Module Name
D2iQ BoringCrypto Cryptographic Security Module
Validation Dates
08/19/2020;11/25/2020;12/09/2020
Caveat
When installed, initialized and configured as specified in Section 12.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
D2iQ BoringCrypto Cryptographic Security Module is a general-purpose cryptographic library to serve BoringSSL and other user-space applications.
Tested Configuration(s)
- Debian Linux 4.9.0 running on Intel Xeon E5-2680 with PAA (clang Compiler Version 6.0.1)
- Debian Linux 4.9.0 running on Intel Xeon E5-2680 without PAA (clang Compiler Version 6.0.1)
- Red Hat Enterprise Linux 7 running on a Dell PowerEdge R740 with Intel® Xeon® Platinum 8156 with PAA (gcc Compiler version 4.8.5)
- Red Hat Enterprise Linux 8 running on a Dell PowerEdge R740 with Intel® Xeon® Platinum 8156 with PAA (gcc Compiler version 8.3.1)
- Ubuntu Linux 18.04 running on POWER9 with PAA (clang Compiler Version 6.0.1)
- Ubuntu Linux 18.04 running on POWER9 without PAA (clang Compiler Version 6.0.1) (single-user mode)
Allowed Algorithms
EC Diffie-Hellman (CVL Certs. #2033, #C1867 and CVL Certs. #2035, #C1867; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
66005f41fbc3529ffe8d007708756720529da20d