This page was not yet optimized for use on mobile devices.
VMware’s OpenSSL FIPS Provider
Certificate #4861
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES128, AES192, AES256, AES-128, AES-192, AES-256, Triple-DES, TDES, TDEA, HMAC, KMAC, CMACAsymmetric Algorithms
RSA-OAEP, ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-2, SHA-3, SHA-3-224, SHA3-224, SHA-3-256, Keccak, PBKDF2, PBKDFSchemes
Key AgreementProtocols
TLS 1.2, TLS 1.3, TLS v1.3, TLS, TLS v1.2Randomness
DRBGLibraries
OpenSSLElliptic Curves
P-224, P-192, P-256, K-233, B-233, K-163, B-163, Ed25519, Ed448Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSJavaCard API constants
X25519, X448Vendor
Broadcom, Microsoft, Microsoft Corporation, CiscoSecurity level
Level 1Side-channel analysis
side-channel, timing attacksStandards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 186-4, FIPS 202, FIPS 180-4, FIPS 198-1, SP 800-135, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38F, SP 800-38E, SP 800-132, SP 800-108, SP 800-185, SP 800-90, NIST SP 800-133, NIST SP 800-38D, PKCS 1, PKCS#1, RFC 8446, RFC 5288, RFC 5246File metadata
Author | Aniket Ingle |
---|---|
Creation date | D:20241127114302-05'00' |
Modification date | D:20241127114302-05'00' |
Pages | 43 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
Heuristics ?
No heuristics are available for this certificate.
References ?
No references are available for this certificate.
Updates ?
-
09.12.2024 The certificate data changed.
Certificate changed
The web extraction data was updated.
- The validation_history property was updated, with the
[[1, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2024-12-05', 'validation_type': 'Update', 'lab': 'ACUMEN SECURITY, LLC'}]]
values inserted. - The tested_conf property was set to
['Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA', 'Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA', 'Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA (single-user mode)']
.
The PDF extraction data was updated.
- The keywords property was updated, with the
{'fips_certlike': {'__update__': {'Certlike': {'__delete__': ['HMAC-SHA-256']}}}, 'vendor': {'__insert__': {'Cisco': {'Cisco': 1}}, '__update__': {'Broadcom': {'__update__': {'Broadcom': 48}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 31}}}}, 'constructions': {'__update__': {'MAC': {'__delete__': ['HMAC-SHA-256']}}}}}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 19}}}}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS 140-2': 22}}}}}
data. - The policy_metadata property was updated, with the
{'pdf_file_size_bytes': 890744, 'pdf_number_of_pages': 43, '/CreationDate': "D:20241127114302-05'00'", '/ModDate': "D:20241127114302-05'00'", 'pdf_hyperlinks': {'__discard__': {'_type': 'Set', 'elements': ['mailto:[email protected]']}}}
data.
The computed heuristics were updated.
- The algorithms property was set to
{'_type': 'Set', 'elements': ['SHA-3#4013', 'SHS#4013', 'PBKDF#4013', 'KMAC#4013', 'KTS#4013', 'KTS-RSA#4013', 'KAS-RSA-SSC#4013', 'DRBG#4013', 'DSA#4013', 'KBKDF#4013', 'KDA#4013', 'Triple-DES#4013', 'HMAC#4013', 'CVL#4013', 'KAS-SSC#4013', 'ECDSA#4013', 'RSA#4013', 'AES#4013']}
.
The state was updated.
- The policy_pdf_hash property was set to
64328481d4f4df1261734263df295ce1f71ff0a1d2c9ec3a7615f3e234c2e0fa
. - The policy_txt_hash property was set to
a741e3575425bc48715104bac0809f2d254939d16d32d0bf02941d8973e3ec0f
.
