Module Name
Red Hat Enterprise Linux 8 Kernel Cryptographic API
Caveat
Interim validation. When operated in approved mode. When installed, initialized and configured as specified in section 11 of the Security Policy. The module generates random strings whose strengths are modified by available entropy.
Security Level Exceptions
- Physical security: N/A
- Non-invasive security: N/A
- Mitigation of other attacks: N/A
- Documentation requirements: N/A
- Cryptographic module security policy: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Red Hat Enterprise Linux 8 Kernel Cryptographic API provides a C language API for use by other (kernel space and user space) processes that require cryptographic functionality
Tested Configuration(s)
- Red Hat Enterprise Linux 8 running on Dell PowerEdge R440 with Intel Xeon Silver 4216 with PAA
- Red Hat Enterprise Linux 8 running on Dell PowerEdge R440 with Intel Xeon Silver 4216 without PAA
Approved Algorithms
AES-XTS Testing Revision 2.0
AES-XTS Testing Revision 2.0
AES-XTS Testing Revision 2.0
Software Versions
4.18.0-372.52.1.el8_6; libkcapi 1.2.0-2.el8