Security Guide
Page 25
... performs a SHA-1 check value verification to enter the error state, where all cryptographic services and data output for the problem service is halted until the error state is maintained by the Crypto Officer to provide configuration management for document and source code...provide access control, versioning, and logging. 2.11 Mitigation of Other Attacks The modules do not employ security mechanisms to mitigate specific attacks. © Copyright 2005, 2006, 2007 Nokia Page 25 of materials, manufacturers, changes, history, and hardware documentation are logged and produce error indicators...
... performs a SHA-1 check value verification to enter the error state, where all cryptographic services and data output for the problem service is halted until the error state is maintained by the Crypto Officer to provide configuration management for document and source code...provide access control, versioning, and logging. 2.11 Mitigation of Other Attacks The modules do not employ security mechanisms to mitigate specific attacks. © Copyright 2005, 2006, 2007 Nokia Page 25 of materials, manufacturers, changes, history, and hardware documentation are logged and produce error indicators...