| 4.2.2 | User Services ............................................................................................................................ | 27 |
| 4.2.3 | Wireless Client Services............................................................................................................ | 28 |
| 4.2.4 | Unauthenticated Services.......................................................................................................... | 29 |
5 | CRYPTOGRAPHIC ALGORITHMS................................................................................................ | 30 | |
6 | CRITICAL SECURITY PARAMETERS.......................................................................................... | 31 | |
7 | SELF TESTS......................................................................................................................................... | 35 |
4