Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products
Version
6.2
Type
SOFTWARE
Vendor
Cisco Systems, Inc.
170 West Tasman Drive
1
1
San Jose, CA 95134
USA
Contacts
Global Certification Team
certteam@cisco.com

C431 First Validated: 2/21/2019

Operating Environment Algorithm Capabilities
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-CBC
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-CCM
  • Key Length: 128, 192, 256
  • Tag Length: 32, 48, 64, 80, 96, 112, 128
  • IV Length: 56, 64, 72, 80, 88, 96, 104
  • Payload Length: 0-192
  • AAD Length: 0-524288
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-CFB1
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-CFB128
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-CFB8
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-CMAC
    • Capabilities:
      • Direction: Generation
      • Key Length: 128
      • MAC: 128
      • Message Length: 0, 504, 512, 1608
    • Capabilities:
      • Direction: Generation
      • Key Length: 192
      • MAC: 128
      • Message Length: 0, 504, 512, 1608
    • Capabilities:
      • Direction: Generation
      • Key Length: 256
      • MAC: 128
      • Message Length: 0, 504, 512, 1608
    • Capabilities:
      • Direction: Verification
      • Key Length: 128
      • MAC: 128
      • Message Length: 0, 8, 512
    • Capabilities:
      • Direction: Verification
      • Key Length: 192
      • MAC: 128
      • Message Length: 0, 8, 512
    • Capabilities:
      • Direction: Verification
      • Key Length: 256
      • MAC: 128
      • Message Length: 0, 8, 512
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-CTR
  • Direction: Encrypt
  • Key Length: 128, 192, 256
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-ECB
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-GCM
  • Direction: Decrypt, Encrypt
  • IV Generation: Internal
  • IV Generation Mode: 8.2.1
  • Key Length: 128, 192, 256
  • Tag Length: 128
  • IV Length: 96
  • Payload Length: 128, 136, 256, 264
  • AAD Length: 0, 128, 136, 256, 264
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-GMAC
  • Direction: Decrypt, Encrypt
  • IV Generation: Internal
  • IV Generation Mode: 8.2.1
  • Key Length: 128, 192, 256
  • Tag Length: 128
  • IV Length: 96
  • AAD Length: 0, 128, 136, 256, 264
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-KW
  • Direction: Decrypt, Encrypt
  • Cipher: Cipher
  • Key Length: 128, 192, 256
  • Payload Length: 128, 192, 256, 320, 4096
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-KWP
  • Direction: Decrypt, Encrypt
  • Cipher: Cipher
  • Key Length: 128, 192, 256
  • Payload Length: 808
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-OFB
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-XTS
  • Direction: Decrypt, Encrypt
  • Key Length: 128
  • Payload Length: 65536
  • Tweak Mode: Hex
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
AES-XTS
  • Direction: Decrypt, Encrypt
  • Key Length: 256
  • Payload Length: 65536
  • Tweak Mode: Hex
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
Counter DRBG
  • Prediction Resistance: Yes
  • Supports Reseed
    • Capabilities:
      • Mode: AES-128
      • Derivation Function Enabled: Yes
      • Additional Input: 0-128
      • Entropy Input: 128
      • Nonce: 64
      • Personalization String Length: 0-128
      • Returned Bits: 512
    • Capabilities:
      • Mode: AES-256
      • Derivation Function Enabled: Yes
      • Additional Input: 0-256
      • Entropy Input: 256
      • Nonce: 128
      • Personalization String Length: 0-256
      • Returned Bits: 512
    • Capabilities:
      • Mode: AES-128
      • Derivation Function Enabled: No
      • Additional Input: 0-128
      • Entropy Input: 128
      • Nonce: 64
      • Personalization String Length: 0-128
      • Returned Bits: 512
    • Capabilities:
      • Mode: AES-256
      • Derivation Function Enabled: No
      • Additional Input: 0-256
      • Entropy Input: 256
      • Nonce: 128
      • Personalization String Length: 0-256
      • Returned Bits: 512
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
DSA KeyGen (FIPS186-4)
    • Capabilities:
      • L: 2048
      • N: 224
    • Capabilities:
      • L: 2048
      • N: 256
    • Capabilities:
      • L: 3072
      • N: 256
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
DSA PQGGen (FIPS186-4)
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical
      • L: 2048
      • N: 224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical
      • L: 2048
      • N: 256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical
      • L: 3072
      • N: 256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
DSA PQGVer (FIPS186-4)
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical
      • L: 2048
      • N: 224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical
      • L: 2048
      • N: 256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical
      • L: 3072
      • N: 256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
DSA SigGen (FIPS186-4)
    • Capabilities:
      • L: 2048
      • N: 224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • L: 2048
      • N: 256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • L: 3072
      • N: 256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
DSA SigVer (FIPS186-4)
    • Capabilities:
      • L: 2048
      • N: 224
      • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • L: 2048
      • N: 256
      • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • L: 3072
      • N: 256
      • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
ECDSA KeyGen (FIPS186-4)
  • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Secret Generation Mode: Testing Candidates
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
ECDSA KeyVer (FIPS186-4)
  • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
ECDSA SigGen (FIPS186-4)
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
ECDSA SigVer (FIPS186-4)
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
Hash DRBG
  • Prediction Resistance: Yes
  • Supports Reseed
    • Capabilities:
      • Mode: SHA-1
      • Entropy Input: 128
      • Nonce: 64
      • Personalization String Length: 0-128
      • Additional Input: 0-128
      • Returned Bits: 640
    • Capabilities:
      • Mode: SHA2-224
      • Entropy Input: 192
      • Nonce: 96
      • Personalization String Length: 0-192
      • Additional Input: 0-192
      • Returned Bits: 896
    • Capabilities:
      • Mode: SHA2-256
      • Entropy Input: 256
      • Nonce: 128
      • Personalization String Length: 0-256
      • Additional Input: 0-256
      • Returned Bits: 1024
    • Capabilities:
      • Mode: SHA2-384
      • Entropy Input: 256
      • Nonce: 128
      • Personalization String Length: 0-256
      • Additional Input: 0-256
      • Returned Bits: 1536
    • Capabilities:
      • Mode: SHA2-512
      • Entropy Input: 256
      • Nonce: 128
      • Personalization String Length: 0-256
      • Additional Input: 0-256
      • Returned Bits: 2048
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
HMAC DRBG
  • Prediction Resistance: Yes
  • Supports Reseed
    • Capabilities:
      • Mode: SHA-1
      • Entropy Input: 128
      • Nonce: 64
      • Personalization String Length: 0-128
      • Additional Input: 0-128
      • Returned Bits: 640
    • Capabilities:
      • Mode: SHA2-224
      • Entropy Input: 192
      • Nonce: 96
      • Personalization String Length: 0-192
      • Additional Input: 0-192
      • Returned Bits: 896
    • Capabilities:
      • Mode: SHA2-256
      • Entropy Input: 256
      • Nonce: 128
      • Personalization String Length: 0-256
      • Additional Input: 0-256
      • Returned Bits: 1024
    • Capabilities:
      • Mode: SHA2-384
      • Entropy Input: 256
      • Nonce: 128
      • Personalization String Length: 0-256
      • Additional Input: 0-256
      • Returned Bits: 1536
    • Capabilities:
      • Mode: SHA2-512
      • Entropy Input: 256
      • Nonce: 128
      • Personalization String Length: 0-256
      • Additional Input: 0-256
      • Returned Bits: 2048
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
HMAC-SHA-1
  • MAC: 160
  • Key sizes < block size
  • Key size = block size
  • Key sizes > block size
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
HMAC-SHA2-224
  • MAC: 224
  • Key sizes < block size
  • Key size = block size
  • Key sizes > block size
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
HMAC-SHA2-256
  • MAC: 256
  • Key sizes < block size
  • Key size = block size
  • Key sizes > block size
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
HMAC-SHA2-384
  • MAC: 384
  • Key sizes < block size
  • Key sizes > block size
  • Key size = block size
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
HMAC-SHA2-512
  • MAC: 512
  • Key sizes < block size
  • Key size = block size
  • Key sizes > block size
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
KAS-ECC CDH-Component
  • Function: Key Pair Generation
  • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
