Comparison of secret managing schemes: Difference between revisions
imported>Pacman99 mNo edit summary |
imported>Lucc |
||
Line 66: | Line 66: | ||
| reencryption for the ssh host key | | reencryption for the ssh host key | ||
| encrypted | | encrypted | ||
| | | decryption with the ssh host key | ||
| | | | ||
| yes | | yes |