diff options
author | Jakob Unterwurzacher | 2021-06-21 11:32:04 +0200 |
---|---|---|
committer | Jakob Unterwurzacher | 2021-06-21 11:32:04 +0200 |
commit | 6b0e63c1a86946de23f549e7d80ea933a4a105f8 (patch) | |
tree | 59bc27a3f0822f413997b8fd3bc4e512747c7725 /mount.go | |
parent | c5d8fa83ae702017fc90769dff178fda6a7942a3 (diff) |
Improve startup debug output
The startup debug output was very verbose but still missing some
effective crypto settings.
Diffstat (limited to 'mount.go')
-rw-r--r-- | mount.go | 4 |
1 files changed, 1 insertions, 3 deletions
@@ -117,8 +117,6 @@ func doMount(args *argContainer) { args.noprealloc = true } } - // We cannot use JSON for pretty-printing as the fields are unexported - tlog.Debug.Printf("cli args: %#v", args) // Initialize gocryptfs (read config file, ask for password, ...) fs, wipeKeys := initFuseFrontend(args) // Try to wipe secret keys from memory after unmount @@ -308,7 +306,6 @@ func initFuseFrontend(args *argContainer) (rootNode fs.InodeEmbedder, wipeKeys f if args.allow_other && os.Getuid() == 0 { frontendArgs.PreserveOwner = true } - tlog.Debug.Printf("frontendArgs: %s", tlog.JSONDump(frontendArgs)) // Init crypto backend cCore := cryptocore.New(masterkey, cryptoBackend, contentenc.DefaultIVBits, args.hkdf, args.forcedecode) @@ -321,6 +318,7 @@ func initFuseFrontend(args *argContainer) (rootNode fs.InodeEmbedder, wipeKeys f } masterkey = nil // Spawn fusefrontend + tlog.Debug.Printf("frontendArgs: %s", tlog.JSONDump(frontendArgs)) if args.reverse { if cryptoBackend != cryptocore.BackendAESSIV { log.Panic("reverse mode must use AES-SIV, everything else is insecure") |