Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Product Name
Description
Provides cryptographic functionality necessary to support TLS-secured communications between FireEye HX server and clients.
Version
2.0.10-fe1
Type
SOFTWARE
Vendor
FireEye, Inc.
601 McCarthy Blvd.
Milpitas, CA 95035
USA
Contacts
Brian Kinchen
brian.kinchen@fireeye.com
+1 408-321-6300
Fax: +1 408-321-9818

Validations

Number
Date
Operating Environments
Algorithm Capabilities
C779
5/28/2019
  • Windows 10 x64 on Intel Xeon E5
    • processor
      • manufacturer: Intel
    • software
  • Windows 10 x86 on Intel Xeon E5
    • processor
      • manufacturer: Intel
    • software
  • Windows Server 2008R2 (SP1) x64 on Intel Xeon E5
    • processor
      • manufacturer: Intel
    • software
  • Windows Server 2012R2 x64 on Intel Xeon E5
    • processor
      • manufacturer: Intel
    • software
  • Windows Server 2016 on Intel Xeon E5
    • processor
      • manufacturer: Intel
    • software
  • AES-CBC
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 256
  • Counter DRBG
    • Prediction Resistance: No
    • Supports Reseed
      • Capabilities:
        • Mode: AES-256
        • Derivation Function Enabled: Yes
        • Additional Input: 0-256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Returned Bits: 128
    Prerequisites:
  • HMAC-SHA-1
    • MAC: 160
    • Key sizes < block size
    Prerequisites:
  • HMAC-SHA2-256
    • MAC: 256
    • Key sizes < block size
    Prerequisites:
  • RSA SigGen (186-4)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-256
    Prerequisites:
  • RSA SigVer (186-4)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-256
    • Public Exponent Mode: Fixed
    • Fixed Public Exponent: 10001
    Prerequisites:
  • SHA-1
    • Message Length: 0-51200 Increment 8
  • SHA-256
    • Message Length: 0-51200 Increment 8