<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/tests/reverse, branch v1.2.1</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.2.1</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.2.1'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2017-02-16T20:20:29+00:00</updated>
<entry>
<title>tests: reverse: check Access() call</title>
<updated>2017-02-16T20:20:29+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-02-16T20:20:29+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=62e7eb7d04793d7d629c1105a3eddf04e396ac24'/>
<id>urn:sha1:62e7eb7d04793d7d629c1105a3eddf04e396ac24</id>
<content type='text'>
</content>
</entry>
<entry>
<title>OSX compat: replace fusermount calls with fuse-unmount.bash</title>
<updated>2017-02-15T22:02:01+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-02-15T22:02:01+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ce2e610428c940c2bd5ca1790e7375117b1f6015'/>
<id>urn:sha1:ce2e610428c940c2bd5ca1790e7375117b1f6015</id>
<content type='text'>
Mac OS X does not have fusermount and uses umount instead.
The fuse-unmount.bash calls the appropriate command.
</content>
</entry>
<entry>
<title>ctlsock: prevent panic on invalid decrypt request</title>
<updated>2016-11-10T22:51:47+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-10T22:51:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d8fb28a1c38cda0b013c617404ad4a768effb704'/>
<id>urn:sha1:d8fb28a1c38cda0b013c617404ad4a768effb704</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ctlsock: implement EncryptPath for reverse mode, add tests</title>
<updated>2016-11-10T22:32:51+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-10T22:32:51+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c03fc46a5150715bf6aee20ce4b89d9704141220'/>
<id>urn:sha1:c03fc46a5150715bf6aee20ce4b89d9704141220</id>
<content type='text'>
</content>
</entry>
<entry>
<title>reverse: gocryptfs.conf was missing from the directory listings</title>
<updated>2016-10-08T20:25:08+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-08T20:25:08+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d25fcc6a4b095e37c77cce8f9de2ec0f12007ed5'/>
<id>urn:sha1:d25fcc6a4b095e37c77cce8f9de2ec0f12007ed5</id>
<content type='text'>
Fix the test for that and add checks in example_filesystems_test.
</content>
</entry>
<entry>
<title>reverse: make gocryptfs.conf mapping plaintextnames-aware</title>
<updated>2016-10-08T18:57:38+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-08T18:57:38+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f054353bd3b05ab0d3d024ec8fa809bc5fed1d08'/>
<id>urn:sha1:f054353bd3b05ab0d3d024ec8fa809bc5fed1d08</id>
<content type='text'>
Only in plaintextnames-mode AND with the config file at the
default location it will be mapped into the mountpoint.

Also adds a test for that.
</content>
</entry>
<entry>
<title>reverse: switch from GCM-SIV to AES-SIV</title>
<updated>2016-09-26T21:25:13+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-09-26T21:25:13+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e9bb8b800c6c724125ccd862f4d20946317b31f5'/>
<id>urn:sha1:e9bb8b800c6c724125ccd862f4d20946317b31f5</id>
<content type='text'>
GCM-SIV is not yet finalized, and the reference implemenation is
painfully slow at about 2 MB/s. Switch to AES-SIV.
</content>
</entry>
<entry>
<title>tests: add reverse linux tarball test</title>
<updated>2016-09-25T18:04:03+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-09-25T18:04:03+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=32e35adcadb99bdcbc129fe419269a675cb4fd40'/>
<id>urn:sha1:32e35adcadb99bdcbc129fe419269a675cb4fd40</id>
<content type='text'>
</content>
</entry>
<entry>
<title>reverse: add symlink encryption and Readlink support</title>
<updated>2016-09-25T16:01:24+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-09-25T16:01:24+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b883dd10a62eb8d7ddf589e2878d8e0f65a90e83'/>
<id>urn:sha1:b883dd10a62eb8d7ddf589e2878d8e0f65a90e83</id>
<content type='text'>
</content>
</entry>
<entry>
<title>reverse: more thorough longname stat test</title>
<updated>2016-09-25T14:43:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-09-25T13:32:46+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ffdb7cd47af8488ff282dbcbefdf884b9aadadff'/>
<id>urn:sha1:ffdb7cd47af8488ff282dbcbefdf884b9aadadff</id>
<content type='text'>
Now also verifies the returned file size.
</content>
</entry>
</feed>
