Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261506AbVDJPDx (ORCPT ); Sun, 10 Apr 2005 11:03:53 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261507AbVDJPDx (ORCPT ); Sun, 10 Apr 2005 11:03:53 -0400 Received: from smtp.etmail.cz ([160.218.43.220]:45498 "EHLO smtp.etmail.cz") by vger.kernel.org with ESMTP id S261506AbVDJPDx convert rfc822-to-8bit (ORCPT ); Sun, 10 Apr 2005 11:03:53 -0400 From: "=?UTF-8?Q?Pavel_Machek?=" To: , , Subject: =?UTF-8?Q?Re:[PATCH]_zero_disk_pages_used_by_swsusp_on_resume?= Date: Sun, 10 Apr 2005 15:03:40 +0000 Message-Id: <1113145420344@pavel_ucw.cz> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT X-Mailer: EMCL2 v3.10 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 588 Lines: 8 Hi! What about doing it right? Encrypt it with symmetric cypher and store key in suspend header. That way key is removed automagically while fixing signatures. No need to clear anythink. OTOH we may want to dm-crypt whole swap partition. You could still store key in header... --p -- pavel. Sent from mobile phone. Sorry for poor formatting. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/