diff options
| author | Pavol Rusnak | 2019-12-27 22:27:57 +0100 | 
|---|---|---|
| committer | rfjakob | 2019-12-28 19:50:49 +0100 | 
| commit | 1364b44ae356da31e24e5605fe73a307e9d6fb03 (patch) | |
| tree | 22042a87f6a24f6768b3c6cd0ea319db26124d63 /internal/configfile | |
| parent | 7dda2363e1f8d30d5ebce5b6279452a2cf1bb77a (diff) | |
remove Trezor support
Diffstat (limited to 'internal/configfile')
| -rw-r--r-- | internal/configfile/config_file.go | 10 | ||||
| -rw-r--r-- | internal/configfile/config_test.go | 8 | ||||
| -rw-r--r-- | internal/configfile/feature_flags.go | 4 | 
3 files changed, 5 insertions, 17 deletions
| diff --git a/internal/configfile/config_file.go b/internal/configfile/config_file.go index e93affd..c27ecd4 100644 --- a/internal/configfile/config_file.go +++ b/internal/configfile/config_file.go @@ -46,10 +46,6 @@ type ConfFile struct {  	// mounting. This mechanism is analogous to the ext4 feature flags that are  	// stored in the superblock.  	FeatureFlags []string -	// TrezorPayload stores 32 random bytes used for unlocking the master key using -	// a Trezor security module. The randomness makes sure that a unique unlock -	// value is used for each gocryptfs filesystem. -	TrezorPayload []byte `json:",omitempty"`  	// Filename is the name of the config file. Not exported to JSON.  	filename string  } @@ -73,7 +69,7 @@ func randBytesDevRandom(n int) []byte {  // "password" and write it to "filename".  // Uses scrypt with cost parameter logN.  func Create(filename string, password []byte, plaintextNames bool, -	logN int, creator string, aessiv bool, devrandom bool, trezorPayload []byte) error { +	logN int, creator string, aessiv bool, devrandom bool) error {  	var cf ConfFile  	cf.filename = filename  	cf.Creator = creator @@ -93,10 +89,6 @@ func Create(filename string, password []byte, plaintextNames bool,  	if aessiv {  		cf.FeatureFlags = append(cf.FeatureFlags, knownFlags[FlagAESSIV])  	} -	if len(trezorPayload) > 0 { -		cf.FeatureFlags = append(cf.FeatureFlags, knownFlags[FlagTrezor]) -		cf.TrezorPayload = trezorPayload -	}  	{  		// Generate new random master key  		var key []byte diff --git a/internal/configfile/config_test.go b/internal/configfile/config_test.go index 0dd081c..832867c 100644 --- a/internal/configfile/config_test.go +++ b/internal/configfile/config_test.go @@ -62,7 +62,7 @@ func TestLoadV2StrangeFeature(t *testing.T) {  }  func TestCreateConfDefault(t *testing.T) { -	err := Create("config_test/tmp.conf", testPw, false, 10, "test", false, false, nil) +	err := Create("config_test/tmp.conf", testPw, false, 10, "test", false, false)  	if err != nil {  		t.Fatal(err)  	} @@ -83,14 +83,14 @@ func TestCreateConfDefault(t *testing.T) {  }  func TestCreateConfDevRandom(t *testing.T) { -	err := Create("config_test/tmp.conf", testPw, false, 10, "test", false, true, nil) +	err := Create("config_test/tmp.conf", testPw, false, 10, "test", false, true)  	if err != nil {  		t.Fatal(err)  	}  }  func TestCreateConfPlaintextnames(t *testing.T) { -	err := Create("config_test/tmp.conf", testPw, true, 10, "test", false, false, nil) +	err := Create("config_test/tmp.conf", testPw, true, 10, "test", false, false)  	if err != nil {  		t.Fatal(err)  	} @@ -111,7 +111,7 @@ func TestCreateConfPlaintextnames(t *testing.T) {  // Reverse mode uses AESSIV  func TestCreateConfFileAESSIV(t *testing.T) { -	err := Create("config_test/tmp.conf", testPw, false, 10, "test", true, false, nil) +	err := Create("config_test/tmp.conf", testPw, false, 10, "test", true, false)  	if err != nil {  		t.Fatal(err)  	} diff --git a/internal/configfile/feature_flags.go b/internal/configfile/feature_flags.go index 141b007..2d609f2 100644 --- a/internal/configfile/feature_flags.go +++ b/internal/configfile/feature_flags.go @@ -25,9 +25,6 @@ const (  	// Note that this flag does not change the password hashing algorithm  	// which always is scrypt.  	FlagHKDF -	// FlagTrezor means that "-trezor" was used when creating the filesystem. -	// The masterkey is protected using a Trezor device instead of a password. -	FlagTrezor  )  // knownFlags stores the known feature flags and their string representation @@ -40,7 +37,6 @@ var knownFlags = map[flagIota]string{  	FlagAESSIV:         "AESSIV",  	FlagRaw64:          "Raw64",  	FlagHKDF:           "HKDF", -	FlagTrezor:         "Trezor",  }  // Filesystems that do not have these feature flags set are deprecated. | 
