VMware BC-FJA (Bouncy Castle FIPS Java API)

Certificate #3185

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 23.05.2018 , 12.10.2018
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Physical Security: N/A
Description The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).
Tested configurations
  • Java SE Runtime Environment v8 (1.8.0) on BLUX 4.9 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on BLUX 4.9 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 10 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 10 on VMWare ESXi 6.5 running on Dell PowerEdge T620 (single-user mode)Java SE Runtime Environment v8 (1.8.0) on PhotonOS 1.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 7 (32-bit) on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 7 (32-bit) on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2008 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2008 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2012 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2012 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2016 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2016 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on PhotonOS 1.0 on ESXi 6.7 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on PhotonOS 1.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on PhotonOS 2.0 on ESXi 6.7 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on PhotonOS 2.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on PhotonOS 2.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on SLES 12 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on SLES 12 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Ubuntu 16.04 on ESXi 6.7 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Ubuntu 16.04 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Ubuntu 16.04 on VMWare ESXi 6.5 running on Dell PowerEdge T620
  • Java SE Runtime Environment v8 (1.8.0) on Windows Server 2016 on ESXi 6.7 running on Dell PowerEdge T620 (single-user mode)
Vendor VMware, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, Twofish, Serpent, CAST5, RC4, RC2, DES, Triple-DES, TDEA, TDES, IDEA, Blowfish, Camellia, SEED, HMAC, HMAC-SHA-256, CMAC, CBC-MAC
Asymmetric Algorithms
RSA 2048, RSA-OAEP, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, SHA-3, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, MD5, RIPEMD128, RIPEMD256, RIPEMD, PBKDF
Schemes
MAC, Key Agreement
Protocols
SSH, TLS, TLS 1.2, IKEv2
Randomness
PRNG, DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-224, P-256, P-384, P-521, K-233, K-283, K-409, K-571, B-233, B-283, B-409, B-571
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM

Trusted Execution Environments
SE
Vendor
Microsoft, Cisco

Security level
Level 1
Side-channel analysis
timing attacks, timing attack

Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 186-2, FIPS 180-4, FIPS 202, FIPS 186-3, FIPS PUB 140-2, SP 800-108, SP 800-56A, SP 800-38A, SP 800-38C, SP 800-38B, SP 800-38D, SP 800-90A, SP 800-135, SP 800-38F, SP 800-67, SP 800-132, SP 800-56B, SP 800-56C, SP 800-89, PKCS #1, PKCS1, PKCS#12, PKCS#5, PKCS#1

