U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

Cryptographic Module Validation Program CMVP

Certificate #2969

Details

Module Name
McAfee OpenSSL FIPS Object Module
Standard
FIPS 140-2
Status
Active
Sunset Date
7/24/2022
Validation Dates
07/25/2017;11/16/2017;07/28/2021
Overall Level
1
Caveat
When operated in FIPS mode. When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys.
Security Level Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Module Type
Software
Embodiment
Multi-Chip Stand Alone
Description
The McAfee OpenSSL FIPS module provides cryptographic services for McAfee products.
Tested Configuration(s)
  • Darwin 10.15.7 (MacOS) on ESXi 6.7.0 running on MacBook Pro 13 with Intel® Xeon® CPU E5-1680 with PAA (clang-1200.0.32.29)
  • Darwin 10.15.7 (MacOS) on ESXi 6.7.0 running on MacBook Pro 13 with Intel® Xeon® CPU E5-1680 without PAA (clang-1200.0.32.29)(single-user mode)
  • Linux 3.10 on VMware ESXi 5.5 running on Intel Xeon (gcc Compiler Version 4.8.5)
  • McAfee Linux Operating System v3.8.0 running on Dell PowerEdge 610 with Intel® Xeon® CPU X5560 with PAA (gcc 4.8.5)
  • SUSE Enterprise 12 SP3 on VMware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel® Xeon® CPU E5-2699 with PAA (gcc 7.5.0)
  • Ubuntu Server 16.04 on VMware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel® Xeon® CPU E5-2699 with PAA (gcc 10.2.0)
  • Windows 10 32-bit on VMware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel® Xeon® CPU E5-2699 without PAA (Microsoft Visual Studio Professional 2017 15.8.5)
  • Windows Server 2019 H2 64-bit on VMware ESXi 6.7.0 running on Intel Taylor Pass 2U Xeon DP Quad Board Server with Intel® Xeon® CPU E5-2699 without PAA (Microsoft Visual Studio Professional 2017 15.8.5)
FIPS Algorithms
AES Certs. #4511 and #A848
CKG vendor affirmed
CVL Certs. #1197 and #A848
DRBG Certs. #1474 and #A848
DSA Certs. #1201 and #A848
ECDSA Certs. #1097 and #A848
HMAC Certs. #2980 and #A848
RSA Certs. #2459 and #A848
SHS Certs. #3699 and #A848
Triple-DES Certs. #2408 and #A848
Allowed Algorithms
EC Diffie-Hellman (CVL Certs. #1197 and #A848, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 270 bits of encryption strength)
Software Versions
1.0.1 or 1.0.2

Vendor

McAfee LLC
2200 Mission College Blvd.
Santa Clara, CA 95054
USA

Product Certifications
sec_certs@mcafee.com
Phone: N/A

Lab

ACUMEN SECURITY, LLC
NVLAP Code: 201029-0