Lines Matching full:trust
9 of a Trust Source for greater security, while Encrypted Keys can be used on any
14 Trust Source
17 A trust source provides the source of security for Trusted Keys. This
18 section lists currently supported trust sources, along with their security
19 considerations. Whether or not a trust source is sufficiently safe depends
22 environment is, and there is no metric of trust, it is dependent on the
23 consumer of the Trusted Keys to determine if the trust source is sufficiently
26 * Root of trust for storage
31 provides crypto operation to establish root of trust for storage.
41 mode, trust is rooted to the OTPMK, a never-disclosed 256-bit key
49 DCP provides two keys that can be used as root of trust: the OTP key
123 The strength and appropriateness of a particular trust source for a given
136 trust source. The random number generator in use differs according to the
137 selected trust source:
169 Encrypted keys do not depend on a trust source, and are faster, as they use AES