<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/stupidgcm/without_openssl.go, branch xattr_user_buffer</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=xattr_user_buffer'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2025-08-07T20:06:39+00:00</updated>
<entry>
<title>stupidgcm: make build tags consistent</title>
<updated>2025-08-07T20:06:39+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-08-07T20:06:39+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=5f324fe6614c1cf6bc7e5c07807332c8bb23dd5c'/>
<id>urn:sha1:5f324fe6614c1cf6bc7e5c07807332c8bb23dd5c</id>
<content type='text'>
This makes building with just CGO_ENABLED=0 work.
</content>
</entry>
<entry>
<title>make format</title>
<updated>2022-08-28T09:11:36+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2022-08-28T09:11:36+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=003a7fa2e53ac15d2c94a34102ae12b69b23c586'/>
<id>urn:sha1:003a7fa2e53ac15d2c94a34102ae12b69b23c586</id>
<content type='text'>
</content>
</entry>
<entry>
<title>cli: drop -forcedecode flag</title>
<updated>2021-09-10T10:14:19+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-09-10T10:14:19+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d023cd6c95fcbc6b5056ba1f425d2ac3df4abc5a'/>
<id>urn:sha1:d023cd6c95fcbc6b5056ba1f425d2ac3df4abc5a</id>
<content type='text'>
The rewritten openssl backend does not support this flag anymore,
and it was inherently dangerour. Drop it (ignored for compatibility)
</content>
</entry>
<entry>
<title>stupidgcm: normalize constructor naming</title>
<updated>2021-09-07T16:15:04+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-09-07T16:11:11+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=85c2beccaf674c69b3e30b0d646f5c11d91ecb9b'/>
<id>urn:sha1:85c2beccaf674c69b3e30b0d646f5c11d91ecb9b</id>
<content type='text'>
New() -&gt; NewAES256GCM()

Also add missing NewChacha20poly1305
constructor in without_openssl.go.
</content>
</entry>
<entry>
<title>stupidgcm: fix without_openssl build</title>
<updated>2021-09-07T16:14:05+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-09-04T09:58:43+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=8f820c429d88f601ba6c7a614fef23b7f53eb489'/>
<id>urn:sha1:8f820c429d88f601ba6c7a614fef23b7f53eb489</id>
<content type='text'>
$ ./build-without-openssl.bash
internal/speed/speed.go:152:14: undefined: stupidgcm.NewXchacha20poly1305
</content>
</entry>
<entry>
<title>go mod: declare module version v2</title>
<updated>2021-08-23T13:05:15+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2021-08-23T13:05:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=69d88505fd7f4cb0d9e4f1918de296342fe05858'/>
<id>urn:sha1:69d88505fd7f4cb0d9e4f1918de296342fe05858</id>
<content type='text'>
Our git version is v2+ for some time now, but go.mod
still declared v1. Hopefully making both match makes
https://pkg.go.dev/github.com/rfjakob/gocryptfs/v2 work.

All the import paths have been fixed like this:

  find . -name \*.go | xargs sed -i s%github.com/rfjakob/gocryptfs/%github.com/rfjakob/gocryptfs/v2/%
</content>
</entry>
<entry>
<title>main: try to wipe cryptocore's secret keys on unmount</title>
<updated>2018-02-18T10:39:10+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-02-18T10:33:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=18f6c6106c66ba1fe6e7b48aaa5dd444ba0f9b09'/>
<id>urn:sha1:18f6c6106c66ba1fe6e7b48aaa5dd444ba0f9b09</id>
<content type='text'>
Raise the bar for recovering keys from memory.

https://github.com/rfjakob/gocryptfs/issues/211
</content>
</entry>
<entry>
<title>stupidgcm: switch to pointer receivers</title>
<updated>2018-02-17T14:02:01+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-02-17T14:02:01+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=7e0fefe970b98be7e455f671dbd0e994abd52110'/>
<id>urn:sha1:7e0fefe970b98be7e455f671dbd0e994abd52110</id>
<content type='text'>
What the key slice does not get copied around
will make it possible to check if the key has been wiped.
</content>
</entry>
<entry>
<title>exitcodes: pull all exit code definitions into the package</title>
<updated>2017-05-07T20:16:22+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-05-07T20:15:01+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d5adde1eeb13ba377f7c05b9f21893c01f61ec16'/>
<id>urn:sha1:d5adde1eeb13ba377f7c05b9f21893c01f61ec16</id>
<content type='text'>
This commit defines all exit codes in one place in the exitcodes
package.

Also, it adds a test to verify the exit code on incorrect
password, which is what SiriKali cares about the most.

Fixes https://github.com/rfjakob/gocryptfs/issues/77 .
</content>
</entry>
<entry>
<title>forcedecode: tighten checks</title>
<updated>2017-04-23T22:25:02+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-04-23T22:25:02+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3409ade2723d931097560fbbe35e461553c5912c'/>
<id>urn:sha1:3409ade2723d931097560fbbe35e461553c5912c</id>
<content type='text'>
...and fix a few golint issues and print a scary warning message on mount.

Also, force the fs to ro,noexec.
</content>
</entry>
</feed>
