VMware’s OpenSSL FIPS Provider

Certificate #4861

Webpage information ?

Status active
Validation dates 04.11.2024 , 05.12.2024
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. No assurance of the minimum strength of generated keys.
Exceptions
  • Physical Security: N/A
  • Design Assurance: Level 3
Description The VMware’s OpenSSL FIPS Provider is a software library providing a C-language application program interface (API) for use by applications that require cryptographic functionality.
Tested configurations
  • Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
  • Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
  • CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
  • CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
  • PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
  • PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
  • RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
  • RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
  • SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
  • SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
  • Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
  • Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
  • Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
  • Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA
  • Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA
  • Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA (single-user mode)
Vendor Broadcom, Inc
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, AES128, AES192, AES256, AES-128, AES-192, AES-256, Triple-DES, TDES, TDEA, HMAC, KMAC, CMAC
Asymmetric Algorithms
RSA-OAEP, ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-2, SHA-3, SHA-3-224, SHA3-224, SHA-3-256, Keccak, PBKDF2, PBKDF
Schemes
Key Agreement
Protocols
TLS 1.2, TLS 1.3, TLS v1.3, TLS, TLS v1.2
Randomness
DRBG
Libraries
OpenSSL
Elliptic Curves
P-224, P-192, P-256, K-233, B-233, K-163, B-163, Ed25519, Ed448
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

JavaCard API constants
X25519, X448
Vendor
Broadcom, Microsoft, Microsoft Corporation, Cisco

Security level
Level 1
Side-channel analysis
side-channel, timing attacks

Standards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 186-4, FIPS 202, FIPS 180-4, FIPS 198-1, SP 800-135, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38F, SP 800-38E, SP 800-132, SP 800-108, SP 800-185, SP 800-90, NIST SP 800-133, NIST SP 800-38D, PKCS 1, PKCS#1, RFC 8446, RFC 5288, RFC 5246

File metadata

Author Aniket Ingle
Creation date D:20241127114302-05'00'
Modification date D:20241127114302-05'00'
Pages 43
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 09.12.2024 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The validation_history property was updated, with the [[1, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2024-12-05', 'validation_type': 'Update', 'lab': 'ACUMEN SECURITY, LLC'}]] values inserted.
    • The tested_conf property was set to ['Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA (single-user mode)'].

    The PDF extraction data was updated.

    • The keywords property was updated, with the {'fips_certlike': {'__update__': {'Certlike': {'__delete__': ['HMAC-SHA-256']}}}, 'vendor': {'__insert__': {'Cisco': {'Cisco': 1}}, '__update__': {'Broadcom': {'__update__': {'Broadcom': 48}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 31}}}}, 'constructions': {'__update__': {'MAC': {'__delete__': ['HMAC-SHA-256']}}}}}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 19}}}}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS 140-2': 22}}}}} data.
    • The policy_metadata property was updated, with the {'pdf_file_size_bytes': 890744, 'pdf_number_of_pages': 43, '/CreationDate': "D:20241127114302-05'00'", '/ModDate': "D:20241127114302-05'00'", 'pdf_hyperlinks': {'__discard__': {'_type': 'Set', 'elements': ['mailto:[email protected]']}}} data.

    The computed heuristics were updated.

    • The algorithms property was set to {'_type': 'Set', 'elements': ['SHA-3#4013', 'SHS#4013', 'PBKDF#4013', 'KMAC#4013', 'KTS#4013', 'KTS-RSA#4013', 'KAS-RSA-SSC#4013', 'DRBG#4013', 'DSA#4013', 'KBKDF#4013', 'KDA#4013', 'Triple-DES#4013', 'HMAC#4013', 'CVL#4013', 'KAS-SSC#4013', 'ECDSA#4013', 'RSA#4013', 'AES#4013']}.

    The state was updated.

