2016 Symantec Corporation This document may be freely reproduced & distributed whole & intact including this copyright
notice.
43
The module implements the following critical function tests:
•
Adding additional entropy to non-deterministic RNG (NDRNG)
•
DRBG Instantiate Critical Function Test
•
DRBG Generate Critical Function Test
•
DRBG Uninstantiate Critical Function Test
•
DRBG Reseed Critical Function Test
If the critical function test fails, the appliance will enter the error state, and an
error message is output to the system log file and to the front panel LCD.
In the event that the system enters an error state, Crypto Officer attention is
required to clear the error state.
2.10 Design Assurance
Symantec uses Git for software configuration management, Cmake and Jenkins for
build management, and Perforce and Agile for documentation version control.
The product is developed primarily in the high level programming languages
C++, C, and Python. Assembly code is used for select performance enhancements.
The module is securely delivered from Symantec to customers via the mechanism
specified by the customer. FedEx, UPS, or any other freight forwarder of their
choice can be utilized.
2.11 Mitigation of Other Attacks
The module does not claim to mitigate any attacks beyond those defined in the
FIPS 140-2 Level 2 requirements.