Cryptographic Algorithm Validation Program CAVP

Description
The Linux kernel crpyto API implementation provides cryptographic services to Linux kernel space software components and user space via the AF_ALG interface. The following cipher implementation is covered: SHA implementation.
Version
4.18.0-372.57.1.el8_6
Type
SOFTWARE
Vendor
Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA
Contacts
Jaroslav Reznik
fips140@redhat.com

A4710

   First Validated: 11/16/2023
Operating Environment Algorithm Capabilities
RHEL 8 on IBM Z System z15(TM) Expand
    HMAC DRBG Expand
    RHEL 8 on Intel Cascade Lake Xeon Silver 4216 Expand
      HMAC DRBG Expand
      RHEL 8 on IBM Z System z15(TM) Expand
        HMAC-SHA2-512 Expand
        RHEL 8 on Intel Cascade Lake Xeon Silver 4216 Expand
          HMAC-SHA2-512 Expand
          RHEL 8 on IBM Z System z15(TM) Expand
            SHA-1 Expand
            RHEL 8 on Intel Cascade Lake Xeon Silver 4216 Expand
              SHA-1 Expand
              RHEL 8 on IBM Z System z15(TM) Expand
                SHA2-224 Expand
                RHEL 8 on Intel Cascade Lake Xeon Silver 4216 Expand
                  SHA2-224 Expand
                  RHEL 8 on IBM Z System z15(TM) Expand
                    SHA2-256 Expand
                    RHEL 8 on Intel Cascade Lake Xeon Silver 4216 Expand
                      SHA2-256 Expand
                      RHEL 8 on IBM Z System z15(TM) Expand
                        SHA2-384 Expand
                        RHEL 8 on Intel Cascade Lake Xeon Silver 4216 Expand
                          SHA2-384 Expand
                          RHEL 8 on IBM Z System z15(TM) Expand
                            SHA2-512 Expand
                            RHEL 8 on Intel Cascade Lake Xeon Silver 4216 Expand
                              SHA2-512 Expand

                              Created October 05, 2016, Updated April 03, 2025