The Security Policy for the FIPS Object Module 2.0 states:
5.1 Exclusive Use of the FIPS Object Module for Cryptography
In order for the referencing application to claim FIPS 140-2 validation, all
cryptographic functions
utilized by the application must be provided exclusively by the FIPS Object
On 09/23/2013 04:16 PM, Jim Adams wrote:
The Security Policy for the FIPS Object Module 2.0 states:
5.1 Exclusive Use of the FIPS Object Module for Cryptography
In order for the referencing application to claim FIPS 140-2 validation,
all cryptographic functions
utilized by the application