    • The policy_pdf_hash property was set to 64328481d4f4df1261734263df295ce1f71ff0a1d2c9ec3a7615f3e234c2e0fa.
    • The policy_txt_hash property was set to a741e3575425bc48715104bac0809f2d254939d16d32d0bf02941d8973e3ec0f.
  • 12.11.2024 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4861,
  "dgst": "21a84ad988ff6ec4",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "KMAC#4013",
        "KDA#4013",
        "KTS-RSA#4013",
        "HMAC#4013",
        "Triple-DES#4013",
        "AES#4013",
        "KBKDF#4013",
        "KAS-SSC#4013",
        "ECDSA#4013",
        "SHA-3#4013",
        "RSA#4013",
        "CVL#4013",
        "KAS-RSA-SSC#4013",
        "KTS#4013",
        "DRBG#4013",
        "PBKDF#4013",
        "DSA#4013",
        "SHS#4013"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 17
          }
        },
        "FF": {
          "DH": {
            "DH": 16,
            "Diffie-Hellman": 3
          },
          "DSA": {
            "DSA": 18
          }
        },
        "RSA": {
          "RSA-OAEP": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CCM": {
          "CCM": 3
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 3
        },
        "ECB": {
          "ECB": 4
        },
        "GCM": {
          "GCM": 9
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 19
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 4,
            "TLS 1.2": 3,
            "TLS 1.3": 3,
            "TLS v1.2": 1,
            "TLS v1.3": 3
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Edwards": {
          "Ed25519": 2,
          "Ed448": 2
        },
        "NIST": {
          "B-163": 2,
          "B-233": 4,
          "K-163": 2,
          "K-233": 5,
          "P-192": 4,
          "P-224": 12,
          "P-256": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128/192/256": 1,
          "AES-128": 1,
          "AES-192": 1,
          "AES-256": 1,
          "AES128": 1,
          "AES192": 1,
          "AES256": 1,
          "HMAC-SHA-1": 4,
          "PKCS 1": 4,
          "PKCS#1": 4,
          "SHA-1": 14,
          "SHA-1, 256": 2,
          "SHA-2": 2,
          "SHA-3": 6,
          "SHA-3-224": 1,
          "SHA-3-256": 1,
          "SHA2-224": 14,
          "SHA2-256": 5,
          "SHA2-512": 1,
          "SHA3-224": 4
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 4
        }
      },
      "hash_function": {
        "Keccak": {
          "Keccak": 1
        },
        "PBKDF": {
          "PBKDF": 1,
          "PBKDF2": 4
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 16
          },
          "SHA2": {
            "SHA-2": 4
          },
          "SHA3": {
            "SHA-3": 6,
            "SHA-3-224": 1,
            "SHA-3-256": 1,
            "SHA3-224": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "X25519": 10,
          "X448": 10
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 21
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 1,
          "FIPS 140-2": 22,
          "FIPS 180-4": 2,
          "FIPS 186-4": 6,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS 202": 2
        },
        "NIST": {
          "NIST SP 800-133": 1,
          "NIST SP 800-38D": 2,
          "SP 800-108": 2,
          "SP 800-132": 3,
          "SP 800-135": 4,
          "SP 800-185": 1,
          "SP 800-38A": 2,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 2,
          "SP 800-38E": 1,
          "SP 800-38F": 2,
          "SP 800-90": 2
        },
        "PKCS": {
          "PKCS 1": 2,
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 5246": 1,
          "RFC 5288": 2,
          "RFC 8446": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 31,
            "AES-128": 1,
            "AES-192": 1,
            "AES-256": 1,
            "AES128": 1,
            "AES192": 1,
            "AES256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 5,
            "Triple-DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 12,
            "HMAC": 13,
            "KMAC": 5
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Broadcom": {
          "Broadcom": 48
        },
        "Cisco": {
          "Cisco": 1
        },
        "Microsoft": {
          "Microsoft": 1,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Aniket Ingle",
      "/CreationDate": "D:20241127114302-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20241127114302-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 890744,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf",
          "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
          "https://www.openssl.org/source/openssl-3.0.8.tar.gz",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf",
          "https://datatracker.ietf.org/doc/html/rfc5288",
          "https://datatracker.ietf.org/doc/html/rfc8446",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
          "https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf",
          "http://csrc.nist.gov/groups/STM/cmvp/index.html",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf",
          "https://www.openssl.org/docs/manmaster/man1/openssl-fipsinstall.html",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
          "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
          "https://www.broadcom.com/",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
          "https://csrc.nist.gov/csrc/media/publications/fips/197/final/documents/fips-197.pdf",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
          "https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-38b.pdf",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf",
          "https://csrc.nist.gov/csrc/media/publications/fips/198/1/final/documents/fips-198-1_final.pdf",
          "https://www.rfc-editor.org/info/rfc3447"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 43
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "64328481d4f4df1261734263df295ce1f71ff0a1d2c9ec3a7615f3e234c2e0fa",
    "policy_txt_hash": "a741e3575425bc48715104bac0809f2d254939d16d32d0bf02941d8973e3ec0f"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys.",
    "certificate_pdf_url": null,
    "date_sunset": "2026-09-21",
    "description": "The VMware\u2019s OpenSSL FIPS Provider is a software library providing a C-language application program interface (API) for use by applications that require cryptographic functionality.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Design Assurance: Level 3"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "VMware\u2019s OpenSSL FIPS Provider",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "3.0.8",
    "tested_conf": [
      "Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
      "Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
      "CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
      "CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
      "PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
      "PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
      "RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
      "RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
      "SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
      "SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
      "Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
      "Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
      "Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
      "Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
      "Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
      "Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2024-11-04",
        "lab": "ACUMEN SECURITY, LLC",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2024-12-05",
        "lab": "ACUMEN SECURITY, LLC",
        "validation_type": "Update"
      }
    ],
    "vendor": "Broadcom, Inc",
    "vendor_url": "http://www.broadcom.com"
  }
}