Mission College Blvd.
      Santa Clara, CA 95054
      USA

      Mark Hanson
      Mark_Hanson@McAfee.com

      McAfee NSP NS Crypto Lib

      n.a 2.0.5_9.1.17.2 (Firmware)


      Cryptographic services for the McAfee NSP Intrusion Prevention appliance

        • Intel Atom C Family
        • Intel Xeon E5 Family
      10/27/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4820
      1678
      10/27/2017
        1677McAfee, Inc.
        2821 Mission College Blvd.
        Santa Clara, CA 95054
        USA

        Mark Hanson
        Mark_Hanson@McAfee.com

        McAfee NSP NS Crypto Lib

        n.a 2.0.5_9.1.17.2 (Firmware)


        Cryptographic services for the McAfee NSP Intrusion Prevention appliance

          • Intel Atom C Family
        10/20/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4817
        1676Synopsys, Inc.
        690 East Middlefield Road
        Mountain View, CA 94043
        USA

        Dana Neustadter
        danan@synopsys.com
        +1(613)595-9836

        DWC Cryptography Software Library

        4.2.0


        The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

          • ARC® EM7D Processor with CryptoPack w/ n/a
        10/20/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4816
        1675IBM
        2455 South Rd
        Poughkeepsie, NY 12601
        USA

        Thomas Morris Jr
        tmorrisj@us.ibm.com
        1-845-435-5538

        William Santiago
        wsf1@us.ibm.com
        1-845-435-9265

        Miniboot 1.30 with 00CW683

        Andretta 2.0 (00CW683) MB1.30 Hash E215 7B6F (Firmware)


        Miniboot implemented algorithms with hardware acceleration

          • IBM PowerPC 405
        10/20/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4815
        1674IBM
        2455 South Rd
        Poughkeepsie, NY 12601
        USA

        Thomas Morris Jr
        tmorrisj@us.ibm.com
        1-845-435-5538

        William Santiago
        wsf1@us.ibm.com
        1-845-435-9265

        Miniboot 1.30 with 00KP899

        Andretta 2.0 (00KP899) MB1.30 Hash E215 7B6F (Firmware)


        Miniboot implemented algorithms with hardware acceleration

          • IBM PowerPC 405
        10/20/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4814
        1673Tandberg Data
        10155 Westmoor Dr., Suite 155
        Westminster, CO 80021
        USA

        Neil Donohoe
        ndonohoe@overlandstorage.com
        720-598-7265

        Dan Walkes
        dwalkes@overlandstorage.com
        720-598-7264

        RDX RNG

        1.0.1 (Firmware)


        DRBG implementation

          • Altera Nios Classic
        10/20/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #3955
        1672IBM Corporation
        9032 S Rita Road
        Tucson, AZ 85744
        USA

        Kevin D. Butt
        kdbutt@us.ibm.com
        520-799-5280

        IBM LTO 7 Cryptographic Firmware Library

        1.0 (Firmware)


        Firmware cryptographic implementation that adds secure key channel capabilities to the IBM LTO 7 tape drive.

          • IBM PowerPC 405
        10/13/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-512
          • Prerequisite: SHS #3954
        1671Infoblox
        3111 Coronado Drive
        Santa Clara, CA 95054
        USA

        Dave Funk
        dfunk@infoblox.com
        408-986-5591

        NIOS Cryptographic Library

        2.0 (Firmware)


        Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

          • Intel Xeon w/ VMware ESXi 5
          • Intel Xeon
          • Intel Xeon w/ VMware ESXi 6
        10/13/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4805
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3953
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3215
        1670McAfee, Inc.
        2821 Mission College Blvd.
        Santa Clara, CA 95054
        USA

        Mark Hanson
        Mark_Hanson@McAfee.com
        972.963.7326

        McAfee NSP NS Crypto Lib

        2.0.5_9.1.17.1 (Firmware)


        Cryptographic services for the McAfee NSP Intrusion Prevention appliances

          • Intel Xeon Gold Family
        10/13/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4801
        1669Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2680 @ 2399MHz without AES-NI w/ Tintri Linux version 4.4.0.1
        10/6/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4800
        1668Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2620 @ 2100MHz without AES-NI w/ Tintri Linux version 4.4.0.1
        10/6/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4799
        1667Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2609 @ 1699MHz without AES-NI w/ Tintri Linux version 4.4.0.1
        10/6/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4798
        1666Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS Version 17.3R1-OpenSSL

        17.3R1 (Firmware)


        The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

          • Intel Xeon D-1531
        10/6/2017
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3202
        1665Zebra Technologies Corporation
        3 Overlook Point
        Lincolnshire, IL 60069
        USA

        Erv Comer
        Erv.Comer@zebra.com
        480-628-7901

        Rob Franzo
        Rob.Franzo@zebra.com
        631-291-2341

        DRBG of QTI Cryptographic Module on Crypto 5 Core

        5.f4-64


        This cryptographic module implements block ciphers including AES, Triple-DES, hash functions SHA-1 and SHA-256, Message Authentication Code functions HMAC and CMAC and DRBG 800-90A.

          • Snapdragon 650 w/ Android 6.0.1
        9/29/2017
        • Counter:
          • Modes: AES-128
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4792
        1664Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (shaavx)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/29/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: SHS #3931
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: HMAC #3194
        1663Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (shassse3)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/29/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: SHS #3930
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-512
          • Prerequisite: HMAC #3193
        1662SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Sales
        na

        CryptoComply Server Engine

        2.1


        CryptoComply | Server is a standards-based "drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at restencryption, and secure communications to a trusted implemntation.

          • Intel i7 w/ CentOS 7
        9/29/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4790
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3929
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3192
        1661MediaTek Inc.
        No.1, Dusing Rd. 1, Hsinchu Science Park
        Hsinchu, Taiwan 30078
        Taiwan

        William Cheng
        William.cheng@mediatek.com
        +1-858-731-9200
        Fax: +1-858-731-9201

        MingHsien Hsieh
        minghsien.hsieh@mediatek.com
        +886-3-567-0766
        Fax: +886-3-578-7610

        MTK CryptoCore V1.0 Secure Core

        MTK CryptoCoreV1.0 S Core


        The MTK CryptoCore cryptographic module (hereafter referred to as “the module”) is designed to provide foundational security services for the platform, including secure boot, secure life cycle state, platform identity and key management. It offers high-throughput cryptography operations, suitable for a diverse set of use cases.

          • N/A
        9/26/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4789
        1660Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (shagen)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3925
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3189
        1659Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (aesni)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4787
        1658Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (aesgen)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4786
        1657Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (aesasm)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4784
        1656Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Linux Kernel crypto API (shaavx2)

        5.0


        Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        9/26/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3924
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3188
        1655Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Bhadresh Udani
        bhadresh.udani@hpe.com
        +91 9886399320

        Premnath M
        premnath.mangal@hpe.com
        +91 9845369405

        HPE BladeSystem c-Class Virtual Connect Firmware OpenSSL libcrypto Library 1.0.2j

        4.65 (Firmware)


        This is a standalone general-purpose cryptography library providing all necessary crypto functionality.

          • FreeScale MPC8535
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4777
        1654Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Hridya Valakkadavil Thilakan
        hridya-valakkadavil.thilakan@hpe.com

        Aprana Shrivastava
        aprana.shrivastava@hpe.com

        HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libcrypto Library 1.0.2h

        4.71 (Firmware)


        The module provides administrative control of HPE BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure.

          • PowerPC 440EPx
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4776
        1653FireEye, Inc.
        1440 McCarthy Boulevard
        Milipitas, CA 90655
        USA

        Steve Lanser
        steve.lanser@fireeye.com
        508-983-2505

        FireEye Cryptographic Implementation

        1.0


        The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

          • Intel Xeon with ESXi 6.5 w/ FEYEOS 8.0
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4775
        1652Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Linda Gallops
        linda.gallops@oracle.com
        +1 704.972.5018
        Fax: +1 980.355.5399

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 6 NSS without AES-NI

        R6-1.0.0


        Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

          • Intel Xeon E5-2699 v4 w/ Oracle Linux 6.9 64 bit
        9/26/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #3918
        1651wolfSSL Inc
        10016 Edmonds Way
        Suite C-300
        Edmonds, WA 98020
        USA

        Todd Ouska
        todd@wolfssl.com
        503-679-1859

        Larry Stefonic
        larry@wolfssl.com
        206-369-4800

        wolfCrypt

        3.12.2


        wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

          • Intel® Xeon® E5335 w/ Windows Server 2012R2
          • Intel® Core™ i7-2640M w/ Windows 7 Professional SP1
        9/26/2017
        • Hash based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: SHS #3915
        1650IBM Corporation
        1787 Sentry Pkwy West
        Building 18, Suite 200
        Blue Bell, PA 19422
        USA

        Sandeep Singhal
        Sandeep.Singhal1@ibm.com
        215-664-1614

        OpenSSL for the IBM MaaS360 Cloud Extender

        2.91


        The open source OpenSSL API provides a cryptographic library used by the MaaS360 Cloud Extender.

          • Intel Core i3 w/ Microsoft Windows Server 2012 R2 (x64)
        9/26/2017
        • Counter:
          • Modes: AES-128, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4771
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #3914
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384
          • Prerequisite: HMAC #3182
        1649Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        Cisco Security Crypto Virtual

        F6.0


        FP FIPS Object Module (FOM) provides cryptographic services to an underlying host that as a minimum provides some level of management, event storage, host monitoring and user monitoring capabilities along with other services.

          • Intel Xeon E series w/ ESXi 6.0
          • Intel Xeon E series w/ ESXi 5.5
        9/15/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4768
        1648Bomgar Corporation
        578 Highland Colony Parkway
        Paragon Centre, Suite 300
        Ridgeland, MS 39157
        USA

        Faye Santangelo
        FSantangelo@bomgar.com
        6016078322

        Bomgar Cryptographic Engine

        2.0.13 (Firmware)


        The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

          • Intel® Xeon E5-2640 v3
        9/15/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4767
        1647SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using assembler implementation for AES

        3.0


        This test covers assembler implementation of AES

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/15/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4766
        1646SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using AES-NI for AES

        3.0


        This test covers AES-NI implementation of AES

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/15/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4765
        1645SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using SSE3 implementation for SHA

        3.0


        This test covers SSSE3 implementation of SHA.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/8/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3911
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3179
        1644SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using generic C implementation

        3.0


        This test covers generic C implementation of multiple algorithms.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/8/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3910
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3178
        1643SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using AVX implementation for SHA

        3.0


        This test covers AVX implementation of SHA.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/8/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: SHS #3909
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3177
        1642SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using AVX2 implementation for SHA

        3.0


        This test covers AVX2 implementation of SHA.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        9/8/2017
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: SHS #3908
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-384, SHA-512
          • Prerequisite: HMAC #3176
        1641Lenovo Group Limited
        7001 Development Drive
        Morrisville, NC 27560
        USA

        James Takahashi
        jtakahashi2@lenovo.com
        503-643-8308

        Taylor Greenwood
        tgreenwood@lenovo.com
        515-450-7432

        Lenovo OpenSSL Library for ThinkSystem (Generic Assembler for AES and SHA)

        1.0


        The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

          • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
        9/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4764
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3907
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3175
        1640Lenovo Group Limited
        7001 Development Drive
        Morrisville, NC 27560
        USA

        James Takahashi
        jtakahashi2@lenovo.com
        503-643-8308

        Taylor Greenwood
        tgreenwood@lenovo.com
        515-450-7432

        Lenovo OpenSSL Library for ThinkSystem (AES-NI and AVX+SSSE3 for SHA)

        1.0


        The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

          • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
        9/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4763
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1
          • Prerequisite: SHS #3906
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1
          • Prerequisite: HMAC #3174
        1639Lenovo Group Limited
        7001 Development Drive
        Morrisville, NC 27560
        USA

        James Takahashi
        jtakahashi2@lenovo.com
        503-643-8308

        Taylor Greenwood
        tgreenwood@lenovo.com
        515-450-7432

        Lenovo OpenSSL Library for ThinkSystem (SSSE3 Assembler for AES and SHA)

        1.0


        The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

          • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
        9/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4762
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1
          • Prerequisite: SHS #3905
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1
          • Prerequisite: HMAC #3173
        1638FireEye, Inc.
        1440 McCarthy Boulevard
        Milipitas, CA 90655
        USA

        Steve Lanser
        steve.lanser@fireeye.com
        508-983-2505

        FireEye SSL

        1.0 (Firmware)


        The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

          • Intel Xeon
          • Intel Xeon with ESXi 6.5
          • Intel Atom
          • AMD Opteron
        9/8/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4761
        1637VMware, Inc.
        3401 Hillview Ave
        Palo Alto, CA 94303
        USA

        Manoj Maskara
        mmaskara@vmware.com
        650-427-1000
        Fax: 650-475-5001

        Michael McKay
        mmckay@vmware.com
        650-427-3615
        Fax: 650-475-5001

        VMware BC-FJA (Bouncy Castle FIPS Java API)

        1.0.0


        The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

          • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
        9/1/2017
        • Counter:
          • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4760, TDES #2530
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3902
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3171
        1636Legion of the Bouncy Castle Inc.
        85 The Crescent
        Ascot Vale, Victoria 3032
        Australia

        David Hook
        dgh@bouncycastle.org
        +61438170390

        Jon Eaves
        jon@bouncycastle.org
        +61417502969

        Bouncy Castle FIPS Java API

        1.0.1


        The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

          • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
          • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
        9/1/2017
        • Counter:
          • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4759, TDES #2529
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: SHS #3901
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
          • Prerequisite: HMAC #3170
        1635Software Diversified Services
        1322 81st Ave NE
        Minneapolis, MN 55432
        USA

        Tim Full
        cavp@sdsusa.com

        SDS Cryptographic Module

        1.0


        Software only Cryptographic Module supports Elliptic Curve, KAS, AES, TDES, DSA, RSA, HMAC and SHA-2.

          • Intel i7 with AES-NI w/ Windows Server 2012 R2
          • Intel i7 with AES-NI w/ Windows Server 2016
          • Intel i7 with AES-NI w/ RedHat 6.9
          • Intel i7 with AES-NI w/ RedHat 7.4
          • POWER8 w/ AIX 6.1
          • POWER8 w/ AIX 7.2
        9/1/2017
        • HMAC based:
          • Prediction Resistance Modes: Not Enabled
          • Modes: SHA-256
          • Prerequisite: HMAC #3167
        1634Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        Luna K7 Accelerated Cryptographic Library

        7.0.1 (Firmware)


        The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

          • PowerPC 476
        9/1/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4753
        1633A10 Networks, Inc.
        3 West Plumeria Drive
        San Jose, CA 95134
        USA

        John Chiong
        +1 408 325-8668

        A10 Networks Data Plane FIPS Software Library

        3.0.0 (Firmware)


        The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

          • Intel Xeon E3-1275v2 with AES-NI
          • Intel Xeon E5-1650v3 with AES-NI
          • Intel Xeon E5-2697v2 with AES-NI
          • Intel Xeon E5-2697v4 with AES-NI
        9/1/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4752
        1632Monkton, Inc
        2236 Central Ave
        Tysons, VA 22182
        USA

        Harold E. Smith III
        harold@monkton.io
        571-527-6680

        OpenSSL

        1.0.2L


        Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton''s Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

          • Apple A10X w/ iOS 10.3.2
          • Apple A10 Fusion w/ iOS 10.3.2
        8/25/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4751
        1631SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        Ray Potter
        ray@safelogic.com
        650-646-1702

        CryptoComply Server Engine

        2.1


        CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

          • Intel x86_64 w/ CentOS 7.3
        8/25/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4750
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3893
        • HMAC based:
          • Prediction Resistance Modes: Enabled
          • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3164
        1630ARM Ltd
        110 Fulbourn Road
        Cambridge CB1 9NJ
        United Kingdom

        Leo Dorrendorf
        leo.dorrendorf@arm.com
        +972-52-6818594
        Fax: +972-73-2558808

        Udi Maor
        udi.maor@arm.com
        +972-54-4205101
        Fax: +972-73-2558808

        ARM TrustZone Cryptocell 712 TEE

        CC 712 TEE


        ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

          8/25/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4749
          1629Ixia
          26601 W. Agoura Road
          Calabasas, California 91302
          USA

          Tom Casella
          NVSCertificationTeam@ixiacom.com
          703-288-0184

          NTO Crypto Library

          1.0.1-1 (Firmware)


          The NTO Crypto Library performs all cryptographic functionality for the NTO 7303 and Vision ONE appliances, including asymmetric key generation, symmetric encryption, hashing, digital signatures, and provides TLSv1.2 protocols and SNMPv3 privacy and authentication protocols.

            • Intel i7 3555LE
          8/25/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3891
          1628Nuvoton Technology Corporation
          No. 4, Creation Rd. III
          Hsinchu Science Park 300
          Taiwan, R.O.C.

