background image
6
Crypto-J Cryptographic Toolkit
RSA BSAFE Crypto-J 4.1 Security Policy
­
Red Hat® Enterprise Linux AS 4.0, x86 (32-bit), Sun JRE 5.0/6.0,
IBM JRE 5.0, JRockit 5.0/6.0
­
Red Hat Enterprise Linux AS 4.0, x86 (64-bit), Sun JRE 5.0/6.0,
JRockit 5.0/6.0
­
Red Hat Enterprise Linux AS 5.0, x86 (32-bit), Sun JRE 5.0/6.0,
IBM JRE 5.0, JRockit 5.0/6.0
­
Red Hat Enterprise Linux AS 5.0, x86 (64-bit), Sun JRE 5.0/6.0,
JRockit 5.0/6.0
­
Novell® SUSE® Linux Enterprise Server 9, x86 (32-bit), Sun JRE 5.0/6.0
­
Novell SUSE Linux Enterprise Server 9, x86 (64-bit), Sun JRE 5.0/6.0
­
Novell SUSE Linux Enterprise Server 10, x86 (32-bit), Sun JRE 5.0/6.0
­
Novell SUSE Linux Enterprise Server 10, x86 (64-bit), Sun JRE 5.0/6.0.
·
HP
­
HP-UX 11.23, Itanium 2 (32-bit), HP JRE 5.0/6.0
­
HP-UX 11.23, Itanium 2 (64-bit), HP JRE 5.0/6.0
­
HP-UX 11.31, Itanium 2 (32-bit), HP JRE 5.0/6.0
­
HP-UX 11.31, Itanium 2 (64-bit), HP JRE 5.0/6.0.
·
IBM
­
AIX 5LTM v5.3, Power PC® (32-bit), IBM JRE 5.0/6.0
­
AIX 5L v5.3, Power PC (64-bit), IBM JRE 5.0/6.0
­
AIX 5L v6.1, Power PC (32-bit), IBM JRE 5.0/6.0
­
AIX 5L v6.1, Power PC (64-bit), IBM JRE 5.0/6.0.
For a resolution on the issue of multi-user modes, see the NIST document
Implementation Guidance for FIPS PUB 140-2 and the
Cryptographic Module Validation Program.