encryption in uswsusp now works...
...and this is thanks to Rafael. He implemented symetric encryption; with 4 lines of scripts calling gpg I can set it up in a way that password is only entered during resume (not during suspend).
Unfortunately I'm fighting with gpg a bit. If I try to launch gpg from init=/bin/bash boot, I get error message '/dev/tty can't be opened :-('. I can work it around by launching getty, but that is rather ugly.
cat /tmp/swsusp.Suspendkey | gpg -d -r Suspendkey | ./resume -p /dev/hda1
(Suspend is:)
#!/bin/bash
PASSPHRASE=`cat /dev/urandom | uuenpipe | head -3 | tail -1`
echo $PASSPHRASE | gpg -e -r Suspendkey > /tmp/swsusp.Suspendkey
# gpg-keygen, call the key 'Suspendkey'. Provide passphrase you want to use as resume password.
echo $PASSPHRASE | ./suspend -p /dev/hda1
Ouch and suspend to RAM also got some improvements. Utility in www.sf.net/projects/suspend 's CVS now contains quite a long whitelist (thanks to acpi-support project :-). I'd need some testers, and I guess a someone to maintain web pages :-).
Unfortunately I'm fighting with gpg a bit. If I try to launch gpg from init=/bin/bash boot, I get error message '/dev/tty can't be opened :-('. I can work it around by launching getty, but that is rather ugly.
cat /tmp/swsusp.Suspendkey | gpg -d -r Suspendkey | ./resume -p /dev/hda1
(Suspend is:)
#!/bin/bash
PASSPHRASE=`cat /dev/urandom | uuenpipe | head -3 | tail -1`
echo $PASSPHRASE | gpg -e -r Suspendkey > /tmp/swsusp.Suspendkey
# gpg-keygen, call the key 'Suspendkey'. Provide passphrase you want to use as resume password.
echo $PASSPHRASE | ./suspend -p /dev/hda1
Ouch and suspend to RAM also got some improvements. Utility in www.sf.net/projects/suspend 's CVS now contains quite a long whitelist (thanks to acpi-support project :-). I'd need some testers, and I guess a someone to maintain web pages :-).