Lines Matching full:trust
9 of a Trust Source for greater security, while Encrypted Keys can be used on any
14 Trust Source
17 A trust source provides the source of security for Trusted Keys. This
18 section lists currently supported trust sources, along with their security
19 considerations. Whether or not a trust source is sufficiently safe depends
22 environment is, and there is no metric of trust, it is dependent on the
23 consumer of the Trusted Keys to determine if the trust source is sufficiently
26 * Root of trust for storage
31 provides crypto operation to establish root of trust for storage.
90 New keys are created from random numbers generated in the trust source. They
93 access control policy within the trust source.
109 Encrypted keys do not depend on a trust source, and are faster, as they use AES