This is an archive
(replace .gov by .rip)

Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.
Version
1.0.1
Type
SOFTWARE
Vendor
Ixia, a Keysight Business
8310 N Capital of Texas Hwy
Austin, TX 78731
United States
Contacts
Fred Strelzoff
fred.strelzoff@keysight.com
(512) 600-5400

HMAC 3915 Expand All First Validated: 11/9/2018

Operating Environment Algorithm Capabilities
Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA-1 Expand
Linux 4.12.0 on Intel Core i7-3555LE Expand
    HMAC-SHA-1 Expand
    Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA2-224 Expand
    Linux 4.12.0 on Intel Core i7-3555LE Expand
      HMAC-SHA2-224 Expand
      Linux 4.12.0 on Intel Core i7-3555LE Expand
        HMAC-SHA2-256 Expand
        Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA2-256 Expand
        Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA2-384 Expand
        Linux 4.12.0 on Intel Core i7-3555LE Expand
          HMAC-SHA2-384 Expand
          Linux 4.12.0 on Intel Core i7-3555LE Expand
            HMAC-SHA2-512 Expand
            Linux 4.12.0 on Intel Core i7-3555LE HMAC-SHA2-512 Expand
            Linux 4.12.0 on Intel Core i7-3555LE Expand
              HMAC-SHA2-512/224 Expand
              Linux 4.12.0 on Intel Core i7-3555LE Expand
                HMAC-SHA2-512/256 Expand

                Created October 05, 2016, Updated November 24, 2020