The security policies for the FIPS 140 providers on an Oracle Solaris system document the module specifications and interfaces and provide a complete list of cryptographic mechanisms that are validated to run in FIPS 140 mode.
|
The following FIPS 140 standard document and Transitions document provide guidance about the FIPS 140 process and deprecated or restricted algorithms and their weaker variants:
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths