This page was not yet optimized for use on mobile
devices.
VMware’s OpenSSL FIPS Provider
Certificate #4861
Webpage information
Security policy
Symmetric Algorithms
AES, AES128, AES192, AES256, AES-128, AES-192, AES-256, Triple-DES, TDES, TDEA, HMAC, KMAC, CMACAsymmetric Algorithms
RSA-OAEP, ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-2, SHA-3, SHA-3-224, SHA3-224, SHA-3-256, Keccak, PBKDF2, PBKDFSchemes
Key AgreementProtocols
SSHv2, TLS 1.2, TLS 1.3, TLS v1.3, TLS, TLS v1.2Randomness
DRBGLibraries
OpenSSLElliptic Curves
P-224, P-192, P-256, K-233, B-233, K-163, B-163, Ed25519, Ed448Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSJavaCard API constants
X25519, X448Vendor
Broadcom, Microsoft, Microsoft Corporation, CiscoSecurity level
Level 1Side-channel analysis
side-channel, timing attacksStandards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 186-4, FIPS 202, FIPS 180-4, FIPS 198-1, SP 800-135, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38F, SP 800-38E, SP 800-132, SP 800-108, SP 800-185, SP 800-90, NIST SP 800-133, NIST SP 800-38D, PKCS 1, PKCS#1, RFC 8446, RFC 5288, RFC 5246File metadata
| Author | Aniket Ingle |
|---|---|
| Creation date | D:20241127114302-05'00' |
| Modification date | D:20241127114302-05'00' |
| Pages | 43 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4861,
"dgst": "21a84ad988ff6ec4",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"KMAC#A4013",
"SHS#A4013",
"DRBG#A4013",
"HMAC#A4013",
"AES#A4013",
"SHA-3#A4013",
"KTS-RSA#A4013",
"PBKDF#A4013",
"CVL#A4013",
"KAS-SSC#A4013",
"KDA#A4013",
"DSA#A4013",
"RSA#A4013",
"KAS-RSA-SSC#A4013",
"Triple-DES#A4013",
"KBKDF#A4013",
"KTS#A4013",
"ECDSA#A4013"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 17
}
},
"FF": {
"DH": {
"DH": 16,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 18
}
},
"RSA": {
"RSA-OAEP": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 3
},
"CFB": {
"CFB": 3
},
"CTR": {
"CTR": 3
},
"ECB": {
"ECB": 4
},
"GCM": {
"GCM": 9
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 19
}
},
"crypto_protocol": {
"SSH": {
"SSHv2": 3
},
"TLS": {
"TLS": {
"TLS": 4,
"TLS 1.2": 3,
"TLS 1.3": 3,
"TLS v1.2": 1,
"TLS v1.3": 3
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 6
}
},
"device_model": {},
"ecc_curve": {
"Edwards": {
"Ed25519": 2,
"Ed448": 2
},
"NIST": {
"B-163": 2,
"B-233": 4,
"K-163": 2,
"K-233": 5,
"P-192": 4,
"P-224": 12,
"P-256": 2
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 128/192/256": 1,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1,
"AES128": 1,
"AES192": 1,
"AES256": 1,
"HMAC-SHA-1": 4,
"PKCS 1": 4,
"PKCS#1": 4,
"SHA-1": 14,
"SHA-1, 256": 2,
"SHA-2": 2,
"SHA-3": 6,
"SHA-3-224": 1,
"SHA-3-256": 1,
"SHA2-224": 14,
"SHA2-256": 5,
"SHA2-512": 1,
"SHA3-224": 4
}
},
"fips_security_level": {
"Level": {
"Level 1": 4
}
},
"hash_function": {
"Keccak": {
"Keccak": 1
},
"PBKDF": {
"PBKDF": 1,
"PBKDF2": 4
},
"SHA": {
"SHA1": {
"SHA-1": 16
},
"SHA2": {
"SHA-2": 4
},
"SHA3": {
"SHA-3": 6,
"SHA-3-224": 1,
"SHA-3-256": 1,
"SHA3-224": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"X25519": 10,
"X448": 10
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 21
}
},
"side_channel_analysis": {
"SCA": {
"side-channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 140-2": 22,
"FIPS 180-4": 2,
"FIPS 186-4": 6,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS 202": 2
},
"NIST": {
"NIST SP 800-133": 1,
"NIST SP 800-38D": 2,
"SP 800-108": 2,
"SP 800-132": 3,
"SP 800-135": 4,
"SP 800-185": 1,
"SP 800-38A": 2,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 2,
"SP 800-38E": 1,
"SP 800-38F": 2,
"SP 800-90": 2
},
"PKCS": {
"PKCS 1": 2,
"PKCS#1": 2
},
"RFC": {
"RFC 5246": 1,
"RFC 5288": 2,
"RFC 8446": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 31,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1,
"AES128": 1,
"AES192": 1,
"AES256": 1
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 5,
"Triple-DES": 7
}
},
"constructions": {
"MAC": {
"CMAC": 12,
"HMAC": 13,
"KMAC": 5
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Broadcom": {
"Broadcom": 48
},
"Cisco": {
"Cisco": 1
},
"Microsoft": {
"Microsoft": 1,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Aniket Ingle",
"/CreationDate": "D:20241127114302-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20241127114302-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 890744,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"https://csrc.nist.gov/csrc/media/publications/fips/198/1/final/documents/fips-198-1_final.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf",
"https://www.openssl.org/docs/manmaster/man1/openssl-fipsinstall.html",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
"https://www.rfc-editor.org/info/rfc3447",
"https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-38b.pdf",
"https://csrc.nist.gov/csrc/media/publications/fips/197/final/documents/fips-197.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
"https://datatracker.ietf.org/doc/html/rfc5288",
"https://www.openssl.org/source/openssl-3.0.8.tar.gz",
"http://csrc.nist.gov/groups/STM/cmvp/index.html",
"https://datatracker.ietf.org/doc/html/rfc8446",
"https://www.broadcom.com/",
"https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 43
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "64328481d4f4df1261734263df295ce1f71ff0a1d2c9ec3a7615f3e234c2e0fa",
"policy_txt_hash": "a741e3575425bc48715104bac0809f2d254939d16d32d0bf02941d8973e3ec0f"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys.",
"certificate_pdf_url": null,
"date_sunset": "2026-09-21",
"description": "The VMware\u2019s OpenSSL FIPS Provider is a software library providing a C-language application program interface (API) for use by applications that require cryptographic functionality.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Design Assurance: Level 3"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "VMware\u2019s OpenSSL FIPS Provider",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "active",
"sw_versions": "3.0.8",
"tested_conf": [
"Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA",
"Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA",
"CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA",
"CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA",
"PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA",
"PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA",
"RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA",
"RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA",
"SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA",
"SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA",
"Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA",
"Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA",
"Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA",
"Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA",
"Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 with PAA",
"Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xeon Gold 6330 without PAA (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-11-04",
"lab": "Acumen Security",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-12-05",
"lab": "Acumen Security",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-03-18",
"lab": "Acumen Security",
"validation_type": "Update"
}
],
"vendor": "Broadcom, Inc",
"vendor_url": "http://www.broadcom.com"
}
}