This page was not yet optimized for use on mobile
devices.
VMware's BoringCrypto Module
Certificate #4028
Webpage information
Security policy
Symmetric Algorithms
AES-256, AES, AES-, DES, Triple-DES, TDES, HMAC, CBC-MAC, CMACAsymmetric Algorithms
ECDSA, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-512, SHA-256, SHA-2, MD4, MD5Schemes
MAC, Key AgreementProtocols
TLSRandomness
PRNG, DRBG, RNGLibraries
BoringSSLElliptic Curves
P-256Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCMVendor
CiscoSecurity level
Level 1Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 180-4, FIPS 198-1, SP 800-133, SP 800-67, SP 800-38A, SP 800-38F, SP 800-38D, SP 800-135, SP 800-56B, SP 800-90AFile metadata
| Title | Security Policy |
|---|---|
| Subject | FIPS 140-2 Security Policy Template |
| Author | Manoj Maskara |
| Creation date | D:20221207173557+05'30' |
| Modification date | D:20221207173557+05'30' |
| Pages | 26 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4028,
"dgst": "85ffd4a387c73261",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"HMAC#A1231",
"ECDSA#A1231",
"KTS#A1231",
"SHS#A1231",
"CVL#A1231",
"DRBG#A1231",
"RSA#A1231",
"AES#A1231",
"Triple-DES#A1231"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 17
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 1
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 1
},
"CFB": {
"CFB": 4
},
"CTR": {
"CTR": 4
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 2
},
"OFB": {
"OFB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"BoringSSL": {
"BoringSSL": 2
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 8
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 4
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES key 128, 192": 1,
"AES-256": 1,
"HMAC SHA-1": 1,
"HMAC SHA-512": 1,
"RSA2": 1,
"SHA-1": 4,
"SHA-2 (224": 3,
"SHA-256": 3,
"SHA-512": 3
}
},
"fips_security_level": {
"Level": {
"Level 1": 3
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 2
},
"MD5": {
"MD5": 3
}
},
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-2": 3,
"SHA-256": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 6,
"PRNG": 1
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 15,
"FIPS 180-4": 1,
"FIPS 186-4": 4,
"FIPS 197": 1,
"FIPS 198-1": 1
},
"NIST": {
"SP 800-133": 2,
"SP 800-135": 2,
"SP 800-38A": 1,
"SP 800-38D": 1,
"SP 800-38F": 1,
"SP 800-56B": 1,
"SP 800-67": 1,
"SP 800-90A": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 13,
"AES-": 1,
"AES-256": 1
}
},
"DES": {
"3DES": {
"TDES": 2,
"Triple-DES": 12
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 1,
"HMAC": 7
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Manoj Maskara",
"/CreationDate": "D:20221207173557+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20221207173557+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "FIPS 140-2 Security Policy Template",
"/Title": "Security Policy",
"pdf_file_size_bytes": 907047,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Validated-Modules/Search",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "adcfda28e8a39f32d1e5010e7646bd7e05eb53cc852cfa6aee64dbbb8e687079",
"policy_txt_hash": "ed3ad7b9127133aaa302c64346e620c6cc58abea1ef1a70c6ae00385bf578030"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in Section 3.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2021_011021_0714_Signed2.pdf",
"date_sunset": null,
"description": "VMware\u2019s BoringCrypto Module is a software library that implements and provides FIPS 140-2 Approved cryptographic functionalities to various VMware products and services.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "VMware\u0027s BoringCrypto Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "3.0",
"tested_conf": [
"Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
"Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
"Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
"Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
"Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126R with AES-NI",
"Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126R without AES-Ni",
"Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
"Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
"Photon OS 3.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 with AES-NI",
"Photon OS 3.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 without AES-NI",
"Photon OS 4.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
"Photon OS 4.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
"Photon OS 4.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 with AES-NI",
"Photon OS 4.0 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 without AES-NI",
"Red Hat Enterprise Linux 7.9 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
"Red Hat Enterprise Linux 7.9 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
"Red Hat Enterprise Linux 8.2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
"Red Hat Enterprise Linux 8.2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
"Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
"Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
"Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
"Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
"Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 with AES-NI",
"Ubuntu 20.04 on ESXi 8.0 running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 without AES-NI",
"Ubuntu 20.04 running on Dell PowerEdge R740 with Intel\u00ae Core i5 with AES-NI",
"Ubuntu 20.04 running on Dell PowerEdge R740 with Intel\u00ae Core i5 without AES-NI (single-user mode)",
"Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126R with AES-NI",
"Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126R without AES-NI",
"Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R with AES-NI",
"Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6230R without AES-NI",
"Within ESXi 8.0 (as a host) running on Dell PowerEdge R650 with Intel\u00ae Xeon Gold 6330 with AES-NI"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2021-09-13",
"lab": "Acumen Security",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2023-03-27",
"lab": "Acumen Security",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-11-07",
"lab": "Acumen Security",
"validation_type": "Update"
}
],
"vendor": "VMware, Inc.",
"vendor_url": "https://www.vmware.com"
}
}