<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/configfile/scrypt.go, branch xattr_user_buffer</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2025-07-07T17:59:35+00:00</updated>
<entry>
<title>Fix a bunch of staticcheck errors</title>
<updated>2025-07-07T17:59:35+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-07-07T17:54:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8f5df19b353e02ffba842fd1b15ccf93da7ee3b4'/>
<id>urn:sha1:8f5df19b353e02ffba842fd1b15ccf93da7ee3b4</id>
<content type='text'>
Tool-assisted.
</content>
</entry>
<entry>
<title>configfile: add Validate() function, support FlagXChaCha20Poly1305</title>
<updated>2021-08-23T14:00:41+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-08-21T19:43:26+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=97d8340bd81ddd60baac598d3e25ebfb4decb50c'/>
<id>urn:sha1:97d8340bd81ddd60baac598d3e25ebfb4decb50c</id>
<content type='text'>
We used to do validation using lists of mandatory feature flags.

With the introduction of XChaCha20Poly1305, this became too
simplistic, as it uses a different IV length, hence disabling
GCMIV128.

Add a dedicated function, Validate(), with open-coded validation
logic.

The validation and creation logic also gets XChaCha20Poly1305
support, and gocryptfs -init -xchacha now writes the flag into
gocryptfs.conf.
</content>
</entry>
<entry>
<title>go mod: declare module version v2</title>
<updated>2021-08-23T13:05:15+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-08-23T13:05:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=69d88505fd7f4cb0d9e4f1918de296342fe05858'/>
<id>urn:sha1:69d88505fd7f4cb0d9e4f1918de296342fe05858</id>
<content type='text'>
Our git version is v2+ for some time now, but go.mod
still declared v1. Hopefully making both match makes
https://pkg.go.dev/github.com/rfjakob/gocryptfs/v2 work.

All the import paths have been fixed like this:

  find . -name \*.go | xargs sed -i s%github.com/rfjakob/gocryptfs/%github.com/rfjakob/gocryptfs/v2/%
</content>
</entry>
<entry>
<title>configfile: Fix a copy&amp;paste error in validateParams method.</title>
<updated>2018-12-28T08:58:46+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2018-12-28T01:43:40+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=24594d99bf74e1a4a58577348ab9fb979aa83ee6'/>
<id>urn:sha1:24594d99bf74e1a4a58577348ab9fb979aa83ee6</id>
<content type='text'>
</content>
</entry>
<entry>
<title>readpassword: convert from string to []byte</title>
<updated>2018-02-18T13:26:54+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-02-18T13:26:54+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3b8f5cbb17c964224456bb36b096feafb0e24f44'/>
<id>urn:sha1:3b8f5cbb17c964224456bb36b096feafb0e24f44</id>
<content type='text'>
This will allows us to overwrite the password
with zeros once we are done with it.

https://github.com/rfjakob/gocryptfs/issues/211
</content>
</entry>
<entry>
<title>exitcodes: pull all exit code definitions into the package</title>
<updated>2017-05-07T20:16:22+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-05-07T20:15:01+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d5adde1eeb13ba377f7c05b9f21893c01f61ec16'/>
<id>urn:sha1:d5adde1eeb13ba377f7c05b9f21893c01f61ec16</id>
<content type='text'>
This commit defines all exit codes in one place in the exitcodes
package.

Also, it adds a test to verify the exit code on incorrect
password, which is what SiriKali cares about the most.

Fixes https://github.com/rfjakob/gocryptfs/issues/77 .
</content>
</entry>
<entry>
<title>Fix typos found by Misspell</title>
<updated>2017-05-07T10:22:15+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-05-07T10:22:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=68387b470c0d6d2896cc6b927a6e3097389d66ab'/>
<id>urn:sha1:68387b470c0d6d2896cc6b927a6e3097389d66ab</id>
<content type='text'>
Misspell Finds commonly misspelled English words
gocryptfs/internal/configfile/scrypt.go
Line 41: warning: "paramter" is a misspelling of "parameter" (misspell)
gocryptfs/internal/ctlsock/ctlsock_serve.go
Line 1: warning: "implementes" is a misspelling of "implements" (misspell)
gocryptfs/tests/test_helpers/helpers.go
Line 27: warning: "compatability" is a misspelling of "compatibility" (misspell)
</content>
</entry>
<entry>
<title>configfile: always validate all scrypt parameters</title>
<updated>2017-03-25T18:36:16+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-25T18:22:43+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c815554866f18770114a9bb0605e09f812c53010'/>
<id>urn:sha1:c815554866f18770114a9bb0605e09f812c53010</id>
<content type='text'>
This makes sure we cannot get weak parameters passed through a
rougue gocryptfs.conf.
</content>
</entry>
<entry>
<title>configfile: rename "kdf.go" -&gt; "scrypt.go"</title>
<updated>2017-02-25T17:51:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-02-25T17:51:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=57612a278bdd26de611b543be311748ca4dc42ca'/>
<id>urn:sha1:57612a278bdd26de611b543be311748ca4dc42ca</id>
<content type='text'>
This really only handles scrypt and no other key-derivation functions.
Renaming the files prevents confusion once we introduce HKDF.

renamed:    internal/configfile/kdf.go -&gt; internal/configfile/scrypt.go
renamed:    internal/configfile/kdf_test.go -&gt; internal/configfile/scrypt_test.go
</content>
</entry>
</feed>
