<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal, branch v1.3-beta1</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.3-beta1</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.3-beta1'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2017-03-18T15:48:28+00:00</updated>
<entry>
<title>fusefrontend: get rid of leftover debug output</title>
<updated>2017-03-18T15:48:28+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-18T15:48:28+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=cb47f65212801fbdd999674e549921d8cf23f2f2'/>
<id>urn:sha1:cb47f65212801fbdd999674e549921d8cf23f2f2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>serialize_reads: add read serialization logic</title>
<updated>2017-03-18T15:18:00+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-18T15:01:50+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=00df0771e3dd9fba0992cbc9a7d347f25aff856a'/>
<id>urn:sha1:00df0771e3dd9fba0992cbc9a7d347f25aff856a</id>
<content type='text'>
Due to kernel readahead, we usually get multiple read requests
at the same time. These get submitted to the backing storage in
random order, which is a problem if seeking is very expensive.

Details: https://github.com/rfjakob/gocryptfs/issues/92
</content>
</entry>
<entry>
<title>fusefrontend: readFileID: reject files that consist only of a header</title>
<updated>2017-03-12T20:11:02+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-12T20:11:02+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=14038a1644f17f50b113a05d09a2a0a3b3e973b2'/>
<id>urn:sha1:14038a1644f17f50b113a05d09a2a0a3b3e973b2</id>
<content type='text'>
A header-only file will be considered empty (this is not supposed to happen).
This makes File ID poisoning more difficult.
</content>
</entry>
<entry>
<title>fusefrontend: truncateGrowFile: avoid createHeader() call</title>
<updated>2017-03-12T20:06:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-12T20:06:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d36d53c9bbf1b1f1c34578d443770672528e4466'/>
<id>urn:sha1:d36d53c9bbf1b1f1c34578d443770672528e4466</id>
<content type='text'>
...if doWrite() can do it for us. This avoids the situation
that the file only consists of a file header when calling
doWrite.

A later patch will check for this condition and warn about it,
as with this change it should no longer occour in normal operation.
</content>
</entry>
<entry>
<title>configfile: HKDF feature flag should also be set for "-plaintextnames"</title>
<updated>2017-03-07T20:05:45+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-07T20:03:05+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9a0808b1ee4cca94a3178b14838b558bf03d483b'/>
<id>urn:sha1:9a0808b1ee4cca94a3178b14838b558bf03d483b</id>
<content type='text'>
</content>
</entry>
<entry>
<title>contentenc: catch integer underflow in file size calculation</title>
<updated>2017-03-07T19:56:50+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-06T22:50:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=2f953fdb95f44078895fec9bc4d542cd371126be'/>
<id>urn:sha1:2f953fdb95f44078895fec9bc4d542cd371126be</id>
<content type='text'>
If you truncate a ciphertext file to 19 bytes, you could get the
impression that the plaintext is 18446744073709551585 bytes long,
as reported by "ls -l".

Fix it by clamping the value to zero.
</content>
</entry>
<entry>
<title>configfile: enable HKDF and Raw64 feature flags by default</title>
<updated>2017-03-07T19:56:50+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-06T21:20:28+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9f17a78b4a63d7ab5b7e09c294a483c8b806aa49'/>
<id>urn:sha1:9f17a78b4a63d7ab5b7e09c294a483c8b806aa49</id>
<content type='text'>
Also adds a test to verify that they are set in new config
files.
</content>
</entry>
<entry>
<title>Report correct symbolic link dentry sizes</title>
<updated>2017-03-07T19:46:58+00:00</updated>
<author>
<name>M. Vefa Bicakci</name>
</author>
<published>2017-03-07T09:09:09+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d48ccb3ddab71773a991b8f1b062901ff5b435b0'/>
<id>urn:sha1:d48ccb3ddab71773a991b8f1b062901ff5b435b0</id>
<content type='text'>
Prior to this commit, gocryptfs's reverse mode did not report correct
directory entry sizes for symbolic links, where the dentry size needs to
be the same as the length of a string containing the target path.

This commit corrects this issue and adds a test case to verify the
correctness of the implementation.

This issue was discovered during the use of a strict file copying program
on a reverse-mounted gocryptfs file system.
</content>
</entry>
<entry>
<title>tests: configfile: fix spurious test failure II</title>
<updated>2017-03-05T22:24:47+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-05T22:24:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=6e9b6e17c33b4471c30248c11b292468fe4ab912'/>
<id>urn:sha1:6e9b6e17c33b4471c30248c11b292468fe4ab912</id>
<content type='text'>
internal/configfile/config_test.go:67: c declared and not used
</content>
</entry>
<entry>
<title>tests: configfile: fix spurious test failure</title>
<updated>2017-03-05T22:15:50+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-05T22:15:50+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b878306d2a3fd18d4114a73febb2caa658f684ad'/>
<id>urn:sha1:b878306d2a3fd18d4114a73febb2caa658f684ad</id>
<content type='text'>
This test fails because Raw64 has been disabled for now.
</content>
</entry>
</feed>