          Yossi Talmi
          yossi.talmi@nuvoton.com
          +972-9-9702364
          Fax: +972-9-9702001

          Oren Tanami
          oren.tanami@nuvoton.com
          +972-9-9702390
          Fax: +972-9-9702001

          Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

          LAG019


          Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 0, revision 1.38

            • N/A
          8/25/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3890
          1627Samsung Electronics Co., Ltd.
          R5, Maetan 3-dong Yeongton-gu
          Suwon-si, Gyeonggi 443-742
          Korea

          JungHa Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Brian Wood
          be.wood@samsung.com
          +1-973-440-9125

          Samsung Kernel Cryptographic Module

          1.7.1


          Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

            • Samsung Exynos 7870 w/ Android 7.1 (Kernel 3.18)
          8/25/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3159
          1626Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Red Hat NSS Softoken (64 bit)

          5.0


          User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          8/25/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3885
          1625Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Red Hat NSS Softoken (32 bit)

          5.0


          User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          8/25/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3884
          1624IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • SPARC T4 w/ Solaris(R) 11 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4738
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3883
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3155
          1623IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • SPARC T4 w/ Solaris(R) 11 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4737
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3882
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3154
          1622IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4736
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3881
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3153
          1621IBM Corporation
          1 New Orchard Road
          Armonk, NY 10504
          USA

          Peter Szczepankiewicz
          peter.s14@us.ibm.com
          757-689-0507
          Fax: 757-689-0507

          Rory Bray
          rory.bray@ca.ibm.com
          506-449-7810
          Fax: 506-449-7810

          libcrypto/openssl

          1.0.1e


          Main crypto provider for all standard QRadar functionality

            • Intel(R) Xeon(R) CPU E5-2650 w/ Red Hat Enterprise Linux Server release 6.7 (Santiago)
          8/25/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4735
          1620IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4734
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3879
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3151
          1619IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4733
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3878
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3150
          1618IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4732
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3877
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3149
          1617IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4731
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3876
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3148
          1616IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4730
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3875
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3147
          1615IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4729
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3874
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3146
          1613IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4727
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3872
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3144
          1612IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4726
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3871
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3143
          1611IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4725
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3870
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3142
          1610IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4724
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3869
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3141
          1609Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100- OpenSSL-vSRX

          15.1X49-D100


          The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

            • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
          8/18/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3137
          1608Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100- Quicksec

          15.1X49-D100


          The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

            • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
          8/18/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3136
          1607DELL, INC
          5450 Great America Parkway,
          Santa Clara, CA 95054
          US

          Srihari Mandava
          srihari_mandava@dell.com

          Jeff Yin
          Jeff_Yin@Dell.com

          Dell OpenSSL Cryptographic Library

          2.4


          Dell OpenSSL Cryptographic Library v2.4 provides a variety of cryptographic services used by Dell''''s Data Center hardened Dell Networking OS management and routing features.

            • Intel Atom C2000 w/ Dell EMC Networking OS 10.3.1
          8/18/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4718
          1606CA Technologies Canada
          500-885 West Georgia St
          Vancouver, BC V6C 3G1
          Canada

          Alina Muresan
          mural05@ca.com
          604 235 8305

          Julia Kazakova
          kazju01@ca.com
          604-235-8354

          CA API Gateway Cryptographic Library - OpenSSL

          v9.2.00


          Provides cryptographic functionality for the CA API Gateway.

            • Intel Xeon w/ RHEL6 on VMware ESXi 5.5.0
            • Intel Xeon w/ RHEL6
          8/18/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4429
          1605Forcepoint
          10900-A Stonelake Blvd.
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (3305) without AESNI

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
          8/18/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4716
          1604Yubico
          420 Florence St, Ste 200
          Palo Alto, CA 94301
          USA

          Jerrod Chong
          jerrod@yubico.com

          Jakob Ehrensvard
          jakob@yubico.com

          Yubico HW/FW DRBG

          SLE78CLUFX3000PH e58230b8 (Firmware)


          This module implements required SP800-90A hardware/firmware functions for instantiate, generate and reseed, including initial reseed from built-in hardware TRNG.

            • Infineon SLE78V2
          8/11/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4713
          1603Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-QuickSec

          15.1X49-D100 (Firmware)


          The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E5
          8/11/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3129
          1602Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-OpenSSL

          15.1X49-D100 (Firmware)


          The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E3
          8/11/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3128
          1601Trend Micro Inc.
          11305 Alterra Parkway
          Austin, TX 78758
          USA

          Paul Tucker
          paul_tucker@trendmicro.com
          512-633-7945

          TippingPoint Crypto Core OpenSSL

          2.0.13


          The TippingPoint Crypto Core OpenSSL is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for TippingPoint security products.

            • Intel Core i3 without PAA w/ Linux 4.4
            • Intel Xeon with PAA w/ Linux 4.4
            • Intel Xeon without PAA w/ Linux 4.4 on Vmware ESXi 6.5
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4703
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3850
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3115
          1600SafeLogic, Inc.
          530 Lytton Ave
          Suite 200
          Palo Alto, CA 94301
          USA

          SafeLogic Inside Sales
          sales@safelogic.com
          (844) 436-2797

          CryptoComply Java Engine

          3.0.1


          CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

            • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
          8/11/2017
          • Counter:
            • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4702, TDES #2494
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3849
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3114
          1599Allwinner Technology Co.,Ltd
          No.9 Technology Road 2, High-Tech Zone
          Zhuhai, Guangdong 519085
          China

          Qing Zhang
          qingzhang@allwinnertech.com
          +86-756-3818333
          Fax: +86-756-3818358

          Wei Guo
          guowei@allwinnertech.com
          +86-756-3818333
          Fax: +86-756-3818358

          Crypto Engine

          V2.0


          Crypto engine is implemented with Veilog HDL. It provides cryptographic functions.

            • N/A
          8/11/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-256, SHA-512
            • Prerequisite: SHS #3848
          1598Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4700
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3847
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3112
          1597Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4699
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3846
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3111
          1596Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4698
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3845
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3110
          1595Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4697
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3844
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3109
          1594Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4696
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3843
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3108
          1593Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4695
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3842
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3107
          1592LG Electronics, Inc.
          20 Yoido-dong
          Youngdungpo-gu
          Seoul 152-721
          Republic of Korea

          Jongseong Kim
          jongseong.kim@lge.com
          82-10-4535-0110
          Fax: 82-2-6950-2080

          LG BoringSSL

          2.0


          General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

            • Snapdragon 835 (MSM8998) w/ Android 7.1.2
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4691
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3841
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3106
          1591NetBrain Technologies, Inc
          15 Network Drive 2nd Floor
          Burlington, Massachusetts 01803
          United States

          Michael Passanisi
          Michael.Passanisi@netbraintech.com
          781-221-7199 (x2055)
          Fax: +1 (781) 998-5800

          Boyang Zhang
          boyang.zhang@netbraintech.com
          781-221-7199 (x2059)

          NetBrain OpenSSL Cryptographic Module

          1.0


          The NetBrain OpenSSL Cryptographic Module is a C library of cryptographic functions which provides cryptographic services to applications via easy-to-use API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography.

            • Intel Xeon E3 family w/ Windows Server 2012 R2 Standard
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4690
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3840
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3105
          1590Taisys Technologies Co. Ltd.
          7F., No.56, Lane 321
          Yangguang St., Neihu Dist.
          Taipei, Taipei 11491
          Taiwan (R.O.C.)

          Joe Wang
          joe.wang@taisys.com
          +886-2-26270927x6699
          Fax: +886-2-26270619

          Kent Horng
          kent.horng@taisys.com
          +886-2-26562185 #206
          Fax: +886-2-26579657

          TAISYS JUISE-S2

          ST33G1M2


          The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

            • N/A
          8/11/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3838
          1589BiObex, LLC
          11501 Sunset Hills Rd
          Suite 200
          Reston, VA 22190
          USA

          Arthur Joyce
          ajoyce@biobex.com
          571-313-0969

          SAFE-Key device

          1.1.0.0 (Firmware)


          The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

            • STM32F415
          8/11/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3837
          1588Sonus Networks, Inc.
          4 Technology Park Drive
          Westford, MAS 01886
          USA

          Keith Conger
          kconger@sonusnet.comkconger@sonusnet.com
          978-614-8115

          Adam Elshama
          aelshama@sonusnet.com
          978-614-8327

          Sonus Cryptographic Library version 3.0

          5.1.2


          Sonus’ Session Border Controller Software Edition (SWe) is a software-only SBC architected to enable and secure real-time communications in multiple virtual environments. It features the same code base, resiliency, media transcoding, and security technology found in Sonus’ hardware-based SBC 5000 or 7000 series.

            • Intel Xeon w/ Sonus’ ConnexIP OS running on VMware ESXi 6.0
          8/11/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4686
          1587Motorola Solutions Inc
          1301 East Algonquin Road
          Schaumburg, IL 60196
          USA

          Amalendu Roy
          aroy@motorolasolutions.com
          888-325-9336

          Ken Fuchs
          Ken.Fuchs@motorolasolutions.com
          888-325-9336

          Motorola Solutions Cryptographic Software Module

          libALG_R01.03.00


          The module is a comprehensive suite of FIPS Approved and non-Approved algorithms and delivered to the end customer(s) as a Dynamically Linked Library (DLL) which is the logical boundary of the cryptographic module. The module provides cryptographic functionalities in Motorola Solutions ASTRO IP Dispatch Console products.

            • Intel Core i7-6820HQ CPU w/ Microsoft Windows 10 Professional Version 10.0.14393
            • Intel Core i7-6820HQ CPU w/ Microsoft Windows 7 Professional Version 6.1.7601 Service Pack 1
          8/11/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4683
          1586SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using C implementation of SHA

          2.0


          The test covers implementations of sha1-generic, sha224-generic, sha256-generic,, sha384-generic,, sha512-generic,.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3833
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3098
          1585SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using CPACF for AES core, TDES core and SHA

          2.0


          This test covers the implementations of gcm_base(ctr(aes-s390),ghash-generic), ccm_base(ctr(aes-s390),aes-s390), cbc(aes-s390), ecb(aes-s390), xts(aes-s390), kw(aes-s390), cmac(aes-s390),cbc(des3_ede-s390), ctr(des3_ede-s390), ecb(des3_ede-s390), cmac(des3_ede-s390), sha1-s390, sha224-s390, sha256-s390, sha384-s390, sha512-s390.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4682
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3832
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3097
          1584SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using C implementation of AES

          2.0


          The test covers implementations of gcm_base(ctr(aes-generic), ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic).

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4681
          1583Cisco Systems, Inc
          170 W Tasman Dr
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Intel Xeon on VMware ESXi 5.5
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4680
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3831
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3096
          1582SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using CPACF for AES, TDES and GHASH

          2.0


          This test covers implementations of gcm_base(ctr-aes-s390,ghash-s390), ccm_base(ctr-aes-s390,aes-s390), cbc-aes-s390, ecb-aes-s390, xts-aes-s390, cbc-des3_ede-s390, ecb-des3_ede-s390, ctr-des3_ede-s390.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4677
          1581Cisco Systems, Inc
          170 W Tasman Dr
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Intel Xeon
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4676
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3830
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3095
          1580ForeScout
          190 West Tasman Drive
          San Jose, CA 95134
          USA

          Ayelet Kutner
          cavp@forescout.com

          BC-FJA (Bouncy Castle FIPS Java API)

          1.0.0


          The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

            • Intel Celeron J1900 w/ CentOS 6.6
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256
            • Prerequisite: SHS #3827
          1579Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4667
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3824
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3091
          1578Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4666
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3823
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3090
          1577RSA, The Security Division of EMC
          174 Middlesex Turnpike
          Bedford, MA 01730
          USA

          Rohit Mathur
          rohit.mathur@rsa.com
          +61730325220

          RSA BSAFE Crypto-C Micro Edition

          4.1.3.2


          RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

            • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4665
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3089
          1576Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (Full CPU set, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4664
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3821
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3088
          1575Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          GnuTLS_x86_64_C

          5.0


          GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

            • Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4585
          1574Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          GnuTLS_x86_C

          5.0


          GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

            • Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4584
          1573Nokia
          600 March Rd
          Ottawa, Ontario K2K 2E6
          Canada

          Hooman Bidgoli
          hooman.bidgoli@nokia.com
          +1 613 784 5351

          Peter Merriman
          peter.merriman@nokia.com
          +1 613 784 3045

          Nokia 7705 SAR OS Non Datapath Cryptographic Library

          2 (Firmware)


          The Nokia 7705 SAR OS Non Datapath Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

            • Cavium Octeon Plus
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4657
          1572Nokia
          600 March Rd
          Ottawa, Ontario K2K 2E6
          Canada

          Hooman Bidgoli
          hooman.bidgoli@nokia.com
          +1 613 784 5351

          Peter Merriman
          peter.merriman@nokia.com
          +1 613 784 3045

          Nokia 7705 SAR OS Cryptographic Library

          2 (Firmware)


          The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

            • Cavium Octeon Plus
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4656
          1571Nokia
          600 March Rd.
          Ottawa, Ontario k0A 2Z0
          Canada

          Hooman Bidgoli
          hooman.bidgoli@nokia.com
          +1 613 784 5351

          Peter Merriman
          peter.merriman@nokia.com
          +1 613 784 3045

          Nokia 7705 SAR OS Cryptographic Library

          2 (Firmware)


          The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

            • Cavium Octeon II
          8/4/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4655
          1570Evertz Microsystems
          5292 John Lucas Dr.
          Burlington, Ontario L7L 5Z9
          Canada

          Bruce Mathews
          brucematthews@evertz.com
          540-778-3287

          IPX OpenSSL Cryptographic Module

          2v0_b1 (Firmware)


          Card for 6RU Shelf loaded with Evertz IPX

            • MPC8377E
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4652
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256
            • Prerequisite: SHS #3811
          1569Evertz Microsystems
          5292 John Lucas Dr.
          Burlington, Ontario L7L 5Z9
          Canada

          Bruce Matthews
          BruceMatthews@evertz.com
          540-778-3287

          MAGNUM OpenSSL Cryptographic Module

          1.16.0 (Firmware)


          1RU Server loaded with Evertz MAGNUM control

            • Intel Xeon
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4651
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256
            • Prerequisite: SHS #3810
          1568Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux 7 NSS without AES-NI

          R7-2.0.0


          Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

            • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3808
          1567Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (Full CPU set, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4644
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3807
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3076
          1566wolfSSL Inc
          10016 Edmonds Way
          Suite C-300
          Edmonds, WA 98020
          USA

          Todd Ouska
          todd@wolfssl.com
          503-679-1859

          Larry Stefonic
          larry@wolfssl.com
          206-369-4800

          wolfCrypt

          3.11.2


          wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

            • NXP i.MX6 Quad w/ Android Dalvik 4.2.2
            • NXP i.MX50 (Device Tree Support) w/ Linux 4.1.15
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3806
          1565DocuSign, Inc.
          221 Main St.
          Suite 1000
          San Francisco, CA 94105
          USA

          Ezer Farhi
          ezer@arx.com
          972-39279529
          Fax: 972-39230864

          Moshe Harel
          Moshe.Harel@docusign.com
          972-3-9279578
          Fax: 972-3-9230864

          PrivateServer

          5.0.2 (Firmware)


          PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

            • Intel Xeon Quad-Core
          8/4/2017
          • HMAC based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3073
          1564Feitian Technologies Co., Ltd
          Floor 17, Tower B, Huizhi Mansion
          No.9 Xueqing Road
          Haidian, Beijing 100085
          China

          PENG Jie
          pengjie@ftsafe.com
          +8610 62304466-419
          Fax: +8610 62304477

          WenSheng Ju
          wensheng@ftsafe.com
          +8610 62304466-527
          Fax: +8610 62304477

          DRBG

          1.0 (Firmware)


          DRBG is implemented following SP800-90A, CTR DRBG. Its crypto algorithm is 3DES. The seeding implementation uses Derivation function.

            • M7893 (Infineon Technologies AG SLx78)
          8/4/2017
          • Counter:
            • Modes: 3KeyTDEA
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: TDES #1899
          1563Trusted Concepts
          205 Van Buren St
          Suite 440
          Herndon, VA 20170
          USA

          Chris Greenlee
          chris.greenlee@trustedconcepts.com
          202.680.3718

          TrustedKeep Encryption Module

          1.8.3


          TrustedKeep is a secure object storage and sharing solution.

            • Intel Core i7 w/PAA w/ CentOS 7.3
            • Intel Core i7 w/o PAA w/ CentOS 7.3
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4637
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3801
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3070
          1562Security First Corp.
          29811 Santa Margarita Parkway
          Suite 600
          Rancho Santa Margarita, CA 92688
          USA

          Rick Orsini
          rorsini@securityfirst.com
          949-585-7525
          Fax: 949-858-7092

          Secure Parser Library

          4.7.1.10


          The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library

            • Intel Atom x5 on GETAC MX50 w/ Android 5.1.1
          8/4/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4636
          1561wolfSSL Inc
          10016 Edmonds Way
          Suite C-300
          Edmonds, WA 98020
          USA

          Todd Ouska
          todd@wolfssl.com
          503-679-1859

          Larry Stefonic
          larry@wolfssl.com
          206-369-4800

          wolfCrypt

          3.11.2


          wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

            • Intel Xeon 1275v3 w/ Debian 8.8
          8/4/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3799
          1560Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-QuickSec

          15.1X49-D100 (Firmware)


          The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E3
          8/4/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3067
          1559Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-OpenSSL

          15.1X49-D100 (Firmware)


          The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E5
          8/4/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3066
          1558Google LLC
          1600 Amphitheatre Parkway
          Mountain View, CA 94043
          USA

          Titan Key FIPS officer
          titan-key-fips-officer@google.com

          Titan Key

          1.0


          Implemented with Google’s "Titan" secure microcontroller and custom firmware, the Titan Key is a FIPS-compliant Universal 2nd Factor (U2F) authenticator and hardware root of trust.

