Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Currently we support the mechanisms listed in Table 2.

Image RemovedImage Added

Some mechanisms are completely in hardware – some others use software for public key cryptography. Private key operations are always in hardware.
Hardware-only operations such as key generation are not supported for session objects!

...