#
53e1f34c |
| 28-May-2024 |
jsg <jsg@openbsd.org> |
remove uvm_swpkeyexpire extern for var we never had
|
#
aeef08fb |
| 12-May-2024 |
jsg <jsg@openbsd.org> |
remove uvm_swprekeyprint extern for var we never had
|
#
05db9060 |
| 06-May-2015 |
dlg <dlg@openbsd.org> |
make SWAP_KEY_GET symmetrical with SWAP_KEY_PUT by having it call a function in uvm_swap_encrypt.c instead of doing stuff inline.
lets me remove an extern from the header too.
ok kettenis@
|
#
655d8874 |
| 23-Mar-2009 |
oga <oga@openbsd.org> |
Whitespace nit in previous.
|
#
2f84f63e |
| 23-Mar-2009 |
oga <oga@openbsd.org> |
turn a for (i = 0; i < size; i++) arc4random(); loop into arc4random_buf().
Since that function is now so small (2 lines), inline it into it's only user.
Shaves some bytes (104 on amd64).
ok deraa
turn a for (i = 0; i < size; i++) arc4random(); loop into arc4random_buf().
Since that function is now so small (2 lines), inline it into it's only user.
Shaves some bytes (104 on amd64).
ok deraadt@, blambert@. djm@ liked an earlier diff.
show more ...
|
#
f92e66c2 |
| 02-Jul-2002 |
nate <nate@openbsd.org> |
inital -> initial
|
#
c4071fd1 |
| 14-Mar-2002 |
millert <millert@openbsd.org> |
First round of __P removal in sys
|
#
133306f0 |
| 29-Jan-2001 |
niklas <niklas@openbsd.org> |
$OpenBSD$
|
#
8a1f2f9e |
| 14-Jun-2000 |
provos <provos@openbsd.org> |
put in own ctl level for swapencrypt.
|
#
6b24b8a0 |
| 27-May-2000 |
provos <provos@openbsd.org> |
use rijndael instead of blowfish because of faster key setup. break swap paritions into sections, each section has own encryption key. if a section's key becomes unreferenced, erase it.
|
#
a5cc496f |
| 26-May-2000 |
provos <provos@openbsd.org> |
use encrypted blocknumber as IV
|
#
08914706 |
| 30-Dec-1999 |
provos <provos@openbsd.org> |
swap encryption for UVM, option UVM_SWAP_ENCRYPT. needs to be enabled via sysctl. Pages are encrypted with the Blowfish encryption algorithm, the key is initialized randomly on first swap out, ensur
swap encryption for UVM, option UVM_SWAP_ENCRYPT. needs to be enabled via sysctl. Pages are encrypted with the Blowfish encryption algorithm, the key is initialized randomly on first swap out, ensuring that entropy has accumulated in the kernel randomness pool. Eventually, swap encryption will be decided on a process by process basis, e.g. a process that reads from a cryptographic filesystem will enable swap encrypt for its pages. okay art@ and deraadt@.
show more ...
|