Skip to content

Conversation

AndersAstrand
Copy link
Collaborator

Here is an alternative version of the POC in #446

This version doesn't use ResourceOwners, but instead frees the decrypted keys on smgr close. Unfortunately we don't get to know when smgr destroy is done, which would probably be the most correctest place to do this.

This version also caches the encrypted keys separately, however I'm not sure whether that's valuable or not. Need to do some testing.

Anders Åstrand added 2 commits July 4, 2025 12:33
Using openssl's secure allocators for these ensures they are never
swapped to disk or present in a core dump.

This commit is mostly a poc for only keeping encrypted keys in the smgr
cache, as that memory is not protected.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant