<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/tests, branch v1.2</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.2</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.2'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2016-11-26T14:20:54+00:00</updated>
<entry>
<title>tests: don't call t.Fatal in checkExampleFS</title>
<updated>2016-11-26T14:20:54+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-26T14:17:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=3f5c48e0585f6fe0782aded541e42879eb570e69'/>
<id>urn:sha1:3f5c48e0585f6fe0782aded541e42879eb570e69</id>
<content type='text'>
Calling t.Fatal means that the parent test has no chance
to clean up.
</content>
</entry>
<entry>
<title>benchmark.bash: double write length</title>
<updated>2016-11-26T11:36:55+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-26T11:36:55+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=10884603d88eb262e314d4fbe1a7a146cc66c6d1'/>
<id>urn:sha1:10884603d88eb262e314d4fbe1a7a146cc66c6d1</id>
<content type='text'>
Writing 1000 128KB blocks takes only 1 second and yielded
inconsistent results. With 2000, things look saner.
</content>
</entry>
<entry>
<title>tests: rename fsstress-loopback.bash to fsstress-gocryptfs.bash</title>
<updated>2016-11-17T21:51:25+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-17T21:46:21+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=41af353dcb1b6ef12b62616f5f3d424d5fa15212'/>
<id>urn:sha1:41af353dcb1b6ef12b62616f5f3d424d5fa15212</id>
<content type='text'>
The primary use is testing gocryptfs, after all.
</content>
</entry>
<entry>
<title>tests: add OpenTruncateRead test</title>
<updated>2016-11-17T21:48:50+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-07T19:58:12+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1bae06a16a94950cfbb134f64a765bb34db1f167'/>
<id>urn:sha1:1bae06a16a94950cfbb134f64a765bb34db1f167</id>
<content type='text'>
This is a regression test for the issue that was fixed by the
last commit.
</content>
</entry>
<entry>
<title>ctlsock: prevent panic on invalid decrypt request</title>
<updated>2016-11-10T22:51:47+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-10T22:51:47+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d8fb28a1c38cda0b013c617404ad4a768effb704'/>
<id>urn:sha1:d8fb28a1c38cda0b013c617404ad4a768effb704</id>
<content type='text'>
</content>
</entry>
<entry>
<title>tests: allow overriding hardcoded arguments in Mount helper</title>
<updated>2016-11-10T22:47:04+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-10T22:47:04+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c2629bd9b5b814cb7abaf6ddc42bd9f1f306b30b'/>
<id>urn:sha1:c2629bd9b5b814cb7abaf6ddc42bd9f1f306b30b</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ctlsock: implement EncryptPath for reverse mode, add tests</title>
<updated>2016-11-10T22:32:51+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-10T22:32:51+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c03fc46a5150715bf6aee20ce4b89d9704141220'/>
<id>urn:sha1:c03fc46a5150715bf6aee20ce4b89d9704141220</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ctlsock: add initial limited implementation</title>
<updated>2016-11-09T23:27:08+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-09T23:27:08+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=75ebb28a625bc16d145f5acd9e0cc1d305716afe'/>
<id>urn:sha1:75ebb28a625bc16d145f5acd9e0cc1d305716afe</id>
<content type='text'>
At the moment, in forward mode you can only encrypt paths
and in reverse mode you can only decrypt paths.
</content>
</entry>
<entry>
<title>Add Go 1.4 compatibility layer for raw64</title>
<updated>2016-11-01T18:25:59+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-01T18:20:55+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d15122d3d6b67d42617ed9950ce5273d0dba64fd'/>
<id>urn:sha1:d15122d3d6b67d42617ed9950ce5273d0dba64fd</id>
<content type='text'>
Using raw64 will not work, but at least it will compile.
</content>
</entry>
<entry>
<title>tests: add raw64 tests</title>
<updated>2016-11-01T17:42:10+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-11-01T17:39:00+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=964e0e6b3634973fb9512858b4ae8707c825aaaf'/>
<id>urn:sha1:964e0e6b3634973fb9512858b4ae8707c825aaaf</id>
<content type='text'>
Also, use "%#v" instead of JSON for debug output.
This means we can unexport all fields.
</content>
</entry>
</feed>
