Module Name
VMware’s OpenSSL FIPS Provider
Caveat
When operated in FIPS mode. No assurance of the minimum strength of generated keys.
Security Level Exceptions
- Physical Security: N/A
- Design Assurance: Level 3
Embodiment
Multi-Chip Stand Alone
Description
The VMware’s OpenSSL FIPS Provider is a software library providing a C-language application program interface (API) for use by applications that require cryptographic functionality.
Tested Configuration(s)
- Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA
- Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA
- CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA
- CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA
- PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA
- PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA
- RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA
- RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA
- SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA
- SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA
- Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA
- Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA
- Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA
- Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA
- Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA
- Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA (single-user mode)
Approved Algorithms
| AES |
Cert. #A4013 |
| CKG |
vendor affirmed |
| CVL |
Cert. #A4013 |
| DRBG |
Cert. #A4013 |
| DSA |
Cert. #A4013 |
| ECDSA |
Cert. #A4013 |
| HMAC |
Cert. #A4013 |
| KAS-RSA-SSC |
Cert. #A4013 |
| KAS-SSC |
Cert. #A4013 |
| KBKDF |
Cert. #A4013 |
| KDA |
Cert. #A4013 |
| KMAC |
Cert. #A4013 |
| KTS |
AES Cert. #A4013; key establishment methodology provides between 128 and 256 bits of encryption strength |
| KTS |
AES Cert. #A4013 and AES Cert. #A4013; key establishment methodology provides between 128 and 256 bits of encryption strength |
| KTS |
AES Cert. #A4013 and HMAC Cert. #A4013; key establishment methodology provides between 128 and 256 bits of encryption strength |
| KTS |
Triple-DES Cert. #A4013 and HMAC Cert. #A4013; key establishment methodology provides 112 bits of encryption strength |
| KTS-RSA |
Cert. #A4013; key establishment methodology provides between 112 and 256 bits of encryption strength |
| PBKDF |
Cert. #A4013 |
| RSA |
Cert. #A4013 |
| SHA-3 |
Cert. #A4013 |
| SHS |
Cert. #A4013 |
| Triple-DES |
Cert. #A4013 |