This page was not yet optimized for use on mobile
devices.
VMware's BoringCrypto Module
Certificate #3846
Webpage information
Security policy
Symmetric Algorithms
AES, DES, Triple-DES, TDES, HMAC, CBC-MAC, CMACAsymmetric Algorithms
ECDSA, DSAHash functions
SHA-1, SHA-512, SHA-256, SHA-2, MD4, MD5Schemes
MACProtocols
TLSRandomness
PRNG, DRBG, RNGLibraries
OpenSSL, BoringSSLElliptic Curves
P-256Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCMVendor
CiscoSecurity level
Level 1Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 180-4, FIPS 198-1, SP 800-67, SP 800-38A, SP 800-38F, SP 800-38D, SP 800-56B, SP 800-90A, SP 800-133File metadata
| Title | Security Policy |
|---|---|
| Subject | FIPS 140-2 Security Policy Template |
| Author | Manoj Maskara |
| Creation date | D:20201214180942-05'00' |
| Modification date | D:20201214180942-05'00' |
| Pages | 24 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3846,
"dgst": "a1a5242f44256747",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"Triple-DES#C2129",
"RSA#C2129",
"ECDSA#C2129",
"DRBG#C2129",
"CVL#C2129",
"KTS#C2129",
"AES#C2129",
"SHS#C2129",
"HMAC#C2129"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 17
}
},
"FF": {
"DSA": {
"DSA": 1
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 1
},
"CFB": {
"CFB": 4
},
"CTR": {
"CTR": 4
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 5
},
"OFB": {
"OFB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"BoringSSL": {
"BoringSSL": 2
},
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 4
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES key 128, 192": 1,
"HMAC SHA-1": 1,
"HMAC SHA-512": 1,
"RSA2": 1,
"SHA-1": 4,
"SHA-2 (224": 2,
"SHA-256": 3,
"SHA-512": 3
}
},
"fips_security_level": {
"Level": {
"Level 1": 3
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 2
},
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-2": 2,
"SHA-256": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 6,
"PRNG": 1
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 15,
"FIPS 180-4": 1,
"FIPS 186-4": 4,
"FIPS 197": 1,
"FIPS 198-1": 1
},
"NIST": {
"SP 800-133": 1,
"SP 800-38A": 1,
"SP 800-38D": 1,
"SP 800-38F": 1,
"SP 800-56B": 1,
"SP 800-67": 1,
"SP 800-90A": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 13
}
},
"DES": {
"3DES": {
"TDES": 2,
"Triple-DES": 12
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 1,
"HMAC": 7
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Manoj Maskara",
"/CreationDate": "D:20201214180942-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20201214180942-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "FIPS 140-2 Security Policy Template",
"/Title": "Security Policy",
"pdf_file_size_bytes": 870767,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://github.com/ninja-build/ninja/releases",
"mailto:[email protected]",
"https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Validated-Modules/Search",
"https://commondatastorage.googleapis.com/chromium-boringssl-docs/fips/boringssl-24e5886c0edfc409c8083d10f9f1120111efd6f5.tar.xz",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "59e6e36a27415828681074ecba231aa5f2cfdf358915f03f419b79bfc9d5ce64",
"policy_txt_hash": "db2a7d58d31dde273aa0456efef97192d57b8cb2d573939e5be56e884027bf25"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in Section 3.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/March 2021_010421_0724_signed.pdf",
"date_sunset": null,
"description": "VMware\u2019s BoringCrypto Module is a versatile software library that implements FIPS 140-2 Approved cryptographic services for VMware products and platforms.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "VMware\u0027s BoringCrypto Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "1.0",
"tested_conf": [
"Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
"Amazon Linux 2 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
"Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
"Photon OS 2.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
"Photon OS 3.0 on ESXi 6.7 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
"Photon OS 3.0 on ESXi 6.7 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
"Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
"Photon OS 3.0 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
"Red Hat Enterprise Linux 7.7 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
"Red Hat Enterprise Linux 7.7 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
"Ubuntu 16.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
"Ubuntu 16.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
"Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
"Ubuntu 18.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
"Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
"Ubuntu 20.04 on ESXi 7.0 running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA",
"Ubuntu 20.04 running on Dell Latitude E7450 with Intel\u00ae Core i5 with PAA",
"Ubuntu 20.04 running on Dell Latitude E7450 with Intel\u00ae Core i5 without PAA (single-user mode)",
"Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 with PAA",
"Within ESXi 7.0 (as a host) running on Dell PowerEdge R740 with Intel\u00ae Xeon Gold 6126 without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2021-03-13",
"lab": "Acumen Security",
"validation_type": "Initial"
}
],
"vendor": "VMware, Inc.",
"vendor_url": "https://www.vmware.com"
}
}