Lines Matching refs:in
6 Each FEK is in turn encrypted with a File Encryption Key Encryption Key (FEFEK)
7 either in kernel space or in user space with a daemon called 'ecryptfsd'. In
9 using a key, the FEFEK, derived from a user prompted passphrase; in the latter
10 the FEK is encrypted by 'ecryptfsd' with the help of external libraries in order
15 FEK decryption is called authentication token and, currently, can be stored in a
16 kernel key of the 'user' type, inserted in the user's session specific keyring
21 format 'ecryptfs' in order to be used in conjunction with the eCryptfs
23 authentication token in its payload with a FEFEK randomly generated by the
28 authentication token, which content is well known, but only the FEFEK in
31 The eCryptfs filesystem may really benefit from using encrypted keys in that the
33 time after the unsealing of a 'trusted' key in order to perform the mount in a
35 threats of malicious software, because it is available in clear form only at