* Does the IUT support authorization using butterfly key expansion mechanism?
*/
moduleparbooleanPICS_SEC_BFK_AUTH:=false;
/**
* @desc Different set of parameters is used to generate the butterfly signing key associated with a certificate and the cocoon encryption key used to encrypt the certificate on issuance