            • N/A
          7/28/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3065
          1557Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Petra Manche
          +44 1189 245470

          Chris Brych
          +1 613.216.3078

          Oracle ILOM OpenSSL FIPS Object Module

          2.0.10


          Oracle ILOM OpenSSL FIPS Object Module is a software library providing a C language application program interface (API) for use by other processes that require cryptographic functionality and is classified by FIPS 1402 as a software module, multichip standalone module embodiment.

            • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
            • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
          7/28/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4629
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3793
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3064
          1556Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations

          10.0.15063


          The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          7/28/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4627
          1555Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

          10.0.15063


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          7/21/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4624
          1554Hewlett-Packard Development Company, L.P.
          11445 Compaq Center Drive W
          Houston, TX 77070
          USA

          Timothy McDonough
          timothy.mcdonough@hpe.com

          Hewlett Packard Enterprise SSL Crypto Module Engine

          2.1


          Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

            • ARM i.MX6 w/ Yocto Linux 3.0.35
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4624
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3790
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3061
          1553SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AES, SHA and GHASH from CPACF

          3.0


          This test covers CPACF implementation of AES, SHA and GHASH.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4623
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3789
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3060
          1552SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using assembler implementation of AES, SHA and GHASH

          3.0


          This test covers assembler implementation of AES, SHA and GHASH.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4622
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3788
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3059
          1551SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using SSSE3 for SHA

          2.0


          The test covers implementations of sha1-ssse3, sha224-ssse3, sha256-ssse3, sha384-ssse3, sha512-ssse3.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3786
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3058
          1550SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using C implementation of SHA

          2.0


          The test covers implementations of sha1-generic, sha224-generic, sha256-generic, sha384-generic, sha512-generic.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3785
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3057
          1549SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using AVX2 for SHA

          2.0


          The test covers implementations of sha1-avx2, sha224-avx2, sha256-avx2, sha384-avx2, sha512-avx2.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3784
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3056
          1548McAfee, Inc.
          2821 Mission College Blvd.
          Santa Clara, CA 95054
          USA

          Mark Hanson
          Mark_Hanson@McAfee.com
          972-963-7326

          McAfee NSP NS Crypto Lib

          2.0.5_8.1.17.30 (Firmware)


          Cryptographic services for the McAfee NSP Intrusion Prevention appliances

            • Intel Xeon E5 Family
            • Intel Atom C Family
          7/21/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4619
          1547SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernle Crypto API using AVX for SHA

          2.0


          The test covers implementations of sha1-avx, sha224-avx, sha256-avx, sha384-avx, sha512-avx.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3782
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3054
          1546SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using AES_NI for AES core and CLMUL for GHASH

          2.0


          The test covers implementations of gcm_base(ctr-aes-aesni,ghash-clmulni), ccm_base(ctr-aes-aesni,aes-aesni), cbc(aes-aesni), ecb(aes-aesni), xts(aes-aesni), kw(aes-aesni), cmac(aes-aesni).

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4614
          1545SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using strict assembler for AES core

          2.0


          This test covers the implementations of gcm_base(ctr(aes-asm),ghash-generic), ccm_base(ctr(aes-asm),aes-asm), cbc(aes-asm), ecb(aes-asm), xts(aes-asm), kw(aes-asm), cmac(aes-asm).

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4611
          1544SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          Kernel Crypto API using C implementation of AES

          2.0


          The test covers implementations of gcm_base(ctr(aes-generic), ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic).

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4608
          1543Fortinet Inc.
          1090 Kifer Road
          Sunnyvale, CA 94086-5301
          USA

          Alan Kaye
          akaye@fortinet.com
          613-225-9381 x7416
          Fax: 613-225-9951

          Fortinet FortiOS RBG Cryptographic Library

          5.4 (Firmware)


          This document focuses on the firmware implementation of the Fortinet FortiOS RNG Cryptographic Library v5.4 running on Intel x86 compatible processors.

            • ARM v5 Compatible (SoC2)
            • ARM v7 Compatible (SoC3)
            • Intel Celeron
            • Intel Xeon E5
            • Intel i3
            • Intel i5
            • Intel i7
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #200928-0-N-00
          1542Hewlett Packard Enterprise
          1160 Enterprise Way
          Sunnyvale, CA 94089
          USA

          Indra Fitzgerald
          indra.fitzgerald@hpe.com
          541-360-6218

          HPE Atalla Cryptographic Subsystem

          1.20 (Firmware)


          The Atalla Cryptographic Subsytem (ACS) is a multi-chip embedded cryptographic module that provides secure cryptographic processing, key management, and storage capabilities.

            • Cavium Octeon III CN73xx, 16 cores, 1.8 Ghz
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4600
          1541Symantec Corporation
          350 Ellis Street
          Mountain View, CA 94043
          USA

          Ian Hall
          Ian_hall@symantec.com
          703-598-6876

          Diana Robinson
          diana_robinson@symantec.con
          845-454-6397

          SG VA Cryptograpchic Library

          4.1.1


          The SG VA Crypto Library provides the necessary cryptographic services developed specifically for use in the Secure Web Gateway appliance line.

            • Intel Xeon E5 Broadwell on VMWare ESXi v6.0 w/ SGOS 6.7
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4596
          1540SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AES-NI for AES, and PCLMULQDQ for multiplication and GHASH

          3.0


          This test covers AES-NI for AES, and PCLMULQDQ for multiplication and GHASH.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4595
          1539SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using SHA assembler

          3.0


          This test covers generic assembler implementation of SHA.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3771
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3045
          1538SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using SSSE3 for SHA

          3.0


          This test covers SSSE3 implementation of SHA-1, SHA-224, SHA-256.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256
            • Prerequisite: SHS #3770
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256
            • Prerequisite: HMAC #3044
          1537SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AVX for SHA

          3.0


          This test covers AVX implementation of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3769
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3043
          1536SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AVX2 for SHA

          3.0


          This test covers AVX2 implementation of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3768
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3042
          1535SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using SSSE3 for Constant Time assembler and Bit Slice AES, and PCLMULQDQ for GHASH

          3.0


          This test covers OpenSSL using SSSE3 for Constant Time assembler and Bit Slice AES, and PCLMULQDQ for GHASH.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4594
          1534Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (3305)

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4593
          1533Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (2105)

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Xeon D w/ GNU / Linux (Debian) 9.0 -based distribution
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4592
          1532Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (325)

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Atom C w/ GNU / Linux (Debian) 9.0 -based distribution
          7/14/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4591
          1531SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using AES assembler for AES, and PCLMULQDQ for GHASH

          3.0


          This test covers AES assembler for AES, and PCLMULQDQ for multiplication and GHASH.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4588
          1530IBM Corporation
          2455 South Road
          Poughkeepsie, New York 12601-5400
          USA

          John Monti
          jmonti@us.ibm.com
          845-435-4164

          IBM z/OS(R) Cryptographic Services ICSF PKCS #11

          OA52336


          ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

            • IBM z13 w/ IBM z/OS(R) v2.2
          7/8/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-512
            • Prerequisite: SHS #3761
          1529Cisco Systems, Inc
          170 W Tasman Drive
          San Jose, California 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          IOS Common Cryptographic Module (IC2M)

          Rel5 (Firmware)


          The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

            • MIPS64
            • Intel Atom
            • Intel Xeon on ESXi 5.5
            • PPC405
            • PPCe500
            • PPCe5500
            • Intel Core i3
            • Intel Pentium
            • Intel Xeon
            • PPC465
          7/8/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4583
          1528Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Libgcrypt (C implementations) Intel x86 32 bit

          5.0


          Libgcrypt (C implementations) Intel x86 64 bit

            • Intel x86 64 bit w/ Red Hat Enterprise Linux 7.4
          7/8/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4581
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3757
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3031
          1527Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Libgcrypt (C implementations) Intel x86 64 bit

          5.0


          Libgcrypt (C implementations) Intel x86 64 bit

            • Intel x86 64 bit w/ Red Hat Enterprise Linux 7.4
          7/8/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4580
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3756
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3030
          1526IBM Corporation
          2455 South Road
          Poughkeepsie, New York 12601-5400
          USA

          John Monti
          jmonti@us.ibm.com
          845-435-4164

          Alyson Comer
          comera@us.ibm.com
          607-429-4309

          IBM(R) z13(TM) CP Assist

          FC 3863 EC P00339 Drv 27I


          The IBM z System(TM) CP Assist for Cryptographic Function (CPACF) provides processor-integrated hardware acceleration for TDES, AES, DRBG and SHA variants.

            • N/A
          7/8/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-512
            • Prerequisite: SHS #3661
          1525L3 Communications Canada / Targa Systems Division
          2081 Merivale Road
          Ottawa, ON K2G1G9
          Canada

          Dave Saunders
          Dave.Saunders@l-3com.com
          613-727-9876
          Fax: 613-727-1705

          Series 4 Gen 3 DTU

          1.0.0-32004093 (Firmware)


          Network Attached Storage device with removable storage.

            • Freescale P1022
          7/8/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3755
          1524Oracle Communications
          100 Crosby Drive
          Bedford, MA 01730
          USA

          Madhu Mathiyalagan
          madhu.mathiyalagan@oracle.com
          (781) 578-7514

          Chris Brych
          chris.brych@oracle.com
          (613) 216-3078

          Oracle Acme Packet OpenSSL Cryptographic Library

          ECz 7.5.0


          The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

            • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
          7/8/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4577
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3754
          1523F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4576
          1522F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v3 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4575
          1521F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.2 HF2


          Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4574
          1520F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v3 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4573
          1519F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4572
          1518F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AESNI and SHA SSSE3

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4571
          1517F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4570
          1516F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4569
          1515F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1650 v4 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4568
          1514F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1650 v4 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4567
          1513F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1630 v4 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4566
          1512F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES-NI and SHA SSSE3

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1630 v4 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4565
          1511Futurex
          864 Old Boerne Road
          Bulverde, TX 78163
          USA

          Futurex Security Certifications
          certifications@futurex.com
          830-980-9782

          OpenSSL

          6.2.0.0 (Firmware)


          The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

            • TI AM3352
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4564
          1510NetApp, Inc.
          495 East Java Drive
          Fourth Floor
          Sunnyvale, CA 94089
          USA

          Mike Scanlin
          Michael.Scanlin@netapp.com
          919.476.8578
          Fax: 919.476.4272

          NetApp Cryptomod

          2.0


          NetApp CryptoMod will be integrated into select NetApp ONTAP releases for the purpose of supporting FIPS 140-2 compliant data-at-rest encryption and key management.

            • Intel Xeon E5 w/ Data ONTAP 9.2
            • Intel Xeon E5 w/ Data ONTAP 9.2 without PAA
          6/23/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4563
          1509Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Kelvin Desplanque
          kdesplan@cisco.com
          6137887216

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is firmware that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Intel Xeon
          6/23/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4561
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3739
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3013
          1507Google LLC
          1600 Amphitheatre Parkway
          Mountain View, CA 94043
          USA

          Adam Langley
          security@chromium.org

          BoringCrypto

          24e5886c0edfc409c8083d10f9f1120111efd6f5


          A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

            • POWER9 w/ Ubuntu Linux 17.04
            • POWER8 w/ Ubuntu Linux 17.04
            • Intel Xeon E5 w/ Ubuntu Linux 16.04
            • Intel Xeon E5 without PAA w/ Ubuntu Linux 14.04 LTS
            • POWER8 without PAA w/ Ubuntu Linux 15.04
          6/21/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4558
          1506Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
          312 Kings Way
          South Melbourne, Victoria 3025
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN9000 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • ARM Cortex A9
          6/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3734
          1505Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
          312 Kings Way
          South Melbourne, Victoria 3025
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN6000 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • Intel ATOM
          6/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3733
          1504Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA
          312 Kings Way
          South Melbourne, Victoria 3205
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN8000 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • Intel Xeon
          6/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3732
          1503Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
          312 Kings Way
          South Melbourne, Victoria 3025
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • ARM Cortex A9
          6/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3731
          1502Symantec Corporation
          305 Ellis Street
          Mountain View, CA 94043
          USA

          Ian Hall
          Ian_hall@symantec.com
          703-598-6876

          Diana Robinson
          diana_robinson@symantec.con
          845-454-6397

          SGOS Cryptographic Library

          4.1.1


          The SGOS Crypto Library provides the necessary cryptographic services to a proprietary operating system (SGOS 6.7) developed specifically for use in the ProxySG, Reverse Proxy and ASG.

            • Intel Xeon E5 Ivy Bridge w/ ASG 6.7
            • Intel Xeon E5 Sandy Bridge w/ SGOS 6.7
            • Intel Xeon E5 Ivy Bridge w/ SGOS 6.7
            • Intel Xeon E5 Broadwell w/ SGOS 6.7
          6/21/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4552
          1501Ultra Electronics AEP
          419 Bridport Road
          Greenford, Middlesex UB6 8UA
          United Kingdom

          Paul Kettlewell
          paul.kettlewell@ultra-cis.com
          +44 (0) 208 813 4461

          Vicky Hayes
          vicky.hayes@ultra-cis.com
          +44 (0) 208 813 4649

          Advanced Configurable Crypto Environment v3

          011395 v3 r4 (Firmware)


          The AEP Networks Advanced Configurable Crypto Environment v3 (ACCEv3) provides highly secure cryptographic services and key storage. It is the foundation of a range of products including the Keyper Plus.

            • P2020 QorIQ
          6/16/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256, SHA-512
            • Prerequisite: SHS #3728
          1500Bivio Networks, Inc.
          4457 Willow Road, Suite 240
          Pleasanton, CA 94588
          USA

          Raj Srinivasan
          raj@bivio.net
          (925) 924-8608
          Fax: (925) 924-8650

          OpenSSL

          1.0.1e-51


          OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

            • Intel® Atom™ CPU C2558 @ 2.40GHz w/ RHEL 7.1 on KVM 2.0.0 on Ubuntu 14.04 LTS
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4549
          1499Oracle Communications
          100 Crosby Drive
          Bedford, MA 01730
          USA

          Madhu Mathiyalagan
          madhu.mathiyalagan@oracle.com
          (781) 578-7514

          Chris Brych
          chris.brych@oracle.com
          (613) 216-3078

          Oracle Acme Packet OpenSSL Cryptographic Library

          ECz 7.5.0 (Firmware)


          The Acme Packet 1100 and 3900 feature Oracle''s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

            • Intel Atom C2358
            • Intel Xeon D-1548 (Intel Broadwell-DE)
          6/16/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4547
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3725
          1498DocuSign
          221 Main St.
          Suite 1000
          San Francisco, CA 94105
          USA

          Ezer Farhi
          Ezer.Farhi@docusign.com
          972-3-9279529

          DocuSign-SA-Main

          8.4 (Firmware)


          DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization''s end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

            • Intel® Xeon Quad-Core
          6/16/2017
          • HMAC based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #2999
          1497GE MDS, LLC
          175 Science Parkway
          Rochester, NY 14620
          USA

          Aaron Wright
          aaron.wright@ge.com
          585-242-8354
          Fax: 585-241-5590

          Alex Charissis
          alex.charissis@ge.com
          585-242-8402
          Fax: 585-241-5590

          Mocana DSF

          5.5 (Firmware)


          Cryptographic algorithm API and self-test routines implemented by Mocana, Inc.

            • Freescale IMX 6 (ARM)
          6/16/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4540
          1496GE MDS, LLC
          175 Science Parkway
          Rochester, NY 14620
          USA

          Aaron Wright
          aaron.wright@ge.com
          585-242-8354
          Fax: 585-241-5590

          Alex Charissis
          alex.charissis@ge.com
          585-242-8402
          Fax: 585-241-5590

          OpenSSL

          Fips-2.0.12 (Firmware)


          Open source Secure Sockets Layer cryptographic API and associated self-test routines.

            • Freescale IMX 6 (ARM)
          6/16/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4539
          1495Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

          R7-2.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4538
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3719
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2996
          1494Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

          R6-1.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4537
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3718
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2995
          1493Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AES and SHA1 assembler

          R7-2.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4536
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3717
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2994
          1492Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AES and SHA1 assembler

          R6-1.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4535
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3716
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2993
          1491Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL VPAES and SHA1 SSSE3

          R7-2.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4534
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3715
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2992
          1490Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL VPAES and SHA1 SSSE3

          R6-1.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
          6/16/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4533
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3714
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2991
          1489Palo Alto Networks
          4301 Great America Parkway
          Santa Clara, California 95054
          USA

          Richard Bishop
          rbishop@paloaltonetworks.com
          408-753-4000

          Jake Bajic
          jbajic@paloaltonetworks.com
          408-753-3901

          Palo Alto Networks Crypto Module (PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-500)

          8.0 (Firmware)


          The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 series firewalls, WF-500 and Panorama M-100/M-500.

