Lines Matching full:are
5 Trusted and Encrypted Keys are two new key types added to the existing kernel
6 key ring service. Both of these new types are variable length symmetric keys,
7 and in both cases all keys are created in the kernel, and user space sees,
10 Keys can be used on any system. All user level blobs, are displayed and loaded
11 in hex ascii for convenience, and are integrity verified.
13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed
17 (future) PCR values, so keys are easily migrated to new pcr values, such as
18 when the kernel and initramfs are updated. The same key can have many saved
19 blobs under different PCR values, so multiple boots are easily supported.
24 By default, trusted keys are sealed under the SRK, which has the default
68 are sha1, sha256, sha384, sha512 and sm3-256.
77 TPM_STORED_DATA format. The key length for new keys are always in bytes.
81 Encrypted keys do not depend on a TPM, and are faster, as they use AES for
82 encryption/decryption. New keys are created from kernel generated random
83 numbers, and are encrypted/decrypted using a specified 'master' key. The
85 disadvantage of encrypted keys is that if they are not rooted in a trusted key,
86 they are only as secure as the user key encrypting them. The master user key
202 are anticipated. In particular the new format 'ecryptfs' has been defined