These tool are provided to aid customers with software development of systems that use secure authenticators.
They are intended to be used for verification of hardware or software cryptographic results for or from the security components integrated into the solution.