<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/stupidgcm, branch v1.7-rc1</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.7-rc1</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.7-rc1'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2018-12-27T14:19:55+00:00</updated>
<entry>
<title>Assorted spelling fixes.</title>
<updated>2018-12-27T14:19:55+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2018-12-27T11:03:00+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=874eaf9734cc10940e08f7b043652449e1e220b5'/>
<id>urn:sha1:874eaf9734cc10940e08f7b043652449e1e220b5</id>
<content type='text'>
Mostly detected with the 'codespell' utility, but also includes some
manual grammar fixes.
</content>
</entry>
<entry>
<title>stupidgcm: return error on too short input instead of panicing</title>
<updated>2018-05-10T21:00:02+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-05-10T20:44:03+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a276321dea04eaa0cfc80c56e8faca4b8ded0b7a'/>
<id>urn:sha1:a276321dea04eaa0cfc80c56e8faca4b8ded0b7a</id>
<content type='text'>
This is what Go GCM does as well.
</content>
</entry>
<entry>
<title>Fix the easy golint warnings</title>
<updated>2018-04-08T18:26:25+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-04-08T18:24:29+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=bcc8378a2c07476a43c1fe316b79590177ded3d3'/>
<id>urn:sha1:bcc8378a2c07476a43c1fe316b79590177ded3d3</id>
<content type='text'>
Reported by https://goreportcard.com/report/github.com/rfjakob/gocryptfs
</content>
</entry>
<entry>
<title>stupidgcm: create private copy of the key</title>
<updated>2018-02-18T11:35:51+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-02-18T11:33:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=72ddbae1e60470943aaae0bfce74ebdc88c07cd2'/>
<id>urn:sha1:72ddbae1e60470943aaae0bfce74ebdc88c07cd2</id>
<content type='text'>
Relieves the caller from worrying about whether they
can overwrite the key.
</content>
</entry>
<entry>
<title>main: try to wipe cryptocore's secret keys on unmount</title>
<updated>2018-02-18T10:39:10+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-02-18T10:33:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=18f6c6106c66ba1fe6e7b48aaa5dd444ba0f9b09'/>
<id>urn:sha1:18f6c6106c66ba1fe6e7b48aaa5dd444ba0f9b09</id>
<content type='text'>
Raise the bar for recovering keys from memory.

https://github.com/rfjakob/gocryptfs/issues/211
</content>
</entry>
<entry>
<title>stupidgcm: implement key wipe</title>
<updated>2018-02-17T14:14:55+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-02-17T14:12:45+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=eeed4b4bef64059e5a52f4ceaa0d3a52b197349a'/>
<id>urn:sha1:eeed4b4bef64059e5a52f4ceaa0d3a52b197349a</id>
<content type='text'>
Not bulletproof due to possible GC copies, but
still raises to bar for extracting the key.

https://github.com/rfjakob/gocryptfs/issues/211
</content>
</entry>
<entry>
<title>stupidgcm: switch to pointer receivers</title>
<updated>2018-02-17T14:02:01+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-02-17T14:02:01+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=7e0fefe970b98be7e455f671dbd0e994abd52110'/>
<id>urn:sha1:7e0fefe970b98be7e455f671dbd0e994abd52110</id>
<content type='text'>
What the key slice does not get copied around
will make it possible to check if the key has been wiped.
</content>
</entry>
<entry>
<title>macos: make testing without openssl work properly</title>
<updated>2017-07-14T21:22:15+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-07-14T21:22:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ccf1a84e417e9f7d83f31c61c44cf3851703b1e4'/>
<id>urn:sha1:ccf1a84e417e9f7d83f31c61c44cf3851703b1e4</id>
<content type='text'>
On MacOS, building and testing without openssl is much easier.
The tests should skip tests that fail because of missing openssl
instead of aborting.

Fixes https://github.com/rfjakob/gocryptfs/issues/123
</content>
</entry>
<entry>
<title>stupidgcm: fix openssl 1.1 build failure</title>
<updated>2017-07-14T18:44:07+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-07-14T18:43:12+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=61e964457d27cbe7cbedaa7bf81d1e78f685960b'/>
<id>urn:sha1:61e964457d27cbe7cbedaa7bf81d1e78f685960b</id>
<content type='text'>
Fixed by including the correct header. Should work on older openssl
versions as well.

Error was:
locking.go:21: undefined reference to `CRYPTO_set_locking_callback'
</content>
</entry>
<entry>
<title>stupidgcm: add test for in-place Open</title>
<updated>2017-07-01T07:56:05+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-07-01T07:55:14+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9f4bd765762237e1d0e95c5194fe9768f1281c8c'/>
<id>urn:sha1:9f4bd765762237e1d0e95c5194fe9768f1281c8c</id>
<content type='text'>
Adds a test for the optimization introduced in:

	stupidgcm: Open: if "dst" is big enough, use it as the output buffer
</content>
</entry>
</feed>
