This site has been retired. For up to date information, see handbook.gnome.org or gitlab.gnome.org.


[Home] [TitleIndex] [WordIndex

Gnome Keyring's 'Secure' Memory

Gnome Keyring stores secrets and passwords in memory that is locked in physical RAM to prevent it from paging out to the swap file on the disk.

Both gnome-keyring-daemon and libgnome-keyring make use of this memory. All network buffers and in memory blocks that contain secrets, passwords or encryption keys are non-pageable (see below for caveats).

You can also use this non-pageable memory through the: Secure Memory API

Requirements

Behavior

API

The API in gnome-keyring-memory.h is exposed so that applications which use gnome-keyring can take advantage of it to hold passwords or secrets securely in memory.


2024-10-23 11:37