Reference Guide

Secure Operation of the Module 37
RSA BSAFE Crypto-J JSAFE and JCE Software Module 6.2.5 Security Policy Level 1
2.5 Operating the Cryptographic Module
Both FIPS and non-FIPS algorithms are available to the operator. In order to operate
the module in the FIPS-Approved mode, all rules and guidance provided in Secure
Operation of the Module must be followed by the module operator. The module does
not enforce the FIPS 140-2 mode of operation.