Lines Matching full:trust
9 of a Trust Source for greater security, while Encrypted Keys can be used on any
14 Trust Source
17 A trust source provides the source of security for Trusted Keys. This
18 section lists currently supported trust sources, along with their security
19 considerations. Whether or not a trust source is sufficiently safe depends
22 environment is, and there is no metric of trust, it is dependent on the
23 consumer of the Trusted Keys to determine if the trust source is sufficiently
26 * Root of trust for storage
31 provides crypto operation to establish root of trust for storage.
41 mode, trust is rooted to the OTPMK, a never-disclosed 256-bit key
99 The strength and appropriateness of a particular trust source for a given
112 trust source. The random number generator in use differs according to the
113 selected trust source:
138 Encrypted keys do not depend on a trust source, and are faster, as they use AES