<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/nametransform, branch v2.0</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.0</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.0'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2021-06-02T12:29:48+00:00</updated>
<entry>
<title>nametransform: check name validity on encryption</title>
<updated>2021-06-02T12:29:48+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-06-02T12:21:30+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=04858ddd222bbf7156f33f99cfb293a9b1e15ec8'/>
<id>urn:sha1:04858ddd222bbf7156f33f99cfb293a9b1e15ec8</id>
<content type='text'>
xfstests generic/523 discovered that we allowed to set
xattrs with "/" in the name, but did not allow to read
them later.

With this change we do not allow to set them in the first
place.
</content>
</entry>
<entry>
<title>nametransform: make `gocryptfs.diriv` and `gocryptfs.xxx.name` files world-readable</title>
<updated>2021-01-10T07:07:10+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-01-10T07:06:09+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=bed60101f4925eb2cce736301f5cc45ad267c187'/>
<id>urn:sha1:bed60101f4925eb2cce736301f5cc45ad267c187</id>
<content type='text'>
Make `gocryptfs.diriv` and `gocryptfs.xxx.name` files world-readable to make encrypted backups easier
when mounting via fstab.

Having the files follow chmod/chown of their parent does not seem
to be worth the hassle. The content of the diriv files is not
secret, and both diriv and name files are protected by the
perms of the parent dir.

Fixes https://github.com/rfjakob/gocryptfs/issues/539
</content>
</entry>
<entry>
<title>nametransform: move permission constants to perms.go</title>
<updated>2021-01-10T06:27:04+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-01-10T06:27:04+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f3394ae286d65492483579e038acb33edd8ca274'/>
<id>urn:sha1:f3394ae286d65492483579e038acb33edd8ca274</id>
<content type='text'>
Prep for https://github.com/rfjakob/gocryptfs/issues/539
</content>
</entry>
<entry>
<title>syscallcompat: retry ops on EINTR</title>
<updated>2020-10-13T22:35:16+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-10-13T22:35:16+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=af4c1fb7a3f428ff704af22294ad955d05ed41dd'/>
<id>urn:sha1:af4c1fb7a3f428ff704af22294ad955d05ed41dd</id>
<content type='text'>
Retry operations that have been shown to throw EINTR
errors on CIFS.

Todo: Solution for this pain in the back:

	warning: unix.Getdents returned errno 2 in the middle of data
	rm: cannot remove 'linux-3.0.old3/Documentation/ABI/removed': Input/output error

Progress towards fixing https://github.com/rfjakob/gocryptfs/issues/483 .
</content>
</entry>
<entry>
<title>v2api/reverse: implement Lookup for longname</title>
<updated>2020-08-02T17:33:12+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-08-02T17:33:12+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=84ed139cd2cede9b773fe7892a0bc2515fc1f00f'/>
<id>urn:sha1:84ed139cd2cede9b773fe7892a0bc2515fc1f00f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>badname: stop trying to decrypt at length 22</title>
<updated>2020-06-06T10:49:45+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-06-06T10:49:45+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=261cf12829dcef31f1a02559b898e5067a03af31'/>
<id>urn:sha1:261cf12829dcef31f1a02559b898e5067a03af31</id>
<content type='text'>
At least 16 bytes due to AES --&gt; at least 22 characters in base64
</content>
</entry>
<entry>
<title>Added auto decryption of invalid file names</title>
<updated>2020-06-06T10:20:31+00:00</updated>
<author>
<name>DerDonut</name>
</author>
<published>2020-05-19T11:34:58+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a8230d271f394e130a8190d554eef2a86bc962d7'/>
<id>urn:sha1:a8230d271f394e130a8190d554eef2a86bc962d7</id>
<content type='text'>
Changed invalid file decoding and decryption. Function
DecryptName now shortens the filename until the filename is
decodable and decryptable. Will work with valid **and**
invalid Base64URL delimiter (valid delimiter [0-9a-zA-z_\\-].
If the filename is not decryptable at all, it returns the
original cipher name with flag suffix Changed cli tests to
generate decryptable and undecryptable file names with correct
encrypted content. Replacing #474, extends #393
</content>
</entry>
<entry>
<title>Fix spelling mistakes found by misspell</title>
<updated>2020-05-09T22:25:49+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-05-09T22:25:49+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ead7008a08f9ace4591ebbc03e63fdc7ef37e502'/>
<id>urn:sha1:ead7008a08f9ace4591ebbc03e63fdc7ef37e502</id>
<content type='text'>
https://github.com/client9/misspell
</content>
</entry>
<entry>
<title>nametransform: update comment &amp; simplify tests</title>
<updated>2020-04-18T14:14:48+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2020-04-18T14:14:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f6b1c680b3f7c7d5cd842cca3117f5ee2f0f2fad'/>
<id>urn:sha1:f6b1c680b3f7c7d5cd842cca3117f5ee2f0f2fad</id>
<content type='text'>
The comment still mentioned CBC, which has been removed
a long time ago.

The test definition can be rewritten using slice literals,
saving sume stuttering.
</content>
</entry>
<entry>
<title>Show undecryptable filenames if they match supplied glob</title>
<updated>2020-02-28T21:17:59+00:00</updated>
<author>
<name>orcas</name>
</author>
<published>2019-09-14T16:32:54+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9ec042f2f62bc95154d6c8b3215a2e7853f8f5c6'/>
<id>urn:sha1:9ec042f2f62bc95154d6c8b3215a2e7853f8f5c6</id>
<content type='text'>
Resolves https://github.com/rfjakob/gocryptfs/issues/393
</content>
</entry>
</feed>
