On 09/23/2013 04:16 PM, Jim Adams wrote:
> The Security Policy for the FIPS Object Module 2.0 states:
>
> 5.1 Exclusive Use of the FIPS Object Module for Cryptography
> In order for the referencing application to claim FIPS 140-2 validation,
> all cryptographic functions
&g
The Security Policy for the FIPS Object Module 2.0 states:
5.1 Exclusive Use of the FIPS Object Module for Cryptography
In order for the referencing application to claim FIPS 140-2 validation, all
cryptographic functions
utilized by the application must be provided exclusively by the FIPS Object