<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/contentenc, branch v2.0.1</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.0.1</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.0.1'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2021-05-26T16:28:59+00:00</updated>
<entry>
<title>contentenc: add PlainOffToCipherOff helper</title>
<updated>2021-05-26T16:28:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-26T16:28:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=07164cbb3a42946a8bb0286da1bc7ea52bb33ee1'/>
<id>urn:sha1:07164cbb3a42946a8bb0286da1bc7ea52bb33ee1</id>
<content type='text'>
Will be used for improving Lseek()
</content>
</entry>
<entry>
<title>contentenc: fix CipherSizeToPlainSize non-monoticity</title>
<updated>2021-05-26T11:17:56+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-26T07:08:52+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b4794bedecbddfd90c2a018825a798d2989a2838'/>
<id>urn:sha1:b4794bedecbddfd90c2a018825a798d2989a2838</id>
<content type='text'>
For an illegal cipherSize, pretend we have an additional
1-byte block.

See code comment for details.
</content>
</entry>
<entry>
<title>contentenc: update comments</title>
<updated>2021-05-26T11:17:56+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-25T11:24:18+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=bebd7ed81f9dd99113672ed9e22456d3fdbc24f6'/>
<id>urn:sha1:bebd7ed81f9dd99113672ed9e22456d3fdbc24f6</id>
<content type='text'>
Also, replace one open-coded calculation with a
helper function.
</content>
</entry>
<entry>
<title>tests: contentenc: add TestSizeToSize</title>
<updated>2021-05-26T11:17:56+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-05-24T13:28:02+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=2a5ac3e9ba1fb3cdf2220524bc1633755092c794'/>
<id>urn:sha1:2a5ac3e9ba1fb3cdf2220524bc1633755092c794</id>
<content type='text'>
TestSizeToSize tests CipherSizeToPlainSize and PlainSizeToCipherSize.

Fails at the moment due to CipherSizeToPlainSize non-moniticity.
</content>
</entry>
<entry>
<title>Update go-fuse import path to github.com/hanwen/go-fuse/v2</title>
<updated>2020-05-17T12:23:47+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-05-17T12:18:23+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ec74d1d2f4217a9a337d1db9902f32ae2aecaf33'/>
<id>urn:sha1:ec74d1d2f4217a9a337d1db9902f32ae2aecaf33</id>
<content type='text'>
We need
https://github.com/hanwen/go-fuse/commit/fd7328faf9fdf75709f7ba7df7072aaf4eeb18b3
to fix a crash reported in https://github.com/rfjakob/gocryptfs/issues/430 :

  2019/10/30 17:14:16 Unknown opcode 2016
  panic: runtime error: invalid memory address or nil pointer dereference
  [signal SIGSEGV: segmentation violation code=0x1 addr=0x20 pc=0x508d38]

This patch is only in the v2.x.x branch. Upgrade to v2, as the
old API is also supported there.

Running

  git grep hanwen/go-fuse | grep -v hanwen/go-fuse/v2

to check for forgotten references comes back clean.
</content>
</entry>
<entry>
<title>contentenc: encryptBlocksParallel: explain why last part runs in new goroutine</title>
<updated>2020-02-15T20:28:12+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-02-15T20:28:12+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=abc59fa96802f1b79fc92ba3a4ae78b58b905535'/>
<id>urn:sha1:abc59fa96802f1b79fc92ba3a4ae78b58b905535</id>
<content type='text'>
The result is counter-intuitive, so explain it here.
</content>
</entry>
<entry>
<title>contentenc: move parallel encryption into encryptBlocksParallel</title>
<updated>2020-02-15T14:49:12+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-02-15T14:49:12+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9aeb2a3df68539ad3a44283b9b94e1b28f011941'/>
<id>urn:sha1:9aeb2a3df68539ad3a44283b9b94e1b28f011941</id>
<content type='text'>
Make the logic self-contained in the new helper function.
</content>
</entry>
<entry>
<title>contentenc: add explicit test for all-zero header</title>
<updated>2019-10-06T17:37:51+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-10-06T17:34:32+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b3c88f573f4c1b269e78dd7d1dbd6de73d477694'/>
<id>urn:sha1:b3c88f573f4c1b269e78dd7d1dbd6de73d477694</id>
<content type='text'>
https://github.com/rfjakob/gocryptfs/issues/363
</content>
</entry>
<entry>
<title>ParseHeader: print hexdump on error</title>
<updated>2019-02-17T16:13:20+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-02-17T16:13:20+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=179471b6486b2cb3e6e24eed1d9f86f2e880e334'/>
<id>urn:sha1:179471b6486b2cb3e6e24eed1d9f86f2e880e334</id>
<content type='text'>
Should help debugging https://github.com/rfjakob/gocryptfs/issues/363
</content>
</entry>
<entry>
<title>configfile: Explicitly wipe scrypt derived key after decrypting/encrypting master key.</title>
<updated>2018-12-27T17:47:14+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2018-12-26T20:17:54+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=07c486603c42af00c81d9e76e3b0731aa986e881'/>
<id>urn:sha1:07c486603c42af00c81d9e76e3b0731aa986e881</id>
<content type='text'>
Further raises the bar for recovering keys from memory.
</content>
</entry>
</feed>
