<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal, branch v2.5.1</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.5.1</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v2.5.1'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2025-01-18T18:57:44+00:00</updated>
<entry>
<title>reverse: lookupDiriv: use deriveDirIV helper</title>
<updated>2025-01-18T18:57:44+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-01-14T19:04:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f93fa965b37926c6c5ad5ffdcfddaa131879f97f'/>
<id>urn:sha1:f93fa965b37926c6c5ad5ffdcfddaa131879f97f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>reverse: advance mtime &amp; ctime for virtual files by 10 seconds</title>
<updated>2025-01-18T13:13:52+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2025-01-18T13:11:51+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9eb47cf546d7e2499eab210d70050ef78087475a'/>
<id>urn:sha1:9eb47cf546d7e2499eab210d70050ef78087475a</id>
<content type='text'>
With inode number reuse and hard links, we could have returned
wrong data for gocryptfs.diriv and gocryptfs.xyz.longname files, respectively
(https://github.com/rfjakob/gocryptfs/issues/802).

Now that this is fixed, ensure that rsync and similar tools pick up the new
correct files by advancing mtime and ctime by 10 seconds, which should be more
than any filesytems' timestamp granularity (FAT32 has 2 seconds).
</content>
</entry>
<entry>
<title>passfile: drop byte counter from trailing garbage warning</title>
<updated>2024-12-04T18:06:56+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2024-12-04T17:55:21+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=11f338f74fffc94bf16cea834aafccda30bd1240'/>
<id>urn:sha1:11f338f74fffc94bf16cea834aafccda30bd1240</id>
<content type='text'>
We don't know the exact value as we only read 2kiB.

Relates-to: https://github.com/rfjakob/gocryptfs/discussions/882
</content>
</entry>
<entry>
<title>Report inode number for the root node</title>
<updated>2024-11-11T21:33:07+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2024-11-11T21:27:42+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=86891054ef2a5d1b0b59c7c140aae284e7c5bd87'/>
<id>urn:sha1:86891054ef2a5d1b0b59c7c140aae284e7c5bd87</id>
<content type='text'>
Now that https://github.com/hanwen/go-fuse/issues/399 has
landed we can report an inode number for the root node.

Fixes https://github.com/rfjakob/gocryptfs/issues/580
</content>
</entry>
<entry>
<title>reverse: fix import sorting in root_node.go</title>
<updated>2024-11-11T21:33:07+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2024-11-11T21:26:55+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=12c0f3a0bdd11444b8bf880af7c63ea7850391f2'/>
<id>urn:sha1:12c0f3a0bdd11444b8bf880af7c63ea7850391f2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ctlsock: delete colliding orphaned socket file</title>
<updated>2024-09-03T14:01:46+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2024-09-03T14:00:24+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=2c01b1ab3774ace723b2700fc539dda5f0350633'/>
<id>urn:sha1:2c01b1ab3774ace723b2700fc539dda5f0350633</id>
<content type='text'>
Detect and delete an orphaned socket file that collides with
the ctlsock we want to create.

Fixes https://github.com/rfjakob/gocryptfs/issues/776
</content>
</entry>
<entry>
<title>ctlsocksrv: move Listen() call here</title>
<updated>2024-09-02T14:31:23+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2024-09-02T14:31:23+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=40abf968eddd54b6c03ac064d6e42cc6f1083146'/>
<id>urn:sha1:40abf968eddd54b6c03ac064d6e42cc6f1083146</id>
<content type='text'>
Prep for solving https://github.com/rfjakob/gocryptfs/issues/776
</content>
</entry>
<entry>
<title>reverse: fix force_owner</title>
<updated>2024-08-23T20:32:46+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2024-08-23T20:32:46+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f665be1178c72a4768e82bccdfa073a0cf309215'/>
<id>urn:sha1:f665be1178c72a4768e82bccdfa073a0cf309215</id>
<content type='text'>
Fixes https://github.com/rfjakob/gocryptfs/issues/809
</content>
</entry>
<entry>
<title>readpassword: show where stdin is connected</title>
<updated>2024-08-23T10:29:12+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2024-08-23T10:27:59+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b78e6a1c4cc0d1bbd3581d561773db85ee2e75b7'/>
<id>urn:sha1:b78e6a1c4cc0d1bbd3581d561773db85ee2e75b7</id>
<content type='text'>
Should make debugging situations like

	https://github.com/rfjakob/gocryptfs/issues/852
	Empty stdin in mkinitcpio hook

easier.

Examples:

$ echo -n "" | ./gocryptfs -init a
Choose a password for protecting your files.
Reading Password from stdin (connected to "pipe:[749878]")
Got empty Password from stdin

$ ./gocryptfs -init a &lt; /dev/null
Choose a password for protecting your files.
Reading Password from stdin (connected to "/dev/null")
Got empty Password from stdin

$ ./gocryptfs -init a &lt; /dev/zero
Choose a password for protecting your files.
Reading Password from stdin (connected to "/dev/zero")
fatal: maximum password length of 2048 bytes exceeded

$ ./gocryptfs -init a &lt; /dev/full
Choose a password for protecting your files.
Reading Password from stdin (connected to "/dev/full")
fatal: maximum password length of 2048 bytes exceeded

$ jakob@brikett:~/go/src/github.com/rfjakob/gocryptfs$ ./gocryptfs -init a &lt; /dev/urandom
Choose a password for protecting your files.
Reading Password from stdin (connected to "/dev/urandom")

Your master key is:

    4e45a317-595d8a2d-46493a30-97de86ef-
    540c7364-f0acc297-dd6f2592-7d9a5c97

If the gocryptfs.conf file becomes corrupted or you ever forget your password,
there is only one hope for recovery: The master key. Print it to a piece of
paper and store it in a drawer. This message is only printed once.
The gocryptfs filesystem has been created successfully.
You can now mount it using: gocryptfs a MOUNTPOINT
</content>
</entry>
<entry>
<title>stupidgcm: detect AES-GCM acceleration like crypto/tls</title>
<updated>2024-06-06T08:07:08+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2024-06-06T08:07:08+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f06f27e7bc098e334024c365004f9303e79997d9'/>
<id>urn:sha1:f06f27e7bc098e334024c365004f9303e79997d9</id>
<content type='text'>
Instead of just looking for AES, also look for PCLMULQDQ,
like crypto/tls does.

Fixes: https://github.com/rfjakob/gocryptfs/issues/822
</content>
</entry>
</feed>