            • Cavium Octeon MIPS64
            • Cavium MIPS64
            • Intel Multi Core Xeon
            • Intel Celeron
            • Intel i7
          6/9/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4532
          1488VMware, Inc.
          3401 Hillview Ave
          Palo Alto, CA 94303
          USA

          Manoj Maskara
          mmaskara@vmware.com
          650-427-1000
          Fax: 650-475-5001

          VMware VMkernel Cryptographic Module

          1.0


          The VMware VMkernel Cryptographic Module is a software cryptographic library that provides FIPS 140-2 approved cryptographic services for VMware products and platforms

            • Intel Xeon without PAA w/ VMWare ESXi 6.7
            • Intel Xeon with PAA w/ VMWare ESXi 6.7
          6/9/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4531
          1487Amazon Web Services, Inc.
          410 Terry Ave N
          Ste 1200
          Seattle, WA 98109-5210
          USA

          Kelvin Yiu
          kelvinyi@amazon.com

          Ken Beer
          nbeer@amazon.com

          AWS Key Management Service Cryptographic Algorithm Library

          1.0.0 (Firmware)


          The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module.

            • Intel Xeon E5-2640v4
          6/9/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4527
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3708
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2987
          1486Palo Alto Networks
          4301 Great America Parkway
          Santa Clara, California 95054
          USA

          Richard Bishop
          rbishop@paloaltonetworks.com
          408-753-4000

          Jake Bajic
          jbajic@paloaltonetworks.com
          408-753-3901

          Palo Alto Networks Crypto Module (PA VM-series)

          8.0


          The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

            • Intel Multi Core Xeon w/ VMware ESXi 5.5
            • Intel Multi Core Xeon w/ Centos 7.2 - KVM
            • Intel Multi Core Xeon w/ Hyper-V 2012 r2
            • Intel Multi Core Xeon w/ AWS EC2
            • Intel Multi Core Xeon w/ Azure
          6/2/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4526
          1485Hewlett Packard Enterprise Company
          3000 Hanover Street
          Palo Alto, CA 94304
          USA

          Luis Luciani
          luis.luciani@hpe.com
          281-518-6762

          Edward Newman
          edward.newman@hpe.com
          281-514-2713

          iLO SSL Firmware Crypto Library

          iLO 5 v1.11 (Firmware)


          HPE Integrated Lights-Out (iLO) management built into HPE Proliant servers is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall "health", reports issues, and provides a means for setup and managing of power and thermal settings.

            • Cortex A9
          6/2/2017
          • Counter:
            • Modes: AES-128
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4525
          1484Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A10)

          A10


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4523
          1483Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A9X)

          A9X


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4522
          1482Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A9)

          A9


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4521
          1481Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A8X)

          A8X


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4520
          1480Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A8)

          A8


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4519
          1479Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple Hardware DRBG (A7)

          A7


          SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

            • N/A
          5/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4518
          1478Motorola Solutions Inc
          1301 East Algonquin Road
          Schaumburg, IL 60196
          USA

          Amalendu Roy
          aroy@motorolasolutions.com
          888-325-9336

          Ken Fuchs
          Ken.Fuchs@motorolasolutions.com
          888-325-9336

          Motorola Solutions Cryptographic Software Module

          libALG_R01.01.02


          The Crypto module is a comprehensive suite of FIPS Approved algorithms implemented in C and crossed compiled on Linux build server. The module is delivered to target application team as library which is the logical boundary of the cryptographic module.

            • Texas Instruments (TI) Code Composer Studio (CCS) V5.3 Simulator w/ Mentor Graphics Nucleus 3.0 (version 2013.08.1)
            • Texas Instruments (TI) Code Composer Studio (CCS) V5.3 Simulator w/ Texas Instruments (TI) DSP/BIOS 5.41.04.18
          5/19/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4517
          1477Symantec Corporation
          350 Ellis Street
          Mountain View, CA 94043
          USA

          Jordan Saxonberg
          jordan_saxonberg@symantec.com
          424-750-7052
          Fax: 424-750-8107

          Symantec SymSSLf Cryptographic Module

          Intel Xeon 1.0.1


          Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

            • Intel Xeon with AES-NI w/ Windows 7 SP1
          5/19/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4516
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3704
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2983
          1476Symantec Corporation
          350 Ellis Street
          Mountain View, CA 94043
          USA

          Jordan Saxonberg
          jordan_saxonberg@symantec.com
          424-750-7052
          Fax: 424-750-8107

          Symantec SymSSLf Cryptographic Module

          Intel Xeon 1.0.1


          Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

            • Intel Xeon without AES-NI w/ Windows 7 SP1
          5/19/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4515
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3703
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2982
          1475TCL Communication Ltd.
          25 Edelman Suite 200
          Irvine, CA 92618
          USA

          Alain Perrier
          alain.perrier@blackberrymobile.com
          214-316-2312

          Nikhil Mhatre
          nikhil.mhatre@alcatelonetouch.com
          954-914-9952

          TCT Random Number Generator

          Snapdragon 625


          Snapdragon 625 Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

            • N/A
          5/19/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3700, SHS #3702
          1474Intel Corporation
          2200 Mission College Blvd.
          Santa Clara, California 95054
          USA

          Mark Hanson
          mark.hanson@intel.com
          972.963.7326

          McAfee OpenSSL FIPS Object Module

          1.0.0


          The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

            • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
          5/19/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4511
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3699
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2980
          1473VT iDirect
          13681 Sunrise Valley Drive, Suite 300
          Herndon, VA 20171
          USA

          Chris Gormont
          CGormont@idirectgov.com
          703.880.6257

          iDirect Cloak Algorithm Module 1.0

          1.0.2.0 (Firmware)


          VT iDirect, Inc''s firmware cryptographic library provides all cryptographic operations for the support of iDirect''s Transmission Security (TRANSEC) feature. The firmware cryptographic library implements the key management algorithms necessary for each member of the network to receive and decrypt data.

            • Altera Cyclone V
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3698
          1472Guardtime
          5151 California Ave.
          Suite 210
          Irvine, CA 92617
          USA

          Christian Bravo
          christian.bravo@guardtime.com
          310-227-6558

          Guardtime Cryptographic Support Library (CSL) Direct

          1.0.0 (Firmware)


          Cryptographic library for Guardtime products.

            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4508
          1471Flonidan A/S
          Islandsvej 29
          Horsens, Denmark DK-8700
          Denmark

          Tonny Frederiksen
          twf@flonidan.dk
          +45 75 61 88 88

          Kenneth Sørensen
          ks@flonidan.dk
          +45 75 61 88 88

          Flonidan Smart Meter mbedTLS Module

          2.4.0 (Firmware)


          Crypto module used in Flonidan smart meters

            • ARM Cortex
          5/12/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #2978
          1470Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using CPACF for AES, TDES and GHASH

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of gcm_base(ctr-aes-s390,ghash-s390), ccm_base(ctr-aes-s390,aes-s390), cbc-aes-s390, ecb-aes-s390, xts-aes-s390, cbc-des3_ede-s390, ecb-des3_ede-s390, ctr-des3_ede-s390.

            • z13 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4505
          1469Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using CPACF for AES and TDES core, and SHA

          1.0


          This test covers the implementations of gcm_base(ctr(aes-s390),ghash-generic), ccm_base(ctr(aes-s390),aes-s390), cbc(aes-s390), ecb(aes-s390), xts(aes-s390), kw(aes-s390), cmac(aes-s390),cbc(des3_ede-s390), ctr(des3_ede-s390), ecb(des3_ede-s390), cmac(des3_ede-s390), sha1-s390, sha224-s390, sha256-s390, sha384-s390, and sha512-s390.

            • z13 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4502
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3694
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2977
          1468Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2609 @1699MHz with AES-NI w/ Tintri Linux version 4.4.0.1
          5/12/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4499
          1467Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using C implementation

          1.0


          This test covers implementations of gcm_base(ctr(aes-generic),ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic), sha1-generic, sha224-generic, sha256-generic, sha384-generic, sha512-generic, cbc(des3_ede), ecb(des3_ede), ctr(des3_ede), cmac(des3_ede)

            • z13 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4498
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3693
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2976
          1466Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using PowerPC implementation for SHA-1

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of sha1-powerpc.

            • POWER8 w/ Ubuntu 16.04
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3692
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #2975
          1465Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using Power ISA 2.07 for AES and GHASH

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implmentations of gcm_base(p8_aes_ctr,p8_ghash), p8_aes_cbc, and p8_aes_xts.

            • POWER8 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4495
          1464Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using Power ISA 2.07 for AES core

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of gcm_base(ctr(p8_aes),ghash-generic), ccm_base(ctr(p8_aes),p8_aes), cbc(p8_aes), ecb(p8_aes), xts(p8_aes), kw(p8_aes), and cmac(p8_aes).

            • POWER8 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4492
          1463Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using C implementation

          1.0


          This test covers the implementations of gcm_base(ctr(aes-generic),ccm_base(ctr(aes-generic),aes-generic),cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic), sha1-generic, sha224-generic, sha256-generic, sha384-generic, sha512-generic, cbc(des3_ede), ecb(des3_ede), ctr(des3_ede), and cmac(des3_ede).

            • POWER8 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4489
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3691
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2974
          1462Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using SSSE3 for SHA

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of sha1-ssse3, sha224-ssse3, sha256-ssse3, sha384-ssse3, and sha512-ssse3.

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3690
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2973
          1461Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using AVX2 for SHA

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of sha1-avx2, sha224-avx2, sha256-avx2, sha384-avx2, and sha512-avx2.

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3689
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2972
          1460Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using AVX for SHA

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of sha1-avx, sha224-avx, sha256-avx, sha384-avx, and sha512-avx.

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3688
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2971
          1459Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using AES-NI for AES core and CLMUL for GHASH

          1.0


          Ubuntu Kernel Crypto API cryptographic module provides cryptographic services to the software components executing as part of the Linux kernel. This test covers the implementations of gcm_base(ctr-aes-aesni,ghash-clmulni), ccm_base(ctr-aes-aesni,aes-aesni), cbc(aes-aesni), ecb(aes-aesni), xts(aes-aesni), kw(aes-aesni), and cmac(aes-aesni).

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4484
          1458Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using strict assembler for AES and Triple-DES core

          1.0


          This test covers the implementations of gcm_base(ctr(aes-asm),ghash-generic), ccm_base(ctr(aes-asm),aes-asm), cbc(aes-asm), ecb(aes-asm), xts(aes-asm), kw(aes-asm), cmac(aes-asm), ecb(des3_ede-asm), and cbc(des3_ede-asm).

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4481
          1457Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          KC API using C implementation

          1.0


          The test covers implementations of gcm_base(ctr(aes-generic), ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic), sha1-generic, sha224-generic, sha256-generic, sha384-generic, sha512-generic, cbc(des3_ede), ecb(des3_ede), ctr(des3_ede), cmac(des3_ede)

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          5/12/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4478
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3687
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2970
          1456Cog Systems / HTC
          Level 1
          277 King Street
          Newton
          Sydney, NSW 2042
          Australia

          Daniel Potts
          danielp@cog.systems
          +1 855 662 7234

          D4Secure Boring/OpenSSL FIPS Module

          FIPS Module 2.0.14


          The D4Secure Boring/OpenSSL FIPS Module is an implementation of the FIPS Object Module, FIPS canister in Android.

            • Snapdragon 617 (MSM8952) w/ Android 6.0.1 - HTC Software Version 1.57.617.52
          5/5/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4476
          1455Qualcomm Technologies, Inc.
          5775 Morehouse Dr
          San Diego, CA 92121
          USA

          Yin Ling Liong
          yliong@qti.qualcomm.com
          858-651-7034
          Fax: 858-845-1523

          QTI Pseudo Random Number Generator (Version 2.3.1)

          Snapdragon 835


          Snapdragon 835 Pseudo Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

            • N/A
          4/26/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3684, SHS #3685
          1454Ciena Corporation
          7035 Ridge Road
          Hanover, MD 21076
          USA

          Kevin Meagher
          KMeagher@ciena.com

          Ciena 8700 Packetwave Platform

          8.5


          The 8700 Packetwave Platform is a multi-terabit programmable Ethernet-overdense wavelength division multiplexing (DWDM) packet switch.

            • NXP QorIQ P4080 w/ SAOS 8.5
          4/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4470
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-512
            • Prerequisite: HMAC #2967
          1453Samsung Electronics Co., Ltd.
          R5, Maetan 3-dong Yeongton-gu
          Suwon-si, Gyeonggi 443-742
          Korea

          Brian Wood
          be.wood@samsung.com
          +1-973-440-9125

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung Kernel Cryptographic Module

          1.8


          Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

            • MSM 8998 w/ Android 7.0
          4/21/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2938
          1452Samsung Electronics Co., Ltd.
          R5, Maetan 3-dong Yeongton-gu
          Suwon-si, Gyeonggi 443-742
          Korea

          Brian Wood
          be.wood@samsung.com
          +1-973-440-9125

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung Kernel Cryptographic Module

          1.8


          Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

            • Exynos 8895 w/ Android 7.0
          4/21/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2936
          1451OpenSSL Validation Services, Inc.
          1829 Mount Ephraim Road
          Adamstown, MD 21710
          USA

          Steve Marquess
          marquess@veridicalsystems.com
          301-874-2571

          OpenSSL FIPS Object Module

          2.0.16


          The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

            • Cavium Octeon II (MIPS) w/ ExtremeXOS-Linux 3.18
            • Intel Atom C2558 (x86) with AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
            • Intel Atom C2558 (x86) without AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
            • Intel Atom E3845 (x86) without AES-NI w/ Debian 9
            • Intel Atom E3845 (x86) with AES-NI w/ Debian 9
            • NXP T2080 (PPC) w/ Linux 3.12
          4/21/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4469
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3681
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2966
          1450Trustonic
          20 Station Road
          Cambridge CB1 2JD
          UK

          Alec Edgington
          alec.edgington@trustonic.com
          +44 1223 347864

          Mark Wooding
          mark.wooding@trustonic.com
          +44 1223 3478534

          TRICX

          1.0


          TRICX is a static library providing an extensive suite of FIPS-approved cryptographic algorithms and supporting a range of key sizes and modes.

            • ARM Cortex-A53 without PAA w/ Trustonic Kinibi 400A
            • ARM Cortex-A53 with PAA w/ Trustonic Kinibi 400A
          4/21/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3680
          1449Axway Inc.
          6811 E Mayo Blvd.
          Ste. 400
          Phoenix, AZ 85054
          USA

          Katrin Rosenke
          krosenke@axway.com
          480-627-1800
          Fax: 480-627-1801

          Kartik Krishnan
          kkrishnan@axway.com
          480-627-2649
          Fax: 480-627-1801

          Axway Security Kernel

          3.0.2


          Axway Validation Authority Suite: a collection of products that provide flexible and robust OCSP/SCVP certificate validation for standard and custom desktop and server applications, supporting established security standards and technologies. These products may be used together or integrated with existing solutions.

            • Intel® Xeon® E5-2620 w/ Microsoft Windows 2012 64-bit
            • Intel® Xeon® E5-2620 w/ RHEL 6.3 64-bit
            • Sun UltraSparc T1 w/ Solaris 64-bit
          4/14/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4466
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3678
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2964
          1448Silver Spring Networks
          230 W Tasman Drive
          San Jose, CA 95134
          USA

          Jeff Ebert
          jebert@ssni.com
          16697704000
          Fax: 18667760015

          Silver Spring Networks Endpoint Security Module

          130-0117-01.ESM


          Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

            • N/A
          4/14/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-512
            • Prerequisite: HMAC #2963
          1447A10 Networks, Inc.
          3 West Plumeria Drive
          San Jose, CA 95134
          USA

          John Chiong
          +1 408 325-8668

          A10 Networks SSL FIPS Library

          2.0.0 (Firmware)


          The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

            • Intel Xeon E3-1275v2 with AES-NI
            • Intel Xeon E5-1650v3 with AES-NI
            • Intel Xeon E5-2697v2 with AES-NI
            • Intel Xeon E5-2697v4 with AES-NI
          4/7/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4462
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3674
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2961
          1446Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Nick Goble
          ngoble@cisco.com
          703.484.7032

          CiscoSSL FIPS Object Module

          4.1


          The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

            • Intel Xeon w/ ADE-OS 2.4
          4/7/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4459
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3672
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2959
          1445Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2620 @2100MHz with AES-NI w/ Tintri Linux version 4.4.0.1
          4/7/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4458
          1444Gemalto
          525 Avenue du Pic de Bertagne
          CS 12023
          Gemenos 13881
          France

          Security and Certifications Team
          SecurityCertifications@gemalto.com

          Sylvain Lhostis
          Sylvain.Lhostis@gemalto.com
          +33 (0)4 42 36 60 62

          MultiAppIDV4.0 Cryptographic library

          Infineon SLE78 M7892 chip family 4.0 (Firmware)


          MultiAppIDV4.0 is a highly secured smartcard platform compliant with the Javacard 3.0.4, GP 2.2.1, Amdt D standards, designed to operate with the Infineon SLE78 M7892 chips. It supports: TDES, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF SP800-108 & DRBG SP800-90A algorithms.

