Module Name
VMware BC-FJA (Bouncy Castle FIPS Java API)
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates cryptographic keys whose strengths are modified by available entropy
Security Level Exceptions
Embodiment
Multi-Chip Stand Alone
Description
The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).
Tested Configuration(s)
- Java SE Runtime Environment v8 (1.8.0) on BLUX 4.9 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on BLUX 4.9 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 10 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 10 on VMWare ESXi 6.5 running on Dell PowerEdge T620 (single-user mode)Java SE Runtime Environment v8 (1.8.0) on PhotonOS 1.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 7 (32-bit) on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 7 (32-bit) on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2008 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2008 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2012 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2012 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2016 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2016 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on PhotonOS 1.0 on ESXi 6.7 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on PhotonOS 1.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on PhotonOS 2.0 on ESXi 6.7 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on PhotonOS 2.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on PhotonOS 2.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on SLES 12 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on SLES 12 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Ubuntu 16.04 on ESXi 6.7 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Ubuntu 16.04 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Ubuntu 16.04 on VMWare ESXi 6.5 running on Dell PowerEdge T620
- Java SE Runtime Environment v8 (1.8.0) on Windows Server 2016 on ESXi 6.7 running on Dell PowerEdge T620 (single-user mode)
Approved Algorithms
AES |
Cert. #5365 |
CVL |
Certs. #1831, #1832 and #1833 |
DRBG |
Cert. #2076 |
DSA |
Cert. #1386 |
ECDSA |
Cert. #1415 |
HMAC |
Cert. #3553 |
KAS |
Cert. #177 |
KAS |
SP 800-56Arev2, vendor affirmed |
KBKDF |
Cert. #194 |
KTS |
vendor affirmed |
KTS |
AES Cert. #5365; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
Triple-DES Cert. #2709; key establishment methodology provides 112 bits of encryption strength |
PBKDF |
vendor affirmed |
RSA |
Cert. #2870 |
SHA-3 |
Cert. #42 |
SHS |
Cert. #4307 |
Triple-DES |
Cert. #2709 |
Allowed Algorithms
Diffie-Hellman (CVL Cert. #1831, key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)