Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program CAVP

Description
The Extreme NetIron LP cryptographic library implements crypto operations in software layer with some crypto offloaded to the internal security engine. Applications running in the device uses the cryptographic library for security and crypto operations. The Freescale MPC P2010 processor is on MLXe: BR-MLX-10GX4-IPSEC-M, BR-MLX-1GX20-U10G-M, BR-MLX-1GX20-U10G-X2, BR-MLX-10GX20-M, BR-MLX-10GX20-X2 Interface modules.
Version
2.0
Type
FIRMWARE
Vendor
Extreme Networks
6480 Via Del Oro
San Jose, CA 95148
USA
Contacts
Sunil Chitnis
schitnis@extremenetworks.com
+1-408-352-2407
Joey Salanga
jsalanga@extremenetworks.com
+1-408-352-2439

Validations

Number
Date
Operating Environments
Algorithm Capabilities
C808
6/12/2019
  • Freescale MPC P2010
    • processor
  • DSA KeyGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 256
  • ECDSA KeyGen (186-4)
    • Curve: P-256, P-384
    • Secret Generation Mode: Extra Bits, Testing Candidates
    Prerequisites:
  • ECDSA KeyVer (186-4)
    • Curve: P-256, P-384
  • ECDSA SigGen (186-4)
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • ECDSA SigVer (186-4)
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • Hash DRBG
    • Prediction Resistance: No
    • Supports Reseed
      • Capabilities:
        • Mode: SHA2-256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0
        • Additional Input: 0-256
        • Returned Bits: 1024
    Prerequisites:
  • HMAC-SHA2-256
    • MAC: 256
    • Key sizes < block size
    Prerequisites:
  • HMAC-SHA2-384
    • MAC: 384
    • Key sizes < block size
    Prerequisites:
  • KAS-ECC Component
    • Function: Full Public Key Validation
    • Scheme:
      • Ephemeral Unified:
        • KAS Role: Initiator, Responder
        • Shared Secret Computation:
          • Parameter Set:
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
    Prerequisites:
  • KAS-FFC Component
    • Function: Full Public Key Validation
    • Scheme:
      • dhEphem:
        • KAS Role: Initiator, Responder
        • Shared Secret Computation:
          • Parameter Set:
            • FB:
              • Hash Algorithm: SHA2-256
            • FC:
              • Hash Algorithm: SHA2-384
    Prerequisites:
  • KDF IKEv2
      • Capabilities:
        • Initiator Nonce Length: 128-192
        • Responder Nonce Length: 128-192
        • Diffie-Hellman Shared Secret Length: 224
        • Derived Keying Material Length: 1280-5248
        • Hash Algorithm: SHA2-256, SHA2-384
      • Capabilities:
        • Initiator Nonce Length: 128-192
        • Responder Nonce Length: 128-192
        • Diffie-Hellman Shared Secret Length: 2048
        • Derived Keying Material Length: 1280-5248
        • Hash Algorithm: SHA2-256, SHA2-384
      • Capabilities:
        • Initiator Nonce Length: 128-192
        • Responder Nonce Length: 128-192
        • Diffie-Hellman Shared Secret Length: 384
        • Derived Keying Material Length: 1280-5248
        • Hash Algorithm: SHA2-256, SHA2-384
    Prerequisites:
Created October 05, 2016, Updated June 22, 2020