<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/tests/reverse, branch det</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=det</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=det'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2017-03-07T19:53:58+00:00</updated>
<entry>
<title>tests: reverse: don't run tests that ignore "-plaintextnames" twice</title>
<updated>2017-03-07T19:53:58+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-07T19:53:58+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a80d798c2deab44e2abc37eeae59546f0d7eec40'/>
<id>urn:sha1:a80d798c2deab44e2abc37eeae59546f0d7eec40</id>
<content type='text'>
TestMain() runs all tests twice, once with plaintextnames=true and once
with false. Several tests mount their own filesystem and ignore the
plaintextnames variable. It makes no sense to run them twice, so
skip execution when plaintextnames is set.
</content>
</entry>
<entry>
<title>Report correct symbolic link dentry sizes</title>
<updated>2017-03-07T19:46:58+00:00</updated>
<author>
<name>M. Vefa Bicakci</name>
</author>
<published>2017-03-07T09:09:09+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d48ccb3ddab71773a991b8f1b062901ff5b435b0'/>
<id>urn:sha1:d48ccb3ddab71773a991b8f1b062901ff5b435b0</id>
<content type='text'>
Prior to this commit, gocryptfs's reverse mode did not report correct
directory entry sizes for symbolic links, where the dentry size needs to
be the same as the length of a string containing the target path.

This commit corrects this issue and adds a test case to verify the
correctness of the implementation.

This issue was discovered during the use of a strict file copying program
on a reverse-mounted gocryptfs file system.
</content>
</entry>
<entry>
<title>tests: reverse: check Access() call</title>
<updated>2017-02-16T20:20:29+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-02-16T20:20:29+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=62e7eb7d04793d7d629c1105a3eddf04e396ac24'/>
<id>urn:sha1:62e7eb7d04793d7d629c1105a3eddf04e396ac24</id>
<content type='text'>
</content>
</entry>
<entry>
<title>OSX compat: replace fusermount calls with fuse-unmount.bash</title>
<updated>2017-02-15T22:02:01+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-02-15T22:02:01+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ce2e610428c940c2bd5ca1790e7375117b1f6015'/>
<id>urn:sha1:ce2e610428c940c2bd5ca1790e7375117b1f6015</id>
<content type='text'>
Mac OS X does not have fusermount and uses umount instead.
The fuse-unmount.bash calls the appropriate command.
</content>
</entry>
<entry>
<title>ctlsock: prevent panic on invalid decrypt request</title>
<updated>2016-11-10T22:51:47+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-10T22:51:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d8fb28a1c38cda0b013c617404ad4a768effb704'/>
<id>urn:sha1:d8fb28a1c38cda0b013c617404ad4a768effb704</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ctlsock: implement EncryptPath for reverse mode, add tests</title>
<updated>2016-11-10T22:32:51+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-10T22:32:51+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c03fc46a5150715bf6aee20ce4b89d9704141220'/>
<id>urn:sha1:c03fc46a5150715bf6aee20ce4b89d9704141220</id>
<content type='text'>
</content>
</entry>
<entry>
<title>reverse: gocryptfs.conf was missing from the directory listings</title>
<updated>2016-10-08T20:25:08+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-08T20:25:08+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d25fcc6a4b095e37c77cce8f9de2ec0f12007ed5'/>
<id>urn:sha1:d25fcc6a4b095e37c77cce8f9de2ec0f12007ed5</id>
<content type='text'>
Fix the test for that and add checks in example_filesystems_test.
</content>
</entry>
<entry>
<title>reverse: make gocryptfs.conf mapping plaintextnames-aware</title>
<updated>2016-10-08T18:57:38+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-08T18:57:38+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f054353bd3b05ab0d3d024ec8fa809bc5fed1d08'/>
<id>urn:sha1:f054353bd3b05ab0d3d024ec8fa809bc5fed1d08</id>
<content type='text'>
Only in plaintextnames-mode AND with the config file at the
default location it will be mapped into the mountpoint.

Also adds a test for that.
</content>
</entry>
<entry>
<title>reverse: switch from GCM-SIV to AES-SIV</title>
<updated>2016-09-26T21:25:13+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-09-26T21:25:13+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e9bb8b800c6c724125ccd862f4d20946317b31f5'/>
<id>urn:sha1:e9bb8b800c6c724125ccd862f4d20946317b31f5</id>
<content type='text'>
GCM-SIV is not yet finalized, and the reference implemenation is
painfully slow at about 2 MB/s. Switch to AES-SIV.
</content>
</entry>
<entry>
<title>tests: add reverse linux tarball test</title>
<updated>2016-09-25T18:04:03+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-09-25T18:04:03+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=32e35adcadb99bdcbc129fe419269a675cb4fd40'/>
<id>urn:sha1:32e35adcadb99bdcbc129fe419269a675cb4fd40</id>
<content type='text'>
</content>
</entry>
</feed>
