<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/gocryptfs-xray, branch v2.0-beta2</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.0-beta2</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.0-beta2'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2020-09-12T16:06:54+00:00</updated>
<entry>
<title>Add support for FIDO2 tokens</title>
<updated>2020-09-12T16:06:54+00:00</updated>
<author>
<name>Pavol Rusnak</name>
</author>
<published>2020-09-05T20:42:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1e624a4cc3aafa57b5fa213c88bcd3689cefd1c3'/>
<id>urn:sha1:1e624a4cc3aafa57b5fa213c88bcd3689cefd1c3</id>
<content type='text'>
</content>
</entry>
<entry>
<title>main: accept multiple -passfile options</title>
<updated>2020-05-17T17:31:04+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-05-17T17:31:04+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=416080203b4dd79de857eaf7c7cc97d050e00a9f'/>
<id>urn:sha1:416080203b4dd79de857eaf7c7cc97d050e00a9f</id>
<content type='text'>
Each file will be read and then concatenated
for the effictive password. This can be used as a
kind of multi-factor authenticiton.

Fixes https://github.com/rfjakob/gocryptfs/issues/288
</content>
</entry>
<entry>
<title>gocryptfs-xray: document -encrypt-paths / -decrypt-paths</title>
<updated>2020-05-09T22:14:03+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-05-09T22:14:03+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=5af7d3c699d1f78ba81b447285dd4ebae78ee644'/>
<id>urn:sha1:5af7d3c699d1f78ba81b447285dd4ebae78ee644</id>
<content type='text'>
</content>
</entry>
<entry>
<title>gocryptfs-xray: add -0 flag, add tests</title>
<updated>2020-05-09T22:04:14+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-05-09T22:04:14+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a9895b34872d2299cfe424444fab15516e7f96c9'/>
<id>urn:sha1:a9895b34872d2299cfe424444fab15516e7f96c9</id>
<content type='text'>
The -0 flags works like xargs -0.
</content>
</entry>
<entry>
<title>gocryptfs-xray: integrate ctlsock path encryption/decryption</title>
<updated>2020-05-09T17:11:06+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-05-09T17:11:06+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=24554b11f773cd6c944b8be2f661962867897520'/>
<id>urn:sha1:24554b11f773cd6c944b8be2f661962867897520</id>
<content type='text'>
Implementation seems to work ok, but is missing tests and
documentation for now.
I will only delete ctlsock-encrypt.bash when both are
done.

https://github.com/rfjakob/gocryptfs/issues/416
</content>
</entry>
<entry>
<title>gocryptfs-xray: show full usage text on flag parse error</title>
<updated>2019-05-01T11:12:44+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-04-09T19:23:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=dcd1068517d82d327cc3db108d1e714dad38ecc2'/>
<id>urn:sha1:dcd1068517d82d327cc3db108d1e714dad38ecc2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Allow multiple -extpass arguments</title>
<updated>2019-03-03T12:25:30+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-03-03T12:25:30+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=cf27037f20723e934320edeff7f8aa356bdca467'/>
<id>urn:sha1:cf27037f20723e934320edeff7f8aa356bdca467</id>
<content type='text'>
To support arguments containing spaces, -extpass can now
be passed multiple times.

https://github.com/rfjakob/gocryptfs/issues/289
</content>
</entry>
<entry>
<title>xray: print "assuming AES-GCM mode" unless -aessiv is passed</title>
<updated>2019-01-04T18:34:15+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-04T18:34:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=2024616722ee18c3a8886490166d090f81f2ecaf'/>
<id>urn:sha1:2024616722ee18c3a8886490166d090f81f2ecaf</id>
<content type='text'>
To alert the user that they can and should choose the
right mode.
</content>
</entry>
<entry>
<title>xray: recreate test filesytems with -scrypt 10</title>
<updated>2019-01-04T18:31:08+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-04T18:30:05+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=28584d0d2c829fa1824bebc13e446968ebdee6b6'/>
<id>urn:sha1:28584d0d2c829fa1824bebc13e446968ebdee6b6</id>
<content type='text'>
Speeds up the dumpmasterkey test *a lot*:

Before:
  ok  	github.com/rfjakob/gocryptfs/gocryptfs-xray/xray_tests	0.398s

After:
  ok  	github.com/rfjakob/gocryptfs/gocryptfs-xray/xray_tests	0.023s
</content>
</entry>
<entry>
<title>xray: add dumpmasterkey test</title>
<updated>2019-01-04T18:21:09+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-04T18:21:09+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8d71f8fe523a1c117ec8f4b47dd6067203a92551'/>
<id>urn:sha1:8d71f8fe523a1c117ec8f4b47dd6067203a92551</id>
<content type='text'>
</content>
</entry>
</feed>