            • Infineon SLE78 M7892 chip family
          4/7/2017
          • Counter:
            • Modes: AES-128
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4457
          1443Persistent Systems LLC
          303 Fifth Ave
          Suite 207
          New York, NY 10016
          USA

          Helson Maria
          hmaria@persistentsystems.com
          212-561-5895

          Dr. David Holmer
          dholmer@persistentsystems.com
          212-561-5895

          Wave Relay® Cryptographic Library

          2.0 (Firmware)


          The Wave Relay® Mobile Ad Hoc Network (MANET) is a peer-to-peer wireless networking solution that allows a distributed group of mobile users to communicate continuously without fixed infrastructure. The Wave Relay® Cryptographic Library provides module integrity assurance and management security.

            • NXP i.MX 6
          4/7/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4455
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3667
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2956
          1442HUAWEI TECHNOLOGIES Co. Ltd.
          Yuhuatai District
          101 Software Avenue
          HANGZHOU, ZHEJIANG 310000
          CHINA

          Yang Ze
          yangze1@huawei.com
          86 15919432118

          Bai Wenxin
          baiwenxin@huawei.com
          86 18969126628

          VPP

          V300R003C26SPC101B130 (Firmware)


          VPP Cryptographic Library provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

            • Cavium CN7015
            • Cavium CN6645
            • Cavium CN6880
            • Freescale SC411912C
            • Freescale MPC8572E
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4451
          1441HUAWEI TECHNOLOGIES Co. Ltd.
          Yuhuatai District
          101 Software Avenue
          HANGZHOU, ZHEJIANG 310000
          CHINA

          Yang Ze
          yangze1@huawei.com
          86 15919432118

          Bai Wenxin
          baiwenxin@huawei.com
          86 18969126628

          Openssl

          1.0.2h (Firmware)


          Openssl Cryptographic Library provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

            • Freescale SC411912C
            • Freescale MPC8572E
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4450
          1440HUAWEI TECHNOLOGIES Co. Ltd.
          Yuhuatai District
          101 Software Avenue
          HANGZHOU, ZHEJIANG 310000
          CHINA

          Yang Ze
          yangze1@huawei.com
          86 15919432118

          Bai Wenxin
          baiwenxin@huawei.com
          86 18969126628

          Openssl

          1.0.2h (Firmware)


          Openssl Cryptographic Library provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

            • Cavium CN7015
            • Cavium CN6645
            • Cavium CN6880
            • Cavium CN7809
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4449
          1439Ciena Corporation
          7035 Ridge Road
          Hanover, MD 21076
          USA

          Patrick Scully
          613-670-3207

          Ciena Waveserver

          1.4 (Firmware)


          The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

            • Xilinx XC7Z030
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4447
          1438Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          650-810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2680 @2399MHz with AES-NI w/ Tintri Linux version 4.4.0.1
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4446
          1437INTEGRITY Security Services (ISS)
          7585 Irvine Center Driver
          Suite 250
          Irvine, California 91618
          USA

          David Sequino
          dsequino@ghs.com
          206-310-6795
          Fax: 978-383-0560

          Douglas Kovach
          dkovach@ghs.com
          727-781-4909
          Fax: 727-781-2915

          Crestron Control Engine

          3.0 (Firmware)


          Porting of the ISS Embedded Cryptographic Toolkit (ECT) to the Crestron Control Engine.

            • iMX53
          3/31/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4442
          1436F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          Cryptographic Module for BIG-IP with AES and SHA assembler

          12.1.2 HF1


          Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

            • Intel Xeon X5650 w/ BIG-IP 12.1.2 HF1
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4437
          1435F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          Cryptographic Module for BIG-IP with AES-NI and SHA SSSE3

          12.1.2 HF1


          Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

            • Intel Xeon X5650 w/ BIG-IP 12.1.2 HF1
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4436
          1434Fortinet Inc.
          1090 Kifer Road
          Sunnyvale, CA 94086-5301
          USA

          Alan Kaye
          akaye@fortinet.com
          613-225-9381 x7416
          Fax: 613-225-9951

          Fortinet FortiWeb RBG Cryptographic Library

          5.6 (Firmware)


          This document focuses on the firmware implementation of the Fortinet FortiWeb RBG Cryptographic Library v5.6 running on Intel x86 compatible processors.

            • Intel Xeon E5 v3
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4461
          1433Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Gokul Karthik Balaswamy
          gokulk@microsoft.com
          425-706-8583
          Fax: 425-708-0107

          Christine Ahonen
          chrisah@microsoft.com
          425-706-8675
          Fax: 425-936-7329

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH)

          7.00.2872


          Microsoft Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) is a general-purpose, software-based, cryptographic module for Windows Embedded Compact. It can be dynamically linked into applications by software developers to permit the use of general-purpose cryptography.

            • Texas Instruments EVM3530 w/ Windows Embedded Compact 7 (ARMv7)
            • Samsung S3C6410 w/ Windows Embedded Compact 7 (ARMv6)
            • NXP i.MX27 w/ Windows Embedded Compact 7 (ARMv5)
            • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II)
            • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II w/ FP)
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4434
          1432Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Gokul Karthik Balaswamy
          gokulk@microsoft.com
          425-706-8583
          Fax: 425-708-0107

          Christine Ahonen
          chrisah@microsoft.com
          425-706-8675
          Fax: 425-936-7329

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH)

          8.00.6246


          Microsoft Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) is a general-purpose, software-based, cryptographic module for Windows Embedded Compact. It can be dynamically linked into applications by software developers to permit the use of general-purpose cryptography.

            • Texas Instruments EVM3730 w/ Windows Embedded Compact 2013 (ARMv7)
            • MSTI PDX-600 w/ Windows Embedded Compact 2013 (x86)
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4433
          1431Samsung Electronics Co., Ltd,
          416 Maetan-3dong, Yeongtong-gu
          Suwon-si, Gyeonggi-do 443-742
          South Korea

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung BoringSSL Cryptographic Module

          v1.1


          The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

            • Samsung Electronics Exynos8895 w/ Android 7.0
            • Qualcomm MSM8998 w/ Android 7.0
            • Samsung Electronics Exynos7570 w/ Android 7.0
            • Qualcomm MSM8917 w/ Android 7.0
            • Qualcomm MSM8996 w/ Android 7.0
            • Samsung Electronics Exynos8890 w/ Android 7.0
            • Samsung Electronics Exynos7420 w/ Android 7.0
            • Samsung Electronics Exynos7870 w/ Android 7.1
          3/31/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4432
          1430Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Gokul Karthik Balaswamy
          gokulk@microsoft.com
          425-706-8583
          Fax: 425-708-0107

          Christine Ahonen
          chrisah@microsoft.com
          425-706-8675
          Fax: 425-936-7329

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

          7.00.2872


          The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

            • Texas Instruments EVM3530 w/ Windows Embedded Compact 7 (ARMv7)
            • Samsung S3C6410 w/ Windows Embedded Compact 7 (ARMv6)
            • NXP i.MX27 w/ Windows Embedded Compact 7 (ARMv5)
            • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II)
            • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II w/ FP)
          3/31/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4431
          1429Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Gokul Karthik Balaswamy
          gokulk@microsoft.com
          425-706-8583
          Fax: 425-708-0107

          Christine Ahonen
          chrisah@microsoft.com
          425-706-8675
          Fax: 425-936-7329

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

          8.00.6246


          The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

            • Texas Instruments EVM3730 w/ Windows Embedded Compact 2013 (ARMv7)
            • MSTI PDX-600 w/ Windows Embedded Compact 2013 (x86)
          3/24/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4430
          1428IBM Corporation
          222 South Riverside Plaza
          Ste 1700
          Chicago, IL 60606
          USA

          Mark Seaborn
          mseaborn@us.ibm.com
          +1 312 423 6640x2354

          Jasopn Resch
          jresch@us.ibm.com

          Cleversafe FIPS Cryptographic Module

          1.1


          The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''''s ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

            • Intel Xeon without AES-NI w/ ClevOS 3.8.2.19-FIPS-EDITION
            • Intel Xeon with AES-NI w/ ClevOS 3.8.2.19-FIPS-EDITION
          3/24/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4422
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3640
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2935
          1427Dolby Laboratories, Inc.
          1275 Market Street
          San Francisco, CA 94103
          USA

          Jean-Philippe Viollet
          jp.viollet@dolby.com
          (818) 524 2956

          x86 Processor SP800-90A Rev1 DRBG

          FH8065501516702 1.1 (Firmware)


          An implementation of SP800-90A Rev1 DRBG algorithm used inside Dolby Media Blocks

            • x86 Processor
          3/10/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4418
          1426Attivo Networks, Inc.
          47697 Westinghouse Drive, Suite 201
          Fremont, CA 94539
          USA

          Satya Das
          510 623-1000

          Attivo Cryptographic Provider

          1.0 (Firmware)


          Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

            • Intel® Xeon® CPU E5-2620 v2 @ 2.10GHz
            • Intel® Xeon® CPU E5-2630 v3 @ 2.4GHz
          3/6/2017
          • Counter:
            • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4417, TDES #2379
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • Prerequisite: SHS #3638
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • Prerequisite: HMAC #2933
          1425Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          FMC FOM Virtual

          6.0


          A fault-tolerant, purpose-built network appliance that provides a centralized management console and database repository for your Firepower System deployment. FMC has a range of device management, event storage, host monitoring and user monitoring capabilities.

            • Intel Xeon E5 w/ ESXi 5.5
            • Intel Xeon Eseries w/ ESXi 5.5
          3/6/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4411
          1424Elster
          Timisoara Airport Park, DJ 691 km 8+775 m, Comuna Giarmata
          udetul Timis, Romania 307210
          Romania

          VLADIMIR DIATLOV
          VLADIMIR.DIATLOV@Honeywell.com
          +40 374 475 828
          Fax: +40 256 493 737

          SMETS2 AS302P

          1.1 (Firmware)


          The algorithms are implemented in an Electricity smart meter, for deployment in the UK Smart Metering Implementation Programme.

            • ARM 32-bit Cortex-M3
          3/6/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4410
          1423Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49- HMAC-DRBG

          15.1X49-D75 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • Broadcom XLP832 accelerator
          3/6/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #2919
          1422Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Cavium CN52xx
            • Intel Xeon X5650
            • Intel Xeon E5-2609 v3
            • Intel Xeon E5-2680 v3
            • Marvell A390
          3/6/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4409
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3635
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2931
          1421HUAWEI TECHNOLOGIES Co. Ltd.
          328# XINGHU Avenue
          SUZHOU, JIANGSU 215000
          CHINA

          Yang Ze
          yangze@huawei.com
          8615919432118

          Ji Xiang
          maximus.ji@huawei.com
          8615261806635

          Huawei FIPS Cryptographic Library (HFCL) for WLAN

          V300R003C22SPC806 (Firmware)


          Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

            • Qualcomm IPQ8068
            • Qualcomm QCA9550 series
            • Qualcomm IPQ40X8
            • Qualcomm QCA9531
            • Freescale P1025
            • Cavium CN6130
            • Cavium CN6335
          3/6/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3634
          1420Bull atos technologies
          Rue Jean Jaurès
          Les Clayes sous Bois 78340
          France

          Jean-Luc Chardon
          jean-luc.chardon@atos.net
          +33130807914

          Pierre-Jean Aubourg
          pierre-jean.aubourg@atos.net
          +33130807702

          C2P_CryptoCore

          20170118 (Firmware)


          Bull implements this algorithm for applications running on its CHR hardware platform providing secure cryptographic resources to products developed by Bull , including the CRYPT2Pay and CRYPT2Protect product lines.

            • Freescale QorIQ P1010
          2/28/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4402
          1419Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Matt Sturm
          msturm@forcepoint.com
          858-320-9444

          Matthew Noland
          matthew.noland@forcepoint.com
          512-644-1214

          Forcepoint C Cryptographic Module

          2.0.5


          Forcepoint produces a family of web, e-mail and data security solutions that can be deployed on pre-configured, security hardened hardware or as customer installable software. The Forcepoint C Crypto Module provides support for cryptographic and secure communications services for these solutions.

            • Forcepoint V10000 G4 Appliance on Intel Xeon E5-2620v3 w/ CentOS 7.2
          2/28/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4401
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3628
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2925
          1418HUAWEI TECHNOLOGIES Co., Ltd.
          Yuhuatai District
          101 Software Avenue
          NANJING, JIANGSU 210000
          CHINA

          Yang Ze
          yangze1@huawei.com
          8615919432118

          Liu Pinping
          liupinping@huawei.com
          8615850529039

          Huawei FIPS Cryptographic Library (HFCL) for Switches

          V300R003C22SPC805 (Firmware)


          Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

            • Cavium CN5020
            • BROADCOM 56340/56342
            • MARVELL 98DX3333/98DX3336
            • FREESCALE P2041
            • FREESCALE SC411231C
            • MARVELL 98DX3245/98DX3246/98DX3247
          2/28/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3627
          1417Citrix Systems, Inc.
          851 Cypress Creek Road
          Fort Lauderdale, FL 33309
          USA

          Ben Tucker
          Ben.Tucker@citrix.com
          954-267-3094

          Jonathan Andersen
          Jonathan.Andersen@citrix.com
          954-940-7737

          Citrix FIPS Cryptographic Module - DRBG

          1.0


          Citrix FIPS Cryptographic Module provides cryptographic services for various Citrix products.

            • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ iOS 10 64-bit
            • ARM v7-A with NEON extensions w/ Android 5
            • Intel Core i7 [4th Generation] with AES-NI w/ Windows 10 32-bit
            • ARM v7-A with NEON extensions w/ Android 6
            • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ Android 6
            • Intel Core i7 [6th Generation] with AES-NI w/ Windows 10 64-bit
            • ARM v8-A w/ Windows 10 Mobile 32-bit
            • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under XenServer 6, 64-bit
            • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under ESXi 5, 64-bit
            • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under Hyper-V on Windows Server 2012 R2, 64-bit
            • Intel Xeon E5-26xx v2 series with AES-NI w/ Free BSD 8.4 32-bit
            • Intel Xeon E5-26xx v2 series with AES-NI w/ Free BSD 8.4 64-bit
            • Intel Core i7 [6th Generation] with AES-NI w/ Linux 3.13 64-bit
            • ARM v7-A with NEON extensions w/ Android 4.4
            • ARM v7-A with NEON extensions w/ Android 7
            • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ Android 7
            • Intel Core i7 with AES-NI w/ Mac OS X 10.12 64-bit
            • ARM v8-A with NEON extensions w/ ViewSonic Thin OS
            • Intel Xeon E55xx Series w/ Linux 3.13 under XenServer 6
          2/28/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4397
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3626
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2923
          1416Information Security Corp
          1011 Lake St. Suite 425
          Oak Park, IL 60118
          USA

          Jonathan Schulze-Hewett
          schulze-hewett@infoseccorp.com
          708-445-1704
          Fax: 708-445-9705

          Michael Markowitz
          markowitz@infoseccorp.com
          708-445-1704
          Fax: 708-445-9705

          ISC Cryptographic Development Kit (CDK)

          8.0


          The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

            • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
          2/10/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #2922
          1415Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49- HMAC-DRBG

          15.1X49-D75 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • Intel Xeon (C5518)
          2/10/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #2920
          1414OpenSSL Validation Services, Inc.
          1829 Mount Ephraim Road
          Adamstown, MD 21710
          USA

          Steve Marquess
          info@openssl.com
          301-874-2571

          OpenSSL FIPS Object Module

          2.0.15


          The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

            • TI c64 w/ SurfWare 7.2
          2/10/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4391
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3620
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #2918
          1413Symantec Corporation
          384 Santa Trinita Ave
          Sunnyvale, California 94085
          USA

          Ian Hall
          ian_hall@symantec.com
          703-598-6876

          Diana Robinson
          diana_robinson@symantec.com
          845-454-6397

          Security Analytics Crypto Library v7.2

          7.2


          The Security Analytics Crypto Library v7.2 provides the necessary cryptographic services for the Security Analytics software developed specifically for use in the Security Analytics Central Manager (CM) and Forensic Appliances (FA).

            • Intel® Xeon® Processor IvyBridge (E5-2680 v2 and E5-2609v2) w/ Fedora Core 10
          2/10/2017
          • HMAC based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-512
            • Prerequisite: HMAC #2917
          1412Samsung Electronics Co., Ltd.
          416, Maetan 3-Dong Youngton Gu
          Suwon, Gyeonggi 152-848
          South Korea

          Brian Wood
          be.wood@samsung.com
          +1-973-440-9125

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung SCrypto Library

          2.0


          Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

            • Samsung Electronics Exynos8895 w/ Kinibi 400A (32-bit)
            • Qualcomm MSM8998 w/ QSEE 4.0 (32-bit)
            • Qualcomm MSM8998 w/ QSEE 4.0 (64-bit)
            • Samsung Electronics Exynos7870 w/ Kinibi 310 (32-bit)
          2/10/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4389
          1411Information Security Corp
          1011 Lake St. Suite 425
          Oak Park, IL 60118
          USA

          Jonathan Schulze-Hewett
          schulze-hewett@infoseccorp.com
          708-445-1704
          Fax: 708-445-9705

          Michael Markowitz
          markowitz@infoseccorp.com
          708-445-1704
          Fax: 708-445-9705

          ISC OpenSSL FIPS Object Module

          1.0


          ISC OpenSSL module based on the OpenSSL FIPS Object Module version 2.0.

            • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
            • Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
          2/10/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4387
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #2914
          1410NXP Semiconductors
          Stresemannallee 101
          Hamburg, Hamburg 22529
          Germany

          Dr. Almar Kaid
          almar.kaid@nxp.com
          + 49 (40) 5613 5123
          Fax: + 49 (40) 5613 62773

          P73N2M0 Crypto Library

          p73n2m0b0.200 1.0.8


          The NXP Crypto Library on the p73n2m0 HW-platform is a Cryptographic Library to be included in an operating system. It implements various algorithms protected against Side Channel and Fault Attacks at EAL 6+.

            • NXP p73n2m0 w/ n/a
          2/10/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4386
          1409BiObex, LLC
          11501 Sunset Hills Rd
          Suite 200
          Reston, VA 22190
          USA

          Arthur Joyce
          ajoyce@biobex.com
          571-313-0969

          SAFE-Key device

          1.0.0.6 (Firmware)


          The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

            • STM32F415
          2/10/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3611
          1408Secusmart GmbH
          Heinrichstrasse 155
          Düsseldorf, NRW 40239
          Germany

          Thomas Schetelig
          thomas.schetelig@secusmart.com
          +49211447399701

          Markus Hauenstein
          markus.hauenstein@secusmart.com
          +49211447399157

          SecuSUITE Client OpenSSL FIPS Object Module

          2.0.12


          SecuSUITE Client OpenSSL FIPS Object Module

            • Samsung Exynos 8890 w/ Android 6.0.1
            • Apple A8 w/ iOS 9.3.5
            • Qualcomm MSM8960 w/ BlackBerry OS 10.3.3
            • Qualcomm MSM8974 w/ BlackBerry OS 10.3.3
          2/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4382
          1407Secusmart GmbH
          Heinrichstrasse 155
          Düsseldorf, NRW 40239
          Germany

          Thomas Schetelig
          thomas.schetelig@secusmart.com
          +49211447399701

          Markus Hauenstein
          markus.hauenstein@secusmart.com
          +49211447399157

          secuSUITE SIP Server OpenSSL FIPS Object Module

          2.0.12


          secuSUITE SIP Server OpenSSL FIPS Object Module

            • Intel Xeon E5-2620v3 CPU w/ Linux/CentOS v7
          2/3/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4381
          1406
          2/3/2017
            1405Commvault
            1 Commvault way
            Tinton Falls, NJ 07724
            USA

            Scott Britton
            sbritton@commvault.com
            +1 240 506-7294

            Warren Mondschien
            wmondschien@commvault.com
            +1 732-870-4009

            CommVault Crypto Library

            2.0


            CommVault Crypto Library (CVCL) is a cryptographic software module used in various products by CommVault Systems, Inc. The module provides a collection of FIPS Approved and Non-FIPS Approved cryptographic services for key generation, symmetric and asymmetric encryption, hash, HMAC and signature generation/verification

              • Intel Xeon E5504 without AES-NI w/ Red Hat Enterprise Linux 7
              • lntel Xeon E5504 with AES-NI w/ Red Hat Enterprise Linux 7
              • Intel Xeon X3430 without AES-NI w/ Windows Server 2012 R2
              • Intel Xeon X3430 with AES-NI w/ Windows Server 2012 R2
              • Intel Core i7 with AES-NI w/ Solaris 11
              • Intel Core i7 without AES-NI w/ Solaris 11
            1/27/2017
            • Counter:
              • Modes: AES-128, AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4368
            1404Panasonic Corporation
            4-1-62, Minoshima, Hakata-ku
            Fukuoka, Fukuoka 812-8531
            Japan

            Masakatsu Matsuo
            matsuo.masakatsu@jp.panasonic.com
            +81-50-3380-5930

            Panasonic Cryptographic Module

            1.04


            Panasonic Cryptographic Module provides high performance cryptographic processing

              • Intel Core i7 without AES-NI w/ Linux 3.13 32bit
            1/27/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4366
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3603
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2905
            1402Hewlett Packard Enterprise Company
            3000 Hanover Street
            Palo Alto, CA 94304
            USA

            Zhenyi Huang
            zhenyi.huang@hpe.com

            HP NSVLE C API Library

            0.4


            Hewlett Packard's NonStop platform is used in complex computing environments, where business-critical applications need 24 x 7 availability, extreme scalability, and fault-tolerance. NonStop plays an important role in major industries and markets, including finance, healthcare, telecommunications, manufacturing, retail, and government.

              • Intel(R) Xeon(R) E5-2640v3 w/ Debian Linux HPTE Version 7.9.1
            1/27/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4363
            1401Juniper Networks, Inc.
            1194 North Matilda Ave.
            Sunnyvale, CA 94089
            USA

            Mahesh Bommareddy
            mbommareddy@juniper.net
            +1 (408) 936-5493

            Junos FIPS Version 12.3 X48 - SPU_OpenSSL

            Broadcom XLP 12.3X48 (Firmware)


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • Broadcom XLP
            1/27/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #2647
            1400Juniper Networks, Inc.
            1194 North Matilda Ave.
            Sunnyvale, CA 94089
            USA

            Mahesh Bommareddy
            mbommareddy@juniper.net
            +1 (408) 936-5493

            Junos FIPS Version Junos 15.1 X49 - SPU_DRBG

            15.1 X49-D60 (Firmware)


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • Broadcom XLP
            1/27/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #2890
            1399Juniper Networks, Inc.
            1194 North Matilda Ave.
            Sunnyvale, CA 94089
            USA

            Mahesh Bommareddy
            mbommareddy@juniper.net
            +1 (408) 936-5493

            Junos FIPS Version 12.3 X48 - SPU_OpenSSL_XLR

            Broadcom XLR 12.3X48 (Firmware)


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • Broadcom XLR
            1/27/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #2646
            1398Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Pradeepa M R
            pradeepam@juniper.net

            Junos FIPS Version Junos 15.1 X49 - OpenSSL

            15.1X49-D60


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • CN7020
              • CN7130
              • CN6335
            1/27/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #2902
            1397Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using SHA assembler

            1.0


            The test covers assembler of SHA for OpenSSL.

              • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
            1/27/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3599
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2901
            1396Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using SSSE3 for SHA

            1.0


            The test covers the SHA using SSSE3 for OpenSSL.

              • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
            1/27/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256
              • Prerequisite: SHS #3598
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256
              • Prerequisite: HMAC #2900
            1395Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using AVX2 for SHA

            1.0


            The test covers SHA using AVX2 for OpenSSL

              • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
            1/27/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3597
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2899
            1394Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            Ubuntu OpenSSL using AES assembler

            1.0


            The test covers the assembler implementation of AES for OpenSSL.

              • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
            1/27/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4360
            1393Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using AES, SHA, GHASH and multiplication from CPACF

            1.0


            The test covers the AES, SHA, GHASH and multiplication from CPACF for OpenSSL.

              • z13 w/ Ubuntu 16.04
            1/27/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4358
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3596
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2898
            1392Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using AES, SHA, GHASH and multiplication assemblers

            1.0


            The test covers the assembler implementation of AES, SHA, GHASH and multiplication.

              • z13 w/ Ubuntu 16.04
            1/27/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4357
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3595
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2897
            1391Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using support from Power ISA 2.07 for AES and SHA

            1.0


            The test covers the using support from Power ISA 2.07 for AES and SHA for OpenSSL.

              • Power8 w/ Ubuntu 16.04
            1/27/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3594
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2896
            1390Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using assembler for AES and SHA

            1.0


            The test covers the assembler implementation of AES and SHA

              • Power8 w/ Ubuntu 16.04
            1/27/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4354
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3593
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2895
            1389Getac Technology Corporation
            5F., Building A, No. 209, Sec. 1, Nangang Rd., Nangang Dist.
            Taipei City 11568
            Taiwan

            Yu-Shian Chen
            yushian.chen@getac.com.tw
            +886-2-27857888 Ext. 5675
            Fax: +886-2-27865656

            Jeff Lin
            jeff.cflin@getac.com
            +886-2-27857888 Ext. 5346
            Fax: +886-2-27865656

            Getac OpenSSL Cryptographic Library

            1.0.1k


            Getac OpenSSL Cryptographic Library provides a variety of cryptographic services via OpenSSL FIPS module for Getac products.

              • Intel Atom w/ Android 5.1.1
            1/27/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4352
            1388Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Pradeepa M R
            pradeepam@juniper.net

            Junos FIPS Version Junos 15.1 X49 - SRX 5k - OpenSSL

            15.1 X49-D60 (Firmware)


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • Intel Xeon C5518
            1/19/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #2889
            1387Ultra Electronics AEP
            419 Bridport Road
            Greenford, Middlesex UB6 8UA
            United Kingdom

            Paul Kettlewell
            paul.kettlewell@ultra-aep.com
            +44 (0) 1628 642624

            Vicky Hayes
            vicky.hayes@ultra-aep.com
            +44 (0) 1628 642623

            Advanced Configurable Crypto Environment v3

            011395 v3 r3 (Firmware)


            The AEP Networks Advanced Configurable Crypto Environment v3 (ACCEv3) provides highly secure cryptographic services and key storage. It is the foundation of a range of products including the Keyper Plus.

              • P2020 QorIQ
            1/19/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256, SHA-512
              • Prerequisite: SHS #3581
            1386Cisco Systems, Inc.
            170 West Tasman Dr.
            San Jose, CA 95134
            USA

            Global Certification Team
            certteam@cisco.com

            Adaptive Security Appliance (ASA) OS

            9.6


            The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

              • Intel Xeon E5 w/ ESXi 5.5
              • Intel Xeon Eseries w/ ESXi 5.5
            1/19/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-512
              • Prerequisite: SHS #3579
            1385HGST, a Western Digital brand
            951 SanDisk Drive
            Milpitas, CA 95035
            USA

            Rajesh Kukreja
            Rajesh.Kukreja@sandisk.com
            408-801-3368

            Michael McDonnell
            Michael.McDonnell@SanDisk.com
            408-801-3075

            SanDisk Crypto Library

            SVN Revision 29946 (Firmware)


            Cryptographic library support for HGST Self-Encrypting Drives (SEDs).

              • Marvell ARM Cortex R5
            1/13/2017
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #2881
            1384Pulse Secure LLC
            2700 Zanker Road Suite 200
            San Jose, CA 95134
            USA

            Vikki Yin Wei
            vwei@pulsesecure.net
            +1-844-807-8573
            Fax: +1-408-503-7452

            Yvonne Sang
            ysang@pulsesecure.net
            +1-844-807-8573
            Fax: +1-408-503-7452

            Pulse Secure Cryptographic Module DRBG

            2.0


            The Pulse Secure Cryptographic Module provides secure cryptographic services. It enables dynamic SSL VPN, NAC, mobile security, online meetings and collaboration, and application acceleration while removing the complexities of device type and security state, location, identity, and adherence to policies.

              • MAG2600 Intel Atom, N270, 1.6GHz w/ IVE OS 2.0 (32-bit)
              • PSA7000f, PSA7000c Intel Xeon E3-1275v3(x86) w/ Pulse One version 2.0 (64-bit)
              • Dell Power Edge R430/R530, Intel Xeon E5-2620 v4 2.1GHz w/ IVE OS 2.0 (64-bit) on VMware ESXI 6.0
              • MAG4610, SM160 Intel Core 2 Duo E2160 1.8Ghz w/ IVE OS 2.0 (64-bit)
              • MAG6610, SM360 Intel Core-2 Quad Q9400 2.66GHz w/ IVE OS 2.0 (64-bit)
              • PSA7000f, PSA7000c Intel Xeon E3-1275v3(x86) w/ IVE OS 2.0 (64-bit)
              • PSA5000 Intel PENTIUM G3420 2C/2T 3.2G w/ IVE OS 2.0 (64-bit)
              • PSA300, PSA3000 Intel Celeron Processor J1900 2.42 GHz w/ IVE OS 2.0 (64-bit)
            1/13/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4334
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3577
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2880
            1383ALE (Alcatel Lucent Enterprise)
            26801 Agoura Road
            Calabasas, CA 91301
            USA

            Tao Shen
            tao.shen@al-enterprise.com
            818-878-5038

            Vadivel POONATHAN
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6350)

            AOS 6.7.1.R04


            This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

              • Integrated ARMv7 core w/ AOS 6.7.1.R04
            1/13/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4339
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3575
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2879
            1382Panasonic Corporation
            4-1-62, Minoshima, Hakata-ku
            Fukuoka, Fukuoka 812-8531
            Japan

            Masakatsu Matsuo
            matsuo.masakatsu@jp.panasonic.com
            +81-50-3380-5930

            Panasonic Cryptographic Library

            1.03


            Panasonic Cryptographic Module provides high performance cryptographic processing

              • Intel Core i7 without AES-NI w/ Linux 3.13 32bit
            1/13/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4332
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3573
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2869
            1381LG Electronics, Inc.
            20 Yoido-dong
            Youngdungpo-gu
            Seoul 152-721
            Republic of Korea

            Jongseong Kim
            jongseong.kim@lge.com
            82-10-4535-0110
            Fax: 82-2-6950-2080

            LG BoringSSL

            1.0


            General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

              • Snapdragon 821 (8996 Pro) w/ Android 7.0
            1/13/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4331
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3572
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2868
            1380Renesas Electronics Corporation
            5-20-1 Jousuihon-cho
            Kodaira-shi, Tokyo 187-8588
            Japan

            Hideyuki Tanaka
            hideyuki.tanaka.jc@renesas.com
            +81-42-312-6926
            Fax: +81-42-328-4374

            TSIP-Lite

            RX Family RX231 1.03 (Firmware)


            The TSIP-Lite is hardware which consists of firmware, cryptographic accelerator, random number generator and access management circuit along with chip-unique-ID.

              • n/a
            1/13/2017
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4330
            1379HUAWEI TECHNOLOGIES Co., Ltd.
            Yuhuatai District
            101 Software Avenue
            NANJING, JIANGSU 210000
            CHINA

            Yang Ze
            yangze1@huawei.com
            8615919432118

            yinhuilin
            jane.yinhuilin@huawei.com
            8618952017596

            HFCL

            V300R003C22SPC805 (Firmware)


            Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to Huawei products via an Application Programming Interface (API).

              • Cavium CN6120
              • Cavium CN6130
              • Cavium CN5650
              • Cavium CN6880
              • Freescale p1025
            1/6/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3565
            1378Magneti Marelli S.p.A.
            Viale Aldo borletti, 61/63
            Corbetta, MI 20011
            Italy

            Christian Rosadini
            christian.rosadini@magnetimarelli.com
            +39 051 615 7945

            Cosimo Senni
            cosimo.senni@magnetimarelli.com
            +39 051 615 7945

            MM-AR-CAL

            1.0.0 (Firmware)


            Implementation of Crypto-Library according to Autosar-CAL interface

              • ARM Cortex-M3
              • AURIX TC275 TriCore CPU
            1/6/2017
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4322
            1377SEGGER Microcontroller GmbH & Co. KG
            In den Weiden 11
            Hilden, NRW 40721
            Germany

            Rainer Herbertz
            rainer.herbertz@segger.com
            +49-2103-2878-0
            Fax: +49-2103-2878-28

            emCrypt

            2.0 (Firmware)


            emCrypt is a high speed cryptographic library specifically designed for embedded systems. It is highly portable, operating system independent and provides a comprehensive set of cryptographic algorithms available through a simple C-language API for use in any application.

              • ARM Cortex-M
            1/6/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3563
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2860
            1376Dell, Inc
            5450 Great America Parkway
            Santa Clara, CA 95054
            US

            Srihari Mandava
            srihari_mandava@dell.com

            Dell OpenSSL Cryptographic Library

            2.4


            Dell OpenSSL Cryptographic Library v2.4 provides a variety of cryptographic services used by Dell''s Data Center hardened Dell Networking OS management and routing features.

              • Broadcom XLP w/ Dell Networking Operating System 9.11(0.0)
              • ARM Cortex A9 w/ Dell Networking Operating System 9.11(0.0)
              • FreeScale PowerPC e500 w/ Dell Networking Operating System 9.11(0.0)
              • Intel Atom S1000 w/ Dell Networking Operating System 9.11(0.0)
              • Intel Atom C2000 w/ Dell Networking Operating System 9.11(0.0)
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4320
            1375Infineon Technologies AG
            Alter Postweg 101
            Augsburg, BY 86159
            Germany

            Roland Ebrecht
            Roland.Ebrecht@infineon.com
            +49-821-25851-68
            Fax: +49-821-25851-40

            Thomas Hoffmann
            Thomas.Hoffmann@infineon.com
            +49-821-25851-24
            Fax: +49-821-25851-40

            Trusted Platform Module 2.0 SLB 9670

            SLB 9670 7.80 (Firmware)


            Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

              • Infineon SLB 9670 security controller IC
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4319
            1374Infineon Technologies AG
            Alter Postweg 101
            Augsburg, BY 86159
            Germany

            Roland Ebrecht
            Roland.Ebrecht@infineon.com
            +49-821-25851-68
            Fax: +49-821-25851-40

            Thomas Hoffmann
            Thomas.Hoffmann@infineon.com
            +49-821-25851-24
            Fax: +49-821-25851-40

            Trusted Platform Module 2.0 SLB 9660, SLB 9665

            SLB 9660/9665 5.80 (Firmware)


            Infineon Trusted Platform Module 2.0 SLB 9660/ SLB 9665 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

              • Infineon SLB 9660 or SLB 9665 security controller IC
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4318
            1373Aclara
            Avda. Pinoa 10
            Zamudio, Bizkaia 48170
            Spain

            Oscar Lopez
            olopez@aclara.com

            SGM1400

            4.0.26 (Firmware)


            Crypto algorithms as required per GBCS 0.9 spec.

              • n/a
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4316
            1372Fatpipe, Inc.
            4455 S 700 E STE 100
            Salt Lake City, UT 84107
            USA

            Matt Gwyther
            mattg@fatpipeinc.com
            801-281-3434
            Fax: 801-281-0317

            MPVPN

            9-1-2-fips


            Fatpipe MPVPN®, a patented router clustering device, is an essential part of Disaster Recovery and Business Continuity Planning for Virtual Private Network (VPN) connectivity. It is integrated with several User Space cryptographic algorithms and other security mechanisms.

              • Intel(R) Xeon(R) CPU E3-1220 v5 @ 3.00GHz w/o AES-NI w/ LFS (Linux from scratch) 1.1.0 x86 64 Pure64
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4314
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3549
            1371Intel Corporation
            2200 Mission College Blvd.
            Santa Clara, California 95054
            USA

            Mark Hanson
            mark.hanson@intel.com
            972.963.7326

            McAfee OpenSSL FIPS Object Module

            1.0.0


            The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

              • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
            12/23/2016
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4313
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3548
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2845
            1370Certicom Corp.
            4701 Tahoe Blvd, Building A, 5th Floor
            Missisauga, ON L4W 0B5
            Canada

            Certicom Sales
            sales@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Certicom Support
            support@certicom.com
            1-905-507-4220
            Fax: 1-905-508-4230

            Security Builder FIPS Core

            5.6.2


            Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based applications for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec, SSL and DRM modules.

              • Qualcomm Snapdragon 801 w/ BlackBerry 10
              • Qualcomm Snapdragon S4 w/ BlackBerry 10
              • Qualcomm Snapdragon S4 Pro w/ BlackBerry 10
            12/23/2016
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4311
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3547
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2844
            1369Renesas Electronics Corporation
            5-20-1 Jousuihon-cho
            Kodaira-shi, Tokyo 187-8588
            Japan

            Kazuhiko Fukushima
            kazuhiko.fukushima.xt@renesas.com
            +81-42-312-6470
            Fax: +81-42-328-4374

            Trusted System for R-Car_W2H

            1.0 (Firmware)


            "Trusted System for R-Car_W2H" provides cryptographic functions. This firmware works by using the HW security module "U11IP15001E0" implemented on "R-Car W2H".

              • R-Car W2H
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4308
            1368Cisco Systems, Inc.
            170 West Tasman Dr.
            San Jose, CA 95134
            USA

            Global Certification Team
            certteam@cisco.com

            FX-OS

            2.0 (Firmware)


            Cisco Firepower eXtensible Operating System (FX-OS) version 2.0, a next-generation network and content security solutions.

              • Intel Xeon E3-11XX
            12/23/2016
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4307
            1367Distech Controls, Inc.
            4205 Place de Java
            Brossard, QC J4Y 0C4
            Canada

            Dominic Gagnon
            dgagnon@distech-controls.com
            450-444-9898 Ext.231
            Fax: 450-444-0770

            François Gervais
            fgervais@distech-controls.com
            450-444-9898 Ext.263
            Fax: 450-444-0770

            Distech Java Cryptographic Library

            1.0 (Firmware)


            The Distech Java Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers.

              • AM335x Cortex-A8 (ARMv7) /w NEON
            12/23/2016
            • Counter:
              • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4306, TDES #2327
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3545
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2842
            1366Hewlett Packard Enterprise
            8000 Foothills Blvd
            Roseville, CA 95747
            USA

            Susan Scotten
            susan.scotten@hpe.com
            916-785-8742

            Aruba 2920 switch

            WB.16.02.0015 (Firmware)


            Aruba 2920 switch

              • TriCore ARM11 processor
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4305
            1365Hewlett Packard Enterprise
            8000 Foothills Blvd
            Roseville, CA 95747
            USA

            Susan Scotten
            susan.scotten@hpe.com
            916-785-8742

            Aruba 5400r switch

            KB.16.02.0015 (Firmware)


            Aruba 5400r switch

              • P2020
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4304
            1364Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library

            3.0.0 (Firmware)


            The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • ARM Cortex A9
            12/23/2016
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3542
            1363Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA
            312 Kings Way
            South Melbourne, Victoria 3205
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN8000 Series Common Crypto Library

            3.0.0 (Firmware)


            The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • Intel Xeon
            12/23/2016
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3541
            1362Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN6000 Series Common Crypto Library

            3.0.0 (Firmware)


            The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • Intel ATOM
            12/23/2016
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3540
            1361ST Microelectronics (Protonworld)
            Green Square Building B, Lambroekstraat 5
            Diegem/Machelen B-1831
            Belgium

            Olivier COLLART
            olivier.collart@st.com
            +32 272 450 77
            Fax: +32 272 451 43

            Fabien ARRIVE
            fabien.arrive@st.com
            +33 223 470 633
            Fax: +33 223 470 400

            NesLib 5.1.0 for ST33

            5.1.0 (Firmware)


            ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) versions 1.2 and 2.0 specifications.

              • SecureCore SC300
            12/23/2016
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3539
            1360Certicom Corp.
            4701 Tahoe Blvd, Building A
            5th Floor
            Mississauga, Ontario L4W 0B5
            Canada

            Certicom Support
            support@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Certicom Sales
            sales@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Security Builder GSE-J Crypto Core

            2.9.0


            Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

              • NXP ARM Cortex-A9 w/ Android OS API Level 17
            12/23/2016
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4300
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3538
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-512
              • Prerequisite: HMAC #2836
            1359Certicom Corp.
            4701 Tahoe Blvd, Building A
            5th Floor
            Mississauga, Ontario L4W 0B5
            Canada

            Certicom Support
            support@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Certicom Sales
            sales@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Security Builder GSE-J Crypto Core

            2.9.0


            Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

              • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
            12/23/2016
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4299
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3537
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-512
              • Prerequisite: HMAC #2835
            1358Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A10 w/ iOS 10
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4298
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2834
            1357Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A9X w/ iOS 10
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4297
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2833
            1356Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A9 w/ iOS 10
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4296
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2832
            1355Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A8X w/ iOS 10
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4295
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2831
            1354Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A8 w/ iOS 10
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4294
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2830
            1353Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A7 w/ iOS 10
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4293
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2829
            1352Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple OSX CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Intel Xeon w/ MacOS Sierra
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4292
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2828
            1351Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple OSX CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Intel i7 w/ MacOS Sierra
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4291
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2827
            1350Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple OSX CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Intel i5 w/ MacOS Sierra
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4290
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2826
            1349Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple OSX CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Intel CoreM w/ MacOS Sierra
            12/23/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4289
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2825
            1348ALE (Alcatel Lucent Enterprise)
            26801 Agoura Road
            Calabasas, CA 91301
            USA

            Tao Shen
            tao.shen@al-enterprise.com
            818-878-5038

            Vadivel POONATHAN
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS9900)

            AOS 8.3.1.R01


            This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

              • Intel Atom C2518 w/ AOS 8.3.1.R01
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4288
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3526
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2824
            1347ALE (Alcatel Lucent Enterprise)
            26801 Agoura Road
            Calabasas, CA 91301
            USA

            Tao Shen
            tao.shen@al-enterprise.com
            818-878-5038

            Vadivel POONATHAN
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Common Criteria Evaluation (CCE) Certification for ALE AoS

            AOS 8.3.1.R01


            This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

              • PowerPC P2040 w/ AOS 8.3.1.R01
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4287
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3525
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2823
            1346ALE (Alcatel Lucent Enterprise)
            26801 Agoura Road
            Calabasas, CA 91301
            USA

            Tao Shen
            tao.shen@al-enterprise.com
            818-878-5038

            Vadivel POONATHAN
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch

            AOS 8.3.1.R01


            This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

              • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4286
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3524
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2822
            1345ALE (Alcatel Lucent Enterprise)
            26801 Agoura Road
            Calabasas, CA 91301
            USA

            Tao Shen
            tao.shen@al-enterprise.com
            818-878-5038

            Vadivel POONATHAN
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6860)

            AOS 8.3.1.R01


            This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

              • Cortex ARM 9 w/ AOS 8.3.1.R01
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4285
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3523
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2821
            1344ALE (Alcatel Lucent Enterprise)
            26801 Agoura Road
            Calabasas, CA 91301
            USA

            Tao Shen
            tao.shen@al-enterprise.com
            818-878-5038

            Vadivel POONATHAN
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6450)

            AOS 6.7.1.R04


            This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

              • Integrated ARMv5 core w/ AOS 6.7.1.R04
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4284
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3522
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2820
            1343ALE (Alcatel Lucent Enterprise)
            26801 Agoura Road
            Calabasas, CA 91301
            USA

            Tao Shen
            tao.shen@al-enterprise.com
            818-878-5038

            Vadivel POONATHAN
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6250)

            AOS 6.7.1.R04


            This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

              • Integrated ARMv5 core w/ AOS 6.7.1.R04
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4283
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3521
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2819
            1342ALE (Alcatel Lucent Enterprise)
            26801 Agoura Road
            Calabasas, CA 91301
            USA

            Tao Shen
            tao.shen@al-enterprise.com
            818-878-5038

            Vadivel POONATHAN
            vadivel.poonathan@al-enterprise.com
            818-878-4601

            Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS10K)

            AOS 8.3.1.R01


            This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

              • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4282
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3520
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2818
            1341HGST, a Western Digital company
            3403 Yerba Buena Road
            San Jose, CA 95119
            USA

            Michael Williamson
            michael.williamson@wdc.com
            408-717-8458
            Fax: 408-717-9494

            Jithendra Bethur
            jithendra.bethur@wdc.com
            408-717-5951
            Fax: 408-717-9494

            TcgCryptoLib

            SOCFWLIB-0019 (Firmware)


            Cryptographic library support for encryption and decryption features on HGST''s Self-Encrypting Drives (SEDs).

              • ARM Cortex R5
            12/23/2016
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4281
            1340Arista Networks Inc.
            5453 Great America Pkwy
            Santa Clara, CA 95054
            USA

            Richard Whitney
            rw@arista.com
            703-627-6092
            Fax: 408-538-8920

            Arista EOS Crypto Module

            v1.0


            The Arista EOS Crypto Module library implements a variety of FIPS approved algorithms to ensure that data can be transported, encrypted, and hashed in a secure manner.

              • AMD Athlon NEO X2 w/ EOS v4
              • Intel Sandy Bridge EN w/ EOS v4
              • Intel Broadwell-DE w/ EOS v4
              • AMD G Series: eKabini w/ EOS v4
              • AMD G Series: Steppe Eagle w/ EOS v4
            12/23/2016
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4280
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3516
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2816
            1339Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A732 w/ iOS 10
            12/16/2016
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4269
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2813
            1338
            12/16/2016
              1337Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              FMC FOM

              6.0 (Firmware)


              A fault-tolerant, purpose-built network appliance that provides a centralized management console and database repository for your Firepower System deployment. FMC has a range of device management, event storage, host monitoring and user monitoring capabilities.

                • Intel Xeon E3 series
                • Intel Xeon E5 2600 series
                • Intel Xeon E5600 series
                • Intel Atom C25XX
                • Intel Pentium/Core i3
                • Intel Xeon 5xxx
                • Intel Xeon 34xx
                • Intel Atom D2xxx
                • Intel Pentium B9xx
              12/16/2016
              • Counter:
                • Modes: AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4266
              1336Mocana Corporation
              20 California Street
              San Francisco, CA 94111
              USA

              Srinivas Kumar
              fips@mocana.com
              1-415-617-0055
              Fax: 1-415-617-0056

              Mocana Cryptographic Library

              6.4.1f


              The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com

                • Intel Atom E3800 w/ Wind River Linux 6.0
              12/16/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Prerequisite: AES #4265
              1335Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Kernel Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and assembler optimized AES.

                • Intel Xeon w/ MacOS Sierra
              12/16/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4264
              1334Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Kernel Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and assembler optimized AES.

                • Intel i7 w/ MacOS Sierra
              12/16/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4263
              1333Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Kernel Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and assembler optimized AES.

                • Intel i5 w/ MacOS Sierra
              12/16/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4262
              1332Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Kernel Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and assembler optimized AES.

                • Intel CoreM w/ MacOS Sierra
              12/16/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4261
              1331Barco n.v.
              Beneluxpark 21
              Kortrijk 8500
              Belgium

              Jean-Paul Schafer
              jeanpaul.schafer@barco.com
              +32 4 267 69 22
              Fax: +32 4 267 69 99

              SM

              BG140778 1.01 (Firmware)


              Embedded software implementation using the OpenSSL library.

                • Freescale QorIQ P2040 Power-PC
              12/16/2016
              • Hash based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-256
                • Prerequisite: SHS #3491
              1330VMware, Inc.
              3401 Hillview Ave
              Palo Alto, CA 94303
              USA

              Eric Betts
              betts@vmware.com
              408-891-0590

              Michael McKay
              mmckay@vmware.com
              408-891-0590

              VMware Java JCE (Java Cryptographic Extension) Module

              BC FIPS 1.0.0


              The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

                • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
                • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
                • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
              12/16/2016
              • Counter:
                • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Prerequisite: AES #4252, TDES #2305
              • Hash based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • Prerequisite: SHS #3490
              • HMAC based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • Prerequisite: HMAC #2788
              1329Bluechip Systems LLC
              2350 Mission College Blvd, Suite 290
              Santa Clara, CA 95054
              USA

              Uri Kreisman
              uri.kreisman@bluechipsys.com
              650-257-8000
              Fax: 650-241-1895

              OpenSSL-FIPS

              d40d43f6e6f28cdaf549e0fbc0f3d4a45b003e10 (Firmware)


              The SAIFE library''s system security services are built on functions provided by the proven OpenSSL FIPS Object.

                • Bluechip Systems X4 SoC
              12/16/2016
              • Counter:
                • Modes: AES-256
                • Derivation Function States: Derivation Function not used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4251
              1328Cisco Systems, Inc.
              170 West Tasman Dr.
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              Adaptive Security Appliance (ASA) OS

              9.6 (Firmware)


              The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

                • Intel Aton C25xx
                • Intel Pentium/Core i3
                • Intel Xeon 34xx
                • Intel Xeon 5xxx
                • Intel Xeon E5-26xx
              12/16/2016
              • Hash based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-512
                • Prerequisite: SHS #3486
              1327DELL, Inc.
              One Dell Way
              Round Rock, Texas 78682
              USA

              Kylie Gallagher
              kylie_gallagher@dell.com
              +1 512 723 7550

              Gang Liu
              gang_liu@dell.com
              +1 512 728 5545

              Dell Crypto Library for Dell iDRAC and Dell CMC

              2.4


              The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

                • PowerPC 440EPX w/ Linux 3.2.18
                • Renesas SH7758 w/ Linux 3.4.11
              12/9/2016
              • Counter:
                • Modes: AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Prerequisite: AES #4248
              1326Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • MPC8548
              12/9/2016
              • Counter:
                • Modes: AES-256
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4247
              1325Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • PPC440EPX
              12/9/2016
              • Counter:
                • Modes: AES-256
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4246
              1323Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • T1022
              12/9/2016
              • Counter:
                • Modes: AES-256
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4244
              1322Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • P4080
              12/9/2016
              • Counter:
                • Modes: AES-256
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4243
              1321Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • P3041
              12/9/2016
              • Counter:
                • Modes: AES-256
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4242
              1320Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Clint Winebrenner
              cwinebre@cisco.com
              1 919 392 6520

              CiscoSSL FIPS Object Module

              11.7


              tbd

                • Snapdragon 820 w/ Android version 6
              12/9/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4240
              • Hash based:
                • Prediction Resistance Modes: Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3478
              • HMAC based:
                • Prediction Resistance Modes: Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2779
              1319Green Hills Software
              7585 Irvine Center Drive
              Suite 250
              Irvine, CA 92618
              USA

              David Sequino
              206-310-6795
              Fax: 978-383-0560

              Douglas Kovach
              727-781-4909
              Fax: 727-781-2915

              INTEGRITY Security Services High Assurance Embed

              1.0 (Firmware)


              ISS HA ECT is a standards-based cryptographic toolkit providing a flexible framework to integrate encryption, digital signatures and other security mechanisms into a wide range of applications. It is designed to support multiple cryptographic providers with a single common API, easily targeted to a variety of Operating Systems.

