Module Name
VMware’s OpenSSL FIPS Provider
Caveat
When operated in FIPS mode. No assurance of the minimum strength of generated keys.
Security Level Exceptions
- Physical Security: N/A
- Design Assurance: Level 3
Embodiment
Multi-Chip Stand Alone
Description
The VMware’s OpenSSL FIPS Provider is a software library providing a C-language application program interface (API) for use by applications that require cryptographic functionality.
Tested Configuration(s)
- Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
- Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
- CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
- CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
- PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
- PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
- RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
- RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
- SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
- SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
- Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
- Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
- Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
- Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
- Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
- Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA (single-user mode)
Approved Algorithms
AES |
Cert. #4013 |
CKG |
vendor affirmed |
CVL |
Cert. #4013 |
DRBG |
Cert. #4013 |
DSA |
Cert. #4013 |
ECDSA |
Cert. #4013 |
HMAC |
Cert. #4013 |
KAS-RSA-SSC |
Cert. #4013 |
KAS-SSC |
Cert. #4013 |
KBKDF |
Cert. #4013 |
KDA |
Cert. #4013 |
KMAC |
Cert. #4013 |
KTS |
AES Cert. #4013; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
AES Cert. #4013 and AES Cert. #4013; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
AES Cert. #4013 and HMAC Cert. #4013; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
Triple-DES Cert. #4013 and HMAC Cert. #4013; key establishment methodology provides 112 bits of encryption strength |
KTS-RSA |
Cert. #4013; key establishment methodology provides between 112 and 256 bits of encryption strength |
PBKDF |
Cert. #4013 |
RSA |
Cert. #4013 |
SHA-3 |
Cert. #4013 |
SHS |
Cert. #4013 |
Triple-DES |
Cert. #4013 |