Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1772766imm; Thu, 21 Jun 2018 02:03:04 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJ2c1JGOP2W4v8e5XIe1vM9FpU4kDywAJAWs2o5nyE0Q6JAxVBJhfKUPa2qk7wgE5HI/piM X-Received: by 2002:a17:902:22e:: with SMTP id 43-v6mr10537131plc.82.1529571784028; Thu, 21 Jun 2018 02:03:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529571783; cv=none; d=google.com; s=arc-20160816; b=oEbfYypGPluKGIV1IdC+Evvw/rbB8HDG5+IAYFRqjp13BSBO/zgNdIL1SNUo2Y/wyE XS63eHiiFk4kNcjKI3LzHgJVVj2iW6GkbNby3Tm60pAF4k2fVJZrb9TmLBOgvIHpxD7p P2nStqf2ocKIthENZRK/45Rgi2ufWUamnSB1bh1f92++e1CIXS38Ik65DdCkRKIV7f4L ULiOfLfUNKFu0SB+GVTYjRxbkF1bxJVBGFUlvQ5g115VjCGtJyVPsczVF3vkfUAM64Ka PQiBkFKlBDdRQlpJE2KjIbG2yEW35u+GaUOW8Ffm18sX1Pd+EgDqN6EBfYY1sBwxW+tu NqKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=19ppSVgGbAnT2LrChu3K/GNX+WyxBTdkjz+NArc7poY=; b=GV7PdEREHD1N/0wJN0e8X7ZdYHmiP34zfcsq2GJchI2LLChCu99LS9ZBCZpR6MMuMJ 2iJloL5iXl1F7lw9HSZYUfGw0d51cFB2dCilFLYtjzpKAWxl9MgX0PiTdiDcNGh5hQDx +qP7gNut1jWc8M+pJ/+jdf76fbCz7O6m0k92q9uNO6U6O5H0jansOP7BPltZHLmud6qG 7mDfIY/3I7l8oBnBSEP/ZCpSswjZJmKtQ33mp+8c2NabwxaBuVwyr36whNQ0yIbCJvXE BK5+UFgD68OeC44baaZxI9AL4YNjWpabLLdd+CkZR/sd1DCR+LOBjjNEDBYpeI0H6L0S kZrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q23-v6si4280848pls.101.2018.06.21.02.02.35; Thu, 21 Jun 2018 02:03:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754277AbeFUJBr (ORCPT + 99 others); Thu, 21 Jun 2018 05:01:47 -0400 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:49058 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754065AbeFUJBp (ORCPT ); Thu, 21 Jun 2018 05:01:45 -0400 Received: by atrey.karlin.mff.cuni.cz (Postfix, from userid 512) id E178B80555; Thu, 21 Jun 2018 11:01:43 +0200 (CEST) Date: Thu, 21 Jun 2018 11:01:42 +0200 From: Pavel Machek To: Chen Yu , tytso@mit.edu Cc: "Rafael J. Wysocki" , Len Brown , "Lee, Chun-Yi" , Borislav Petkov , linux-pm@vger.kernel.org, linux-kernel@vger.kernel.org, "Rafael J . Wysocki" , Theodore Ts'o , Stephan Mueller , Eric Biggers , Denis Kenzior Subject: Re: [PATCH 3/3][RFC] tools: create power/crypto utility Message-ID: <20180621090142.GB21807@amd> References: <78af30838d0bac69bdd6e138b659bcbb8464fd13.1529486870.git.yu.c.chen@intel.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="s2ZSL+KKDSLx8OML" Content-Disposition: inline In-Reply-To: <78af30838d0bac69bdd6e138b659bcbb8464fd13.1529486870.git.yu.c.chen@intel.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --s2ZSL+KKDSLx8OML Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed 2018-06-20 17:40:51, Chen Yu wrote: > crypto_hibernate is a user-space utility to generate > 512bits AES key and pass it to the kernel via ioctl > for hibernation encryption.(We can also add the key > into kernel via keyctl if necessary, but currently > using ioctl seems to be more straightforward as we > need both the key and salt transit). Ah, here you go: https://en.wikipedia.org/wiki/Uswsusp It can already do encryption. If you see problems there, patches will be gladly accepted to fix them. If you want to maintain uswsusp in kernel tree, I guess that would be an option, too. If you want to just help swsusp, I have some patches that reduce duplicities between x86-32 and x86-64. It would be cool to clean them up and get them merged. > Suggested-by: "Theodore Ts'o" Best regards, Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --s2ZSL+KKDSLx8OML Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlsraXYACgkQMOfwapXb+vLpTACgoPaUypOAaz3Rq6lnFosS6iG0 uRYAmgPEWp/kWz9PDcNapGWIb3SAWlul =SwCy -----END PGP SIGNATURE----- --s2ZSL+KKDSLx8OML--