Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The ACVPProxy access the NIST ACVP server to obtain test vectors and return test responses. The covered cryptographic implementation is 1f404983c180b39c6fe0b56e1eddb1c7250f0fdd.
Version
1.0
Type
SOFTWARE
Vendor
atsec corp.
9130 Jollyville Rd
Austin, TX 78759
USA
Contacts
Stephan Müller
cst-info@atsec.com
+1-512-615-7300

Validations

Number
Date
Operating Environments
Algorithm Capabilities
A3
7/10/2019
  • Fedora 30
    • software
      • swid: org.fedoraproject.Fedora-30
    • processor
      • family: X86
      • manufacturer: Intel
      • series: Broadwell
  • macOS Mojave 10.14
    • processor
      • family: X86
      • manufacturer: Intel
      • series: Broadwell
    • software
      • cpe: cpe:2.3:o:apple:mac_os_x:10.14:*:*:*:*:*:*:*
  • HMAC-SHA-1
    • MAC: 160
    • Key Length: 8, 16, 64, 128, 1024
  • HMAC-SHA2-224
    • MAC: 224
    • Key Length: 8, 16, 64, 128, 1024
  • HMAC-SHA2-256
    • MAC: 256
    • Key Length: 8, 16, 64, 128, 1024
  • HMAC-SHA2-384
    • MAC: 384
    • Key Length: 8, 16, 64, 128, 1024
  • HMAC-SHA2-512
    • MAC: 512
    • Key Length: 8, 16, 64, 128, 1024
  • SHA-1
    • Digest Size: 160
    • Message Length: 0-65536 Increment 8
  • SHA-224
    • Digest Size: 224
    • Message Length: 0-65536 Increment 8
  • SHA-256
    • Digest Size: 256
    • Message Length: 0-65536 Increment 8
  • SHA-384
    • Digest Size: 384
    • Message Length: 0-65536 Increment 8
  • SHA-512
    • Digest Size: 512
    • Message Length: 0-65536 Increment 8