KDF IKEv2
    • Capabilities:
      • Initiator Nonce Length: 128-2048
      • Responder Nonce Length: 128-2048
      • Diffie-Hellman Shared Secret Length: 2048
      • Derived Keying Material Length: 1056-3072
      • Hash Algorithm: SHA-1
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
KDF SNMP
  • Password Length: 64-128
  • Engine ID: 000002b87766554433221100, 800002b805123456789abcdef0123456789abcdef0123456789abcdef0123456
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
KDF SP800-108
    • Capabilities:
      • KDF Mode: Counter
      • MAC Mode: HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
      • Supported Lengths: 384
      • Fixed Data Order: After Fixed Data
      • Counter Length: 8
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
KDF SRTP
  • AES Key Length: 128, 192, 256
  • KDR Exponents: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
KDF SSH
  • Cipher: AES-128, AES-192, AES-256
  • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
KDF TLS
  • TLS Version: v1.2
  • Hash Algorithm: SHA2-256, SHA2-384
Prerequisites:
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
RSA KeyGen (FIPS186-4)
    • Capabilities:
      • Key Generation Mode: B.3.4
        • Properties:
          • Modulo: 2048
          • Hash Algorithm: SHA2-256
        • Properties:
          • Modulo: 3072
          • Hash Algorithm: SHA2-256
  • Info Generated By Server
  • Public Exponent Mode: Fixed
  • Fixed Public Exponent: 10001
  • Private Key Format: Standard
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
RSA SigGen (FIPS186-2)
    • Capabilities:
      • Signature Type: ANSI X9.31
      • Modulo: 4096
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Signature Type: PKCS 1.5
      • Modulo: 4096
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Signature Type: PKCSPSS
      • Modulo: 4096
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
RSA SigGen (FIPS186-4)
    • Capabilities:
      • Signature Type: ANSI X9.31
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
    • Capabilities:
      • Signature Type: PKCS 1.5
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
    • Capabilities:
      • Signature Type: PKCSPSS
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
RSA SigVer (FIPS186-4)
    • Capabilities:
      • Signature Type: ANSI X9.31
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
    • Capabilities:
      • Signature Type: PKCS 1.5
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
    • Capabilities:
      • Signature Type: PKCSPSS
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
  • Public Exponent Mode: Fixed
  • Fixed Public Exponent: 10001
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
RSA SigVer (FIPS186-4)
    • Capabilities:
      • Signature Type: ANSI X9.31
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
    • Capabilities:
      • Signature Type: PKCS 1.5
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
    • Capabilities:
      • Signature Type: PKCSPSS
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
  • Public Exponent Mode: Fixed
  • Fixed Public Exponent: 10001
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
SHA-1
  • Message Length: 0-51200 Increment 8
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
SHA2-224
  • Message Length: 0-51200 Increment 8
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
SHA2-256
  • Message Length: 0-51200 Increment 8
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
SHA2-384
  • Message Length: 0-102400 Increment 8
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
SHA2-512
  • Message Length: 0-102400 Increment 8
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
TDES-CBC
  • Direction: Decrypt, Encrypt
  • Keying Option: 1
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
TDES-CFB1
  • Direction: Decrypt, Encrypt
  • Keying Option: 1
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
TDES-CFB64
  • Direction: Decrypt, Encrypt
  • Keying Option: 1
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
TDES-CFB8
  • Direction: Decrypt, Encrypt
  • Keying Option: 1
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
TDES-CTR
  • Direction: Encrypt
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
TDES-ECB
  • Direction: Decrypt, Encrypt
  • Keying Option: 1
Linux 4.4 on Intel Xeon D
  • processor: Intel Xeon D
    • manufacturer: Intel
  • software: Linux 4.4
TDES-OFB
  • Direction: Decrypt, Encrypt
  • Keying Option: 1

Created October 05, 2016, Updated December 01, 2020