File metadata

Title Security Policy
Subject FIPS 140-2 Security Policy Template
Author Manoj Maskara
Creation date D:20180817170520-07'00'
Modification date D:20180817170520-07'00'
Pages 32
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3185,
  "dgst": "69faa6aa09a3c744",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "DRBG#2076",
        "ECDSA#1415",
        "CVL#1833",
        "DSA#1386",
        "SHA-3#42",
        "KBKDF#194",
        "KTS#2709",
        "RSA#2870",
        "SHS#4307",
        "AES#5365",
        "CVL#1832",
        "CVL#1831",
        "HMAC#3553",
        "Triple-DES#2709"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 12
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "Diffie-Hellman": 6
          },
          "DSA": {
            "DSA": 15
          }
        },
        "RSA": {
          "RSA 2048": 1,
          "RSA-OAEP": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 6
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 9
        },
        "OFB": {
          "OFB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKEv2": 5
        },
        "SSH": {
          "SSH": 5
        },
        "TLS": {
          "TLS": {
            "TLS": 14,
            "TLS 1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 4
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-233": 1,
          "B-283": 1,
          "B-409": 1,
          "B-571": 1,
          "K-233": 1,
          "K-283": 1,
          "K-409": 1,
          "K-571": 1,
          "P-224": 2,
          "P-256": 4,
          "P-384": 2,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1,
          "#1831": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "Cert # AES": 1,
          "DSA6": 1,
          "HMAC SHA-512/224": 1,
          "HMAC-SHA-256": 2,
          "HMAC-SHA256": 2,
          "PKCS #1": 2,
          "PKCS#1": 4,
          "PKCS#12": 4,
          "PKCS#5": 4,
          "PKCS1": 2,
          "RSA 2048": 1,
          "SHA-1": 9,
          "SHA-2": 2,
          "SHA-224": 6,
          "SHA-256": 6,
          "SHA-3": 3,
          "SHA-384": 6,
          "SHA-512": 5,
          "SHA-512 194": 1,
          "SHA3-224": 2,
          "SHA3-256": 2,
          "SHA3-384": 2,
          "SHA3-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 5
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        },
        "PBKDF": {
          "PBKDF": 14
        },
        "RIPEMD": {
          "RIPEMD": 1,
          "RIPEMD128": 1,
          "RIPEMD256": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 9
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 6,
            "SHA-256": 6,
            "SHA-384": 6,
            "SHA-512": 6
          },
          "SHA3": {
            "SHA-3": 3,
            "SHA3-224": 2,
            "SHA3-256": 2,
            "SHA3-384": 2,
            "SHA3-512": 2
          }
        },
        "SHAKE": {
          "SHAKE128": 2,
          "SHAKE256": 2
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19,
          "PRNG": 1
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "timing attack": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 17,
          "FIPS 180-4": 2,
          "FIPS 186-2": 1,
          "FIPS 186-3": 1,
          "FIPS 186-4": 10,
          "FIPS 197": 2,
          "FIPS 198-1": 3,
          "FIPS 202": 2,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "SP 800-108": 6,
          "SP 800-132": 5,
          "SP 800-135": 7,
          "SP 800-38A": 5,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 5,
          "SP 800-38F": 6,
          "SP 800-56A": 4,
          "SP 800-56B": 7,
          "SP 800-56C": 3,
          "SP 800-67": 5,
          "SP 800-89": 1,
          "SP 800-90A": 3
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 2,
          "PKCS#12": 2,
          "PKCS#5": 2,
          "PKCS1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 30
          },
          "CAST": {
            "CAST5": 1
          },
          "RC": {
            "RC2": 1,
            "RC4": 1
          },
          "Serpent": {
            "Serpent": 1
          },
          "Twofish": {
            "Twofish": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 7,
            "TDES": 1,
            "Triple-DES": 24
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "CMAC": 5,
            "HMAC": 11,
            "HMAC-SHA-256": 1
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 1
          },
          "Camellia": {
            "Camellia": 1
          },
          "IDEA": {
            "IDEA": 1
          },
          "SEED": {
            "SEED": 1
          }
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 18
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 2
        },
        "Microsoft": {
          "Microsoft": 9
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Manoj Maskara",
      "/CreationDate": "D:20180817170520-07\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20180817170520-07\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "FIPS 140-2 Security Policy Template",
      "/Title": "Security Policy",
      "pdf_file_size_bytes": 993794,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://csrc.nist.gov/groups/STM/cavp/documents/des/tripledesnewval.html#2090",
          "http://www.vmware.com/",
          "http://csrc.nist.gov/groups/STM/cavp/documents/components/componentnewval.html#704",
          "https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Validated-Modules/Search",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program",
          "http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgnewval.html#1031"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 32
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "564e421401a1654916e00cf487183d9c809947a744e1e02972061acc15f00188",
    "policy_txt_hash": "0be0eab1272634896b39928bfb2bbea021b0909edf1e7c9592c37f31b3d0c58d"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May2018consolidated.pdf",
    "date_sunset": null,
    "description": "The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "VMware BC-FJA (Bouncy Castle FIPS Java API)",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.0.0",
    "tested_conf": [
      "Java SE Runtime Environment v8 (1.8.0) on BLUX 4.9 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on BLUX 4.9 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 10 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 10 on VMWare ESXi 6.5 running on Dell PowerEdge T620 (single-user mode)Java SE Runtime Environment v8 (1.8.0) on PhotonOS 1.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 7 (32-bit) on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows 7 (32-bit) on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2008 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2008 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2012 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2012 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2016 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Microsoft Windows Server 2016 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on PhotonOS 1.0 on ESXi 6.7 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on PhotonOS 1.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on PhotonOS 2.0 on ESXi 6.7 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on PhotonOS 2.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on PhotonOS 2.0 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on SLES 12 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on SLES 12 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Ubuntu 16.04 on ESXi 6.7 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Ubuntu 16.04 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Ubuntu 16.04 on VMWare ESXi 6.5 running on Dell PowerEdge T620",
      "Java SE Runtime Environment v8 (1.8.0) on Windows Server 2016 on ESXi 6.7 running on Dell PowerEdge T620 (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-05-23",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-10-12",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Update"
      }
    ],
    "vendor": "VMware, Inc.",
    "vendor_url": "http://www.vmware.com"
  }
}