HP-UX Kernel Cryptographic Module 2.
© Copyright 2013, 2014 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. The information contained herein is subject to change without notice.
Contents HP secure development lifecycle......................................................................4 1 HP-UX Kernel Cryptographic Module 2.0 Release Notes .................................5 Announcements........................................................................................................................5 What is new in this version........................................................................................................5 Compatibility matrix and installation......
HP secure development lifecycle Starting with HP-UX 11i v3 March 2013 update release, HP secure development lifecycle provides the ability to authenticate HP-UX software. Software delivered through this release has been digitally signed using HP's private key. You can now verify the authenticity of the software before installing the products, delivered through this release. To verify the software signatures in signed depot, the following products must be installed on your system: • B.11.31.
1 HP-UX Kernel Cryptographic Module 2.0 Release Notes Announcements HP-UX KCM is a common cryptographic library in HP-UX Kernel. It is a library of core cryptographic algorithms, which are used by HP-UX Kernel products. HP-UX KCM is available on HP-UX Kernel as a dynamically loadable library with well-defined interfaces to invoke the crypto functions. This helps to bring modularity and standardization in the usage of crypto algorithms across the HP-UX kernel products.
◦ Asymmetric key algorithm – ◦ Random Number Generation – • NIST SP 800-90A compliant DRBG The following algorithms are implemented for continued supportability and maintainability of the existing products ◦ Digest algorithm – ◦ ◦ ◦ SHA-1 Keyed hash algorithm – • RSA-2048 HMAC-SHA-1 Symmetric Key algorithm – AES-128 in CFB Mode – AES-192 CFB – AES 256 CFB Asymmetric key algorithm – RSA-1024 – RSA-1536 The interfaces supported by the library follows RSA Security Inc. PKCS#11 V.2.
Fixes This section describes the issues fixed in this release. QXCR1001323742: Resolves the issue related to FIPS self-integrity test failure at OS boot time. Known problems and workarounds This release of HP-UX KCM 2.0 does not contain any known problems. Localized versions of the software The HP-UX KCM 2.0 is available only in English.
2 Documentation feedback HP is committed to providing documentation that meets your needs. To help us improve the documentation, send any errors, suggestions, or comments to Documentation Feedback (docsfeedback@hp.com). Include the document title and part number, version number, or the URL when submitting your feedback.
Glossary Cipher Block Chaining (CBC) Cipher Feedback (CFB ) Deterministic Random Bit Generator (DRBG) HP-UX Kernel Cryptographic Module (HP_UX KCM) 9