                • ARM Cortex-M3
              12/9/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4239
              1318Distech Controls, Inc.
              4205 Place de Java
              Brossard, QC J4Y 0C4
              Canada

              Dominic Gagnon
              dgagnon@distech-controls.com
              450-444-9898 Ext.231
              Fax: 450-444-0770

              François Gervais
              fgervais@distech-controls.com
              450-444-9898 Ext.263
              Fax: 450-444-0770

              Distech SSL Cryptographic Library

              1.0 (Firmware)


              The Distech SSL Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers.

                • AM335x Cortex-A8 (ARMv7) /w NEON
                • AM335x Cortex-A8 (ARMv7) /without NEON
              12/9/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4238
              • Hash based:
                • Prediction Resistance Modes: Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3476
              • HMAC based:
                • Prediction Resistance Modes: Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2777
              1317Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              CiscoSSL FIPS Object Module (Assembler)

              6.2


              The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''''s networking and collaboration products.

                • Cavium Octeon MIPS64 w/ Linux 2.6
                • Cavium Octeon MIPS64 w/ Linux 3.10
              12/9/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4234
              • Hash based:
                • Prediction Resistance Modes: Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3471
              • HMAC based:
                • Prediction Resistance Modes: Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2772
              1316Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              CiscoSSL FIPS Object Module

              6.2


              The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''''s networking and collaboration products.

                • ARMv8 w/ Android 3.10
                • ARMv8 w / Apple iOS 9
                • Intel Xeon w/ FreeBSD 10.3
                • Intel Core i5 without AES-Ni w/ Windows 10
                • Intel Core i5 with AES-Ni w/ Windows 10
                • Cavium Octeon MIPS64 w/ Linux 2.6
                • Intel Core i5 without AES-Ni w/ Linux 3.10
                • Intel Core i5 with AES-Ni w/ Linux 3.10
              12/9/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4233
              • Hash based:
                • Prediction Resistance Modes: Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3470
              • HMAC based:
                • Prediction Resistance Modes: Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2771
              1315Ciena Corporation
              7035 Ridge Road
              Hanover, MD 21076
              USA

              Patrick Scully
              pscully@ciena.com
              613-670-3207

              Ciena 6500 Flex3 WaveLogic 3e OCLD Cryptography Engine

              2.01 (Firmware)


              The Ciena 6500 Packet-Optical Platform Flex3 WaveLogic 3e OCLD Encryption Module offers an integrated transport encryption solution providing protocol-agnostic 100Gb/s or 200Gb/s wirespeed encryption service for enterprises, datacenters, government and also offered through service providers as differentiated managed service.

                • Xilinx XC7Z020
              12/9/2016
              • Counter:
                • Modes: AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4232
              1314Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Intel Xeon 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4230
              1313Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Intel Xeon w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4229
              1312Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Intel i7 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4228
              1311Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Intel i5 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4227
              1310Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Intel i7 w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4226
              1309Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Intel i5 w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4225
              1308Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Intel CoreM 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4224
              1307Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Intel CoreM w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4223
              1306Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Xeon 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4222
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2769
              1305Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Xeon w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4221
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2768
              1304Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i7 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4220
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2767
              1303Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i5 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4219
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2766
              1302Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i7 w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4218
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2765
              1301Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i5 w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4217
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2764
              1300Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Core M 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4216
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2763
              1299Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Core M w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4215
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2762
              1298Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instruction set with an accelerated implementation for CBC and XTS.

                • Intel Xeon 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4214
              1297Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instruction set with an accelerated implementation for CBC and XTS.

                • Intel Xeon w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4213
              1296Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instruction set with an accelerated implementation for CBC and XTS.

                • Intel i7 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4212
              1295Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instruction set with an accelerated implementation for CBC and XTS.

                • Intel i5 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4211
              1294Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instruction set with an accelerated implementation for CBC and XTS.

                • Intel i7 w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4210
              1293Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instruction set with an accelerated implementation for CBC and XTS.

                • Intel i5 w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4209
              1292Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instruction set with an accelerated implementation for CBC and XTS.

                • Intel CoreM 32 bit w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4208
              1291Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instruction set with an accelerated implementation for CBC and XTS.

                • Intel CoreM w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4207
              1290Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Kernel Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set with an accellerated implementation for CBC and XTS.

                • Intel Xeon w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4206
              1289Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Kernel Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set with an accellerated implementation for CBC and XTS.

                • Intel i5 w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4205
              1288Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Kernel Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set with an accellerated implementation for CBC and XTS.

                • Intel i7 w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4204
              1287Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Kernel Module (AES-NI with optimized modes)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set with an accellerated implementation for CBC and XTS.

                • Intel CoreM w/ MacOS Sierra
              12/9/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4202
              1286Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10 32bit w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4190
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2745
              1285Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A832 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4189
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2732
              1284Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A932 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4188
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2731
              1283Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4187
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2730
              1282Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9X32 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4186
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2729
              1281Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4185
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2728
              1280Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9X w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4184
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2727
              1279Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8X32 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4183
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2726
              1278Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8X w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4182
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2725
              1277Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4181
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2724
              1276Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A7 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4180
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2723
              1275Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A10 32 bit w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4170
              1274Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A9 32 bit w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4169
              1273Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A10 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4166
              1272Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A8 32 bit w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4164
              1271Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A7 32bit w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4163
              1270Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A9X 32 bit w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4162
              1269Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A9X w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4161
              1268Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A9 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4160
              1267Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A8X 32 bit w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4159
              1266Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A8X w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4158
              1265Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A8 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4157
              1264Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Assembler AES)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler optimized AES.

                • Apple A7 w/ iOS 10
              12/2/2016
              • Counter:
                • Modes: AES-128
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Not Enabled
                • Prerequisite: AES #4156
              1263Hangzhou Synochip Data Security Technology Co., Ltd.
              East Tower, Building 9, No. 998 West Wenyi Road
              Hangzhou, Zhejiang 311121
              China

              Bill Wu
              wubin@synochip.com.cn
              +86 571 88271908-804
              Fax: +86 571 88271901

              Windy Ye
              postmaster@synochip.com.cn
              +86 571 88271908-800
              Fax: +86 571 88271901

              FingerprintSE 32-bit RISC Core Platform

              V1.0 V1.0 (Firmware)


              FingerprintSE is an integrated platform including processor (AS578/AS608), cryptographic & fingerprint processing firmware. The processor is based on a 32-bit RISC core CPU, designed with SoC architecture and a dedicated fingerprint algorithm accelerator is integrated.

                • AS578/AS608
              12/2/2016
              • Hash based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-256
                • Prerequisite: SHS #3420
              1262Hypori, Inc.
              9211 Waterford Centre Blvd
              Suite 100
              Austin, TX 78758
              USA

              Evan Watkins
              evan.watkins@hypori.com
              512-646-1040

              Hypori FIPS Object Module for OpenSSL

              2.0.10


              Re-brand of OpenSSL Version 2.0.10 running in Hypori Virtual Device

                • Intel Xeon w/ Android 4 (ARMv7 w/ Houdini) on ESXi 6
                • Intel Xeon w/ Android 4 (x86_64) on ESXi 6
              12/2/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Prerequisite: AES #4154
              • Hash based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3419
              • HMAC based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2722
              1261VMware, Inc.
              3401 Hillview Ave
              Palo Alto, CA 94303
              USA

              Eric Betts
              betts@vmware.com
              408-891-0590

              Michael McKay
              mmckay@vmware.com
              408-891-0590

              VMware Java JCE (Java Cryptographic Extension) Module

              BC FIPS 1.0.0


              The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

                • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
                • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
                • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on Vmware vSphere Hypervisor (ESXi) 6.0
              12/2/2016
              • Counter:
                • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Prerequisite: AES #4153, TDES #2269
              • Hash based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • Prerequisite: SHS #3417
              • HMAC based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
                • Prerequisite: HMAC #2721
              1260Security First Corp.
              29811 Santa Margarita Parkway
              Suite 600
              Rancho Santa Margarita, CA 92688
              USA

              Rick Orsini
              rorsini@securityfirstcorp.com
              949-858-7525
              Fax: 949-858-7092

              Secure Parser Library

              4.7.1.0


              The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library.

                • Intel Core I7-3770 with AES-NI w/ Microsoft Windows Server 2008 R2 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Microsoft Windows Server 2008 R2 64-bit
                • Intel Core I7-3770 with AES-NI w/ Microsoft Windows Server 2012 R2 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Microsoft Windows Server 2012 R2 64-bit
                • Intel Core I7-3770 with AES-NI w/ Red Hat Enterprise Linux 6 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Red Hat Enterprise Linux 6 64-bit
                • Intel Core I7-3770 with AES-NI w/ Red Hat Enterprise Linux 7 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Red Hat Enterprise Linux 7 64-bit
                • Intel Core I5-6300U with AES-NI w/ Microsoft Windows 10 64-bit
                • Intel Core I5-6300U with AES-NI disabled w/ Microsoft Windows 10 64-bit
                • Intel Core I7-3770 with AES-NI w/ Microsoft Windows 7 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Microsoft Windows 7 64-bit
                • Intel Core I7-3770 with AES-NI w/ Microsoft Windows 8 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Microsoft Windows 8 64-bit
                • QUALCOMM Snapdragon 801 w/ Android 5.0
              11/18/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function used
                • Prediction Resistance Modes: Enabled
                • Prerequisite: AES #4148
              1259Fatpipe, Inc.
              4455 S 700 E STE 100
              Salt Lake City, UT 84107
              USA

              Matt Gwyther
              mattg@fatpipeinc.com
              (801)281-3434
              Fax: (801)281-0317

              MPVPN

              9-1-2-fips


              FatPipe MPVPN®, a patented router clustering device, is an essential part of Disaster Recovery and Business Continuity Planning for Virtual Private Network (VPN) connectivity. It is integrated with several User Space cryptographic algorithms and other security mechanisms.

                • Intel Xeon Quad Core E3-1270v2 @ 3.50GHz w/o AES-NI w/ LFS (Linux from scratch) 1.1.0 x86 64 Pure64
              11/18/2016
              • Hash based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3413
              1258Barracuda Networks
              3175 Winchester Road
              Campbell, CA 95008
              USA

              Andrea Cannon
              acannon@barracuda.com
              703-743-9068

              Barracuda Cryptographic Software Module

              1.0.1.8


              x

                • Intel Xeon with AES-NI w/ Barracuda NextGen Firewall and Control OS 7 under Microsoft Windows 2012 (64-bit) Hyper-V
                • Intel Xeon without AES-NI w/ Barracuda NextGen Firewall and Control OS 7 under Microsoft Windows 2012 (64-bit) Hyper-V
              11/18/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Prerequisite: AES #4144
              • Hash based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3412
              • HMAC based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2716
              1257DataLocker, Inc.
              7007 College Blvd Suite 240
              Overland Park, KS 66211
              USA

              Jay Kim
              legal@datalocker.com
              913-310-9088

              DataLocker Crypto Library - A

              1.2 (Firmware)


              DataLocker H350 is a secure USB hard disk drive with 256-bit AES encryption and PKI operations combined with advanced authentication and policy management capabilities to help organizations control user access to sensitive data. DataLocker H350 allows enterprise management features like password recovery and remote kill.

                • Inside Secure AT90SC28872RCU
              11/18/2016
              • HMAC based:
                • Prediction Resistance Modes: Not Enabled
                • Modes: SHA-256
                • Prerequisite: HMAC #2715
              1256OpenSSL Validation Services, Inc.
              1829 Mount Ephraim Road
              Adamstown, MD 21710
              USA

              Steve Marquess
              info@openssl.com
              301-874-2571

              OpenSSL FIPS Object Module

              2.0.14


              The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

                • Cavium Octeon II (MIPS) w/ ExtremeXOS-Linux 3.1
              11/10/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Prerequisite: AES #4141
              • Hash based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3411
              • HMAC based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: HMAC #2714
              1255Automation Solutions, Inc.
              16055 Space Center Blvd.
              Suite 450
              Houston, TX 77062
              USA

              Ken Brucker
              KBrucker@autosoln.com

              Michael McCarty
              MMcarty@autosoln.com

              AutoSolSSL Algorithms

              1.0.2d-fips9 Jul 2015 (Firmware)


              AutoSolSSL is a hardened cryptographic library embedded in AutoSol''s TLS VPN router and terminal server the CryptoMod. AutoSolSSL is also used in AutoSol''s advanced polling engine AutoSol Communication Manager.

                • ARMv7 Processor [412fc085] revision 5 (ARMv7)
              11/10/2016
              • Hash based:
                • Prediction Resistance Modes: Enabled, Not Enabled
                • Modes: SHA-1, SHA-256, SHA-384
                • Prerequisite: SHS #3410
              1254VMware, Inc.
              3401 Hillview Ave
              Palo Alto, CA 94303
              USA

              Eric Betts
              betts@vmware.com
              +1 (650) 427-1902

              Manoj Maskara
              mmaskara@vmware.com
              +1 (650) 427-3478

              VMware OpenSSL FIPS Object Module

              2.0.9


              The VMware OpenSSL FIPS Object Module is a versatile software library that implements FIPS 140-2 Approved cryptographic services for VMware products and platforms.

                • Intel Core I without AES-NI w/ Windows 8.1 on ESXi 6.0
                • Intel Core I without AES-NI w/ Windows 7 SP1 on ESXi 6.0
                • Intel Core I with AES-NI w/ Windows 7 SP1 on ESXi 6.0
                • Intel Core I without AES-NI w/ Windows 10 on ESXi 6.0
                • Intel Core I with AES-NI w/ Windows 10 on ESXi 6.0
                • Intel Core I with AES-NI w/ Windows 8.1 on ESXi 6.0
                • Intel Xeon with AES-NI w/ Windows 2012 64 bit on ESXi 6.0
                • Intel Xeon with AES-NI w/ Windows 2012 R2 on ESXi 6.0
                • Intel Xeon without AES-NI w/ Windows 2012 on ESXi 6.0
                • Intel Xeon without AES-NI w/ Windows 2012 R2 on ESXi 6.0
                • Intel Xeon without AES-NI w/ VMware NSX Controller OS 12.04 on ESXi 6.0
                • Intel Xeon with AES-NI w/ VMware NSX Controller OS 12.04 on ESXi 6.0
                • Intel Xeon without AES-NI w/ VMware NSX Edge OS 3.14 on ESXi 6.0
                • Intel Xeon with AES-NI w/ VMware NSX Edge OS 3.14 on ESXi 6.0
                • Intel Xeon with AES-NI w/ VMware NSX Manager OS 3.17 on ESXi 6.0
                • Intel Xeon without AES-NI w/ VMware NSX Manager OS 3.17 on ESXi 6.0
                • Intel Xeon with AES-NI w/ SLES 11 SP3 on ESXi 6.0
                • Intel Xeon without AES-NI w/ SLES 11 SP3 on ESXi 6.0
                • Intel Xeon without AES-NI w/ Windows 2012 64 bit on ESXi 6.0
                • Intel Xeon without AES-NI w/ Photon OS 1.0 on ESXi 6
                • Intel Xeon with AES-NI w/ Photon OS 1.0 on ESXi 6
                • Intel Xeon with AES-NI w/ Windows 2016 64 bit on ESXi 6.0
                • Intel Xeon without AES-NI w/ Windows 2016 64 bit on ESXi 6.0
                • Intel Xeon with AES-NI w/ Windows 2016 64 bit on ESXi 6.5
                • Intel Xeon without AES-NI w/ Windows 2016 64 bit on ESXi 6.5
                • Intel Xeon with AES-NI w/ VMware NSX Controller OS 16.04 on ESXi 6.5
                • Intel Xeon without AES-NI w/ VMware NSX Controller OS 16.04 on ESXi 6.5
                • Intel Xeon with AES-NI w/ VMware NSX Edge OS 4.4 on ESXi 6.5
                • Intel Xeon without AES-NI w/ VMware NSX Edge OS 4.4 on ESXi 6.5
                • Intel Xeon with AES-NI w/ Photon OS 1.0 on ESXi 6.5
                • Intel Xeon without AES-NI w/ Photon OS 1.0 on ESXi 6.5
                • Intel Xeon with AES-NI w/ Photon OS 2.0 on ESXi 6.0
                • Intel Xeon without AES-NI w/ Photon OS 2.0 on ESXi 6.0
                • Intel Xeon with AES-NI w/ Photon OS 2.0 on ESXi 6.5
                • Intel Xeon without AES-NI w/ Photon OS 2.0 on ESXi 6.5
                • Intel Xeon with AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.0
                • Intel Xeon without AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.0
                • Intel Xeon with AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.5
                • Intel Xeon without AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.5
                • Intel Xeon with AES-NI w/ Ubuntu 16.04 64 bit on ESXi 6.0
                • Intel Xeon without AES-NI w/ Windows Server 2008 on ESXi 6.5
                • Intel Xeon without AES-NI w/ BLUX 4.9 on ESXi 6.5
                • Intel Xeon without AES-NI w/ Windows Server 2012 on ESXi 6.5
                • Intel Xeon without AES-NI w/ SLES 12 on ESXi 6.5
                • Intel Xeon without AES-NI w/ Windows 10 on ESXi 6.5
              11/4/2016
              • Counter:
                • Modes: AES-128, AES-192, AES-256
                • Derivation Function States: Derivation Function not used, Derivation Function used
                • Predict