VMware's BoringCrypto Module

Certificate #4028

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 13.09.2021 , 27.03.2023 , 07.11.2024
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in Section 3.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description VMware’s BoringCrypto Module is a software library that implements and provides FIPS 140-2 Approved cryptographic functionalities to various VMware products and services.
Tested configurations
  • Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R with AES-NI
  • Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R without AES-NI
  • Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R with AES-NI
  • Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R without AES-NI
  • Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126R with AES-NI
  • Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6126R without AES-Ni
  • Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R with AES-NI
  • Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R without AES-NI
  • Photon OS 3.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel® Xeon Gold 6330 with AES-NI
  • Photon OS 3.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel® Xeon Gold 6330 without AES-NI
  • Photon OS 4.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R with AES-NI
  • Photon OS 4.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R without AES-NI
  • Photon OS 4.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel® Xeon Gold 6330 with AES-NI
  • Photon OS 4.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel® Xeon Gold 6330 without AES-NI
  • Red Hat Enterprise Linux 7.9 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R with AES-NI
  • Red Hat Enterprise Linux 7.9 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R without AES-NI
  • Red Hat Enterprise Linux 8.2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R with AES-NI
  • Red Hat Enterprise Linux 8.2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R without AES-NI
  • Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R with AES-NI
  • Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R without AES-NI
  • Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R with AES-NI
  • Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R without AES-NI
  • Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge R650 with Intel® Xeon Gold 6330 with AES-NI
  • Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge R650 with Intel® Xeon Gold 6330 without AES-NI
  • Ubuntu 20.04 running on Dell PowerEdge R740 with Intel® Core i5 with AES-NI
  • Ubuntu 20.04 running on Dell PowerEdge R740 with Intel® Core i5 without AES-NI (single-user mode)
  • Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel® Xeon Gold 6126R with AES-NI
  • Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel® Xeon Gold 6126R without AES-NI
  • Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R with AES-NI
  • Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel® Xeon Gold 6230R without AES-NI
  • Within ESXi 8.0 (as a host) running on Dell PowerEdge R650 with Intel® Xeon Gold 6330 with AES-NI
Vendor VMware, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES-256, AES, AES-, DES, Triple-DES, TDES, HMAC, CBC-MAC, CMAC
Asymmetric Algorithms
ECDSA, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-512, SHA-256, SHA-2, MD4, MD5
Schemes
MAC, Key Agreement
Protocols
TLS
Randomness
PRNG, DRBG, RNG
Libraries
BoringSSL
Elliptic Curves
P-256
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM

Vendor
Cisco

Security level
Level 1

Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 180-4, FIPS 198-1, SP 800-133, SP 800-67, SP 800-38A, SP 800-38F, SP 800-38D, SP 800-135, SP 800-56B, SP 800-90A

File metadata

Title Security Policy
Subject FIPS 140-2 Security Policy Template
Author Manoj Maskara
Creation date D:20221207173557+05'30'
Modification date D:20221207173557+05'30'
Pages 26
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4028,
  "dgst": "85ffd4a387c73261",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC#A1231",
        "ECDSA#A1231",
        "KTS#A1231",
        "SHS#A1231",
        "CVL#A1231",
        "DRBG#A1231",
        "RSA#A1231",
        "AES#A1231",
        "Triple-DES#A1231"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 17
          }
        },
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 3
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 1
        },
        "CFB": {
          "CFB": 4
        },
        "CTR": {
          "CTR": 4
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 2
        },
        "OFB": {
          "OFB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 2
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 8
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 4
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES key 128, 192": 1,
          "AES-256": 1,
          "HMAC SHA-1": 1,
          "HMAC SHA-512": 1,
          "RSA2": 1,
          "SHA-1": 4,
          "SHA-2 (224": 3,
          "SHA-256": 3,
          "SHA-512": 3
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 3
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-2": 3,
            "SHA-256": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 6,
          "PRNG": 1
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 15,
          "FIPS 180-4": 1,
          "FIPS 186-4": 4,
          "FIPS 197": 1,
          "FIPS 198-1": 1
        },
        "NIST": {
          "SP 800-133": 2,
          "SP 800-135": 2,
          "SP 800-38A": 1,
          "SP 800-38D": 1,
          "SP 800-38F": 1,
          "SP 800-56B": 1,
          "SP 800-67": 1,
          "SP 800-90A": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13,
            "AES-": 1,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2,
            "Triple-DES": 12
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "CMAC": 1,
            "HMAC": 7
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Manoj Maskara",
      "/CreationDate": "D:20221207173557+05\u002730\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20221207173557+05\u002730\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Subject": "FIPS 140-2 Security Policy Template",
      "/Title": "Security Policy",
      "pdf_file_size_bytes": 907047,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Validated-Modules/Search",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "adcfda28e8a39f32d1e5010e7646bd7e05eb53cc852cfa6aee64dbbb8e687079",
    "policy_txt_hash": "ed3ad7b9127133aaa302c64346e620c6cc58abea1ef1a70c6ae00385bf578030"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in Section 3.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2021_011021_0714_Signed2.pdf",
    "date_sunset": null,
    "description": "VMware\u2019s BoringCrypto Module is a software library that implements and provides FIPS 140-2 Approved cryptographic functionalities to various VMware products and services.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "VMware\u0027s BoringCrypto Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "3.0",
    "tested_conf": [
      "Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
      "Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
      "Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
      "Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
      "Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126R with AES-NI",
      "Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126R without AES-Ni",
      "Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
      "Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
      "Photon OS 3.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 with AES-NI",
      "Photon OS 3.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 without AES-NI",
      "Photon OS 4.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
      "Photon OS 4.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
      "Photon OS 4.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 with AES-NI",
      "Photon OS 4.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 without AES-NI",
      "Red Hat Enterprise Linux 7.9 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
      "Red Hat Enterprise Linux 7.9 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
      "Red Hat Enterprise Linux 8.2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
      "Red Hat Enterprise Linux 8.2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
      "Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
      "Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
      "Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
      "Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
      "Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 with AES-NI",
      "Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 without AES-NI",
      "Ubuntu 20.04 running on Dell PowerEdge R740 with Intel\u00ae Core i5 with AES-NI",
      "Ubuntu 20.04 running on Dell PowerEdge R740 with Intel\u00ae Core i5 without AES-NI (single-user mode)",
      "Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126R with AES-NI",
      "Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126R without AES-NI",
      "Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
      "Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
      "Within ESXi 8.0 (as a host) running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 with AES-NI"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-09-13",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-03-27",
        "lab": "Acumen Security",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2024-11-07",
        "lab": "Acumen Security",
        "validation_type": "Update"
      }
    ],
    "vendor": "VMware, Inc.",
    "vendor_url": "https://www.vmware.com"
  }
}