Reference Guide

16 The Cryptographic Module
RSA BSAFE Crypto-J JSAFE and JCE Software Module 6.2.5 Security Policy Level 1
with Level 2 Roles, Services and Authentication
Key Establishment:
KeyAgreement clearSensitiveData
clone
doPhase
getAlg
getCryptoModule
getSecret
init
Algorithms allowed for FIPS 140-2 usage
Diffie-Hellman (primitives only, provides 112 bits or 128 bits of
encryption strength)
EC Diffie-Hellman (primitives only, provides between 112 bits
and 256 bits of encryption strength)
Algorithms not allowed for FIPS 140-2 usage
None
KeyConfirmation clearSensitiveData
computeMacTag
verifyMacTag
Algorithms allowed for FIPS 140-2 usage
Diffie-Hellman (primitives only, provides 112 bits or 128 bits of
encryption strength)
EC Diffie-Hellman (primitives only, provides between 112 bits
and 256 bits of encryption strength)
Algorithms not allowed for FIPS 140-2 usage
None
Key Generation:
KeyGenerator clearSensitiveData
generate
getCryptoModule
initialize
Algorithms allowed for FIPS 140-2 usage
AES Triple-DES
Algorithms not allowed for FIPS 140-2 usage
DES
DESX
Shamir Secret Sharing
RC2
RC4
RC5
Table 5 Services Available only to the Crypto User Role (continued)
Services Available only to the Crypto User Role