Lines Matching refs:keys
4 key ring service. Both of these new types are variable length symmetric keys,
5 and in both cases all keys are created in the kernel, and user space sees,
11 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed
15 (future) PCR values, so keys are easily migrated to new pcr values, such as
19 By default, trusted keys are sealed under the SRK, which has the default
43 TPM_STORED_DATA format. The key length for new keys are always in bytes.
47 Encrypted keys do not depend on a TPM, and are faster, as they use AES for
48 encryption/decryption. New keys are created from kernel generated random
51 disadvantage of encrypted keys is that if they are not rooted in a trusted key,
56 The decrypted portion of encrypted keys can contain either a simple symmetric
124 The initial consumer of trusted keys is EVM, which at boot time needs a high
156 Other uses for trusted and encrypted keys, such as for disk and file encryption
158 in order to use encrypted keys to mount an eCryptfs filesystem. More details
160 'Documentation/security/keys-ecryptfs.txt'.