<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/contentenc/offsets.go, branch xattr_user_buffer</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2021-08-23T13:05:15+00:00</updated>
<entry>
<title>go mod: declare module version v2</title>
<updated>2021-08-23T13:05:15+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-08-23T13:05:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=69d88505fd7f4cb0d9e4f1918de296342fe05858'/>
<id>urn:sha1:69d88505fd7f4cb0d9e4f1918de296342fe05858</id>
<content type='text'>
Our git version is v2+ for some time now, but go.mod
still declared v1. Hopefully making both match makes
https://pkg.go.dev/github.com/rfjakob/gocryptfs/v2 work.

All the import paths have been fixed like this:

  find . -name \*.go | xargs sed -i s%github.com/rfjakob/gocryptfs/%github.com/rfjakob/gocryptfs/v2/%
</content>
</entry>
<entry>
<title>contentenc: add PlainOffToCipherOff helper</title>
<updated>2021-05-26T16:28:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-26T16:28:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=07164cbb3a42946a8bb0286da1bc7ea52bb33ee1'/>
<id>urn:sha1:07164cbb3a42946a8bb0286da1bc7ea52bb33ee1</id>
<content type='text'>
Will be used for improving Lseek()
</content>
</entry>
<entry>
<title>contentenc: fix CipherSizeToPlainSize non-monoticity</title>
<updated>2021-05-26T11:17:56+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-26T07:08:52+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b4794bedecbddfd90c2a018825a798d2989a2838'/>
<id>urn:sha1:b4794bedecbddfd90c2a018825a798d2989a2838</id>
<content type='text'>
For an illegal cipherSize, pretend we have an additional
1-byte block.

See code comment for details.
</content>
</entry>
<entry>
<title>contentenc: downgrade "interrupted write?" warning to debug</title>
<updated>2017-05-01T16:44:18+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-05-01T16:44:18+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1a89919d80f28ca4126d70bcc1d617145abc2695'/>
<id>urn:sha1:1a89919d80f28ca4126d70bcc1d617145abc2695</id>
<content type='text'>
This can happen during normal operation, and is harmless since

14038a1644f17f50b113a05d09a2a0a3b3e973b2
"fusefrontend: readFileID: reject files that consist only of a header"

causes dormant header-only files to be rewritten on the next write.
</content>
</entry>
<entry>
<title>contentenc: catch integer underflow in file size calculation</title>
<updated>2017-03-07T19:56:50+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-06T22:50:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=2f953fdb95f44078895fec9bc4d542cd371126be'/>
<id>urn:sha1:2f953fdb95f44078895fec9bc4d542cd371126be</id>
<content type='text'>
If you truncate a ciphertext file to 19 bytes, you could get the
impression that the plaintext is 18446744073709551585 bytes long,
as reported by "ls -l".

Fix it by clamping the value to zero.
</content>
</entry>
<entry>
<title>lint fixes</title>
<updated>2016-10-04T21:18:33+00:00</updated>
<author>
<name>Valient Gough</name>
</author>
<published>2016-10-02T04:14:18+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b764917cd5c1b1d61b8ce08e7af0b29793fbbb80'/>
<id>urn:sha1:b764917cd5c1b1d61b8ce08e7af0b29793fbbb80</id>
<content type='text'>
</content>
</entry>
<entry>
<title>reverse: print value in file offset panic</title>
<updated>2016-09-25T14:43:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-09-02T19:01:03+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e42ab3908db7ea70320d780344723846227ab699'/>
<id>urn:sha1:e42ab3908db7ea70320d780344723846227ab699</id>
<content type='text'>
</content>
</entry>
<entry>
<title>contentenc: add helpers for reverse mode</title>
<updated>2016-09-25T14:43:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-08-29T22:20:31+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=5931eea3877ae34cdb18ac36e5cf5fba3f74b82b'/>
<id>urn:sha1:5931eea3877ae34cdb18ac36e5cf5fba3f74b82b</id>
<content type='text'>
Add the reverse variant of DecryptBlocks etc:

* EncryptBlocks
* JointPlaintextRange
* ExplodeCipherRange
</content>
</entry>
<entry>
<title>conentenc: handle zero-sized files in PlainSizeToCipherSize</title>
<updated>2016-09-25T14:43:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-08-29T19:55:10+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1d62086742df25030869ccd4050eb9f89eb6661e'/>
<id>urn:sha1:1d62086742df25030869ccd4050eb9f89eb6661e</id>
<content type='text'>
Previously caused an integer underflow.
</content>
</entry>
<entry>
<title>fusefronted: move Truncate() and Allocate() to their own file</title>
<updated>2016-07-02T13:35:06+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-07-02T13:33:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=04ad0635159150409252f6901463768008802221'/>
<id>urn:sha1:04ad0635159150409252f6901463768008802221</id>
<content type='text'>
These are large complicated implementations that will share some
code.
</content>
</entry>
</feed>
