History log of /openbsd/sys/uvm/uvm_swap_encrypt.h (Results 1 – 12 of 12)
Revision Date Author Comments
# 53e1f34c 28-May-2024 jsg <jsg@openbsd.org>

remove uvm_swpkeyexpire extern for var we never had


# aeef08fb 12-May-2024 jsg <jsg@openbsd.org>

remove uvm_swprekeyprint extern for var we never had


# 05db9060 06-May-2015 dlg <dlg@openbsd.org>

make SWAP_KEY_GET symmetrical with SWAP_KEY_PUT by having it call
a function in uvm_swap_encrypt.c instead of doing stuff inline.

lets me remove an extern from the header too.

ok kettenis@


# 655d8874 23-Mar-2009 oga <oga@openbsd.org>

Whitespace nit in previous.


# 2f84f63e 23-Mar-2009 oga <oga@openbsd.org>

turn a for (i = 0; i < size; i++) arc4random(); loop into arc4random_buf().

Since that function is now so small (2 lines), inline it into it's only user.

Shaves some bytes (104 on amd64).

ok deraa

turn a for (i = 0; i < size; i++) arc4random(); loop into arc4random_buf().

Since that function is now so small (2 lines), inline it into it's only user.

Shaves some bytes (104 on amd64).

ok deraadt@, blambert@. djm@ liked an earlier diff.

show more ...


# f92e66c2 02-Jul-2002 nate <nate@openbsd.org>

inital -> initial


# c4071fd1 14-Mar-2002 millert <millert@openbsd.org>

First round of __P removal in sys


# 133306f0 29-Jan-2001 niklas <niklas@openbsd.org>

$OpenBSD$


# 8a1f2f9e 14-Jun-2000 provos <provos@openbsd.org>

put in own ctl level for swapencrypt.


# 6b24b8a0 27-May-2000 provos <provos@openbsd.org>

use rijndael instead of blowfish because of faster key setup.
break swap paritions into sections, each section has own
encryption key. if a section's key becomes unreferenced, erase it.


# a5cc496f 26-May-2000 provos <provos@openbsd.org>

use encrypted blocknumber as IV


# 08914706 30-Dec-1999 provos <provos@openbsd.org>

swap encryption for UVM, option UVM_SWAP_ENCRYPT. needs to be enabled
via sysctl.
Pages are encrypted with the Blowfish encryption algorithm, the key
is initialized randomly on first swap out, ensur

swap encryption for UVM, option UVM_SWAP_ENCRYPT. needs to be enabled
via sysctl.
Pages are encrypted with the Blowfish encryption algorithm, the key
is initialized randomly on first swap out, ensuring that entropy has
accumulated in the kernel randomness pool. Eventually, swap encryption
will be decided on a process by process basis, e.g. a process that reads from
a cryptographic filesystem will enable swap encrypt for its pages. okay
art@ and deraadt@.

show more ...