- The validation_history property was updated, with the
-
12.11.2024 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4861,
"dgst": "21a84ad988ff6ec4",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"KMAC#4013",
"KDA#4013",
"KTS-RSA#4013",
"HMAC#4013",
"Triple-DES#4013",
"AES#4013",
"KBKDF#4013",
"KAS-SSC#4013",
"ECDSA#4013",
"SHA-3#4013",
"RSA#4013",
"CVL#4013",
"KAS-RSA-SSC#4013",
"KTS#4013",
"DRBG#4013",
"PBKDF#4013",
"DSA#4013",
"SHS#4013"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 17
}
},
"FF": {
"DH": {
"DH": 16,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 18
}
},
"RSA": {
"RSA-OAEP": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 3
},
"CFB": {
"CFB": 3
},
"CTR": {
"CTR": 3
},
"ECB": {
"ECB": 4
},
"GCM": {
"GCM": 9
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 19
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 4,
"TLS 1.2": 3,
"TLS 1.3": 3,
"TLS v1.2": 1,
"TLS v1.3": 3
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 6
}
},
"device_model": {},
"ecc_curve": {
"Edwards": {
"Ed25519": 2,
"Ed448": 2
},
"NIST": {
"B-163": 2,
"B-233": 4,
"K-163": 2,
"K-233": 5,
"P-192": 4,
"P-224": 12,
"P-256": 2
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 128/192/256": 1,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1,
"AES128": 1,
"AES192": 1,
"AES256": 1,
"HMAC-SHA-1": 4,
"PKCS 1": 4,
"PKCS#1": 4,
"SHA-1": 14,
"SHA-1, 256": 2,
"SHA-2": 2,
"SHA-3": 6,
"SHA-3-224": 1,
"SHA-3-256": 1,
"SHA2-224": 14,
"SHA2-256": 5,
"SHA2-512": 1,
"SHA3-224": 4
}
},
"fips_security_level": {
"Level": {
"Level 1": 4
}
},
"hash_function": {
"Keccak": {
"Keccak": 1
},
"PBKDF": {
"PBKDF": 1,
"PBKDF2": 4
},
"SHA": {
"SHA1": {
"SHA-1": 16
},
"SHA2": {
"SHA-2": 4
},
"SHA3": {
"SHA-3": 6,
"SHA-3-224": 1,
"SHA-3-256": 1,
"SHA3-224": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"X25519": 10,
"X448": 10
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 21
}
},
"side_channel_analysis": {
"SCA": {
"side-channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 140-2": 22,
"FIPS 180-4": 2,
"FIPS 186-4": 6,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS 202": 2
},
"NIST": {
"NIST SP 800-133": 1,
"NIST SP 800-38D": 2,
"SP 800-108": 2,
"SP 800-132": 3,
"SP 800-135": 4,
"SP 800-185": 1,
"SP 800-38A": 2,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 2,
"SP 800-38E": 1,
"SP 800-38F": 2,
"SP 800-90": 2
},
"PKCS": {
"PKCS 1": 2,
"PKCS#1": 2
},
"RFC": {
"RFC 5246": 1,
"RFC 5288": 2,
"RFC 8446": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 31,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1,
"AES128": 1,
"AES192": 1,
"AES256": 1
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 5,
"Triple-DES": 7
}
},
"constructions": {
"MAC": {
"CMAC": 12,
"HMAC": 13,
"KMAC": 5
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Broadcom": {
"Broadcom": 48
},
"Cisco": {
"Cisco": 1
},
"Microsoft": {
"Microsoft": 1,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Aniket Ingle",
"/CreationDate": "D:20241127114302-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20241127114302-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 890744,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"https://www.openssl.org/source/openssl-3.0.8.tar.gz",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf",
"https://datatracker.ietf.org/doc/html/rfc5288",
"https://datatracker.ietf.org/doc/html/rfc8446",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf",
"http://csrc.nist.gov/groups/STM/cmvp/index.html",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf",
"https://www.openssl.org/docs/manmaster/man1/openssl-fipsinstall.html",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
"https://www.broadcom.com/",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
"https://csrc.nist.gov/csrc/media/publications/fips/197/final/documents/fips-197.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
"https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-38b.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf",
"https://csrc.nist.gov/csrc/media/publications/fips/198/1/final/documents/fips-198-1_final.pdf",
"https://www.rfc-editor.org/info/rfc3447"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 43
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "64328481d4f4df1261734263df295ce1f71ff0a1d2c9ec3a7615f3e234c2e0fa",
"policy_txt_hash": "a741e3575425bc48715104bac0809f2d254939d16d32d0bf02941d8973e3ec0f"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys.",
"certificate_pdf_url": null,
"date_sunset": "2026-09-21",
"description": "The VMware\u2019s OpenSSL FIPS Provider is a software library providing a C-language application program interface (API) for use by applications that require cryptographic functionality.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Design Assurance: Level 3"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "VMware\u2019s OpenSSL FIPS Provider",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "active",
"sw_versions": "3.0.8",
"tested_conf": [
"Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
"Amazon Linux 2 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
"CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
"CentOS 7.9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
"PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
"PhotonOS 4.0 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
"RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
"RHEL 9 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
"SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
"SD-WAN OS 5.1 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
"Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
"Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
"Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
"Ubuntu 20.04 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA",
"Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 with PAA",
"Windows Server 2022 on ESXi 8.0 running on Dell PowerEdge Server R650 with Intel Xean Gold 6330 without PAA (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-11-04",
"lab": "ACUMEN SECURITY, LLC",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-12-05",
"lab": "ACUMEN SECURITY, LLC",
"validation_type": "Update"
}
],
"vendor": "Broadcom, Inc",
"vendor_url": "http://www.broadcom.com"
}
}