aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--init_dir.go4
-rw-r--r--internal/syscallcompat/quirks.go2
-rw-r--r--internal/tlog/log.go2
-rw-r--r--main.go2
-rw-r--r--masterkey.go8
-rw-r--r--mount.go2
6 files changed, 10 insertions, 10 deletions
diff --git a/init_dir.go b/init_dir.go
index 3546084..870604a 100644
--- a/init_dir.go
+++ b/init_dir.go
@@ -68,14 +68,14 @@ func initDir(args *argContainer) {
os.Exit(exitcodes.CipherDir)
}
if !args.xchacha && !stupidgcm.HasAESGCMHardwareSupport() {
- tlog.Info.Printf(tlog.ColorYellow +
+ tlog.Info.Println(tlog.ColorYellow +
"Notice: Your CPU does not have AES-GCM acceleration. Consider using -xchacha for better performance." +
tlog.ColorReset)
}
}
// Choose password for config file
if len(args.extpass) == 0 && args.fido2 == "" {
- tlog.Info.Printf("Choose a password for protecting your files.")
+ tlog.Info.Println("Choose a password for protecting your files.")
}
{
var password []byte
diff --git a/internal/syscallcompat/quirks.go b/internal/syscallcompat/quirks.go
index 110c00d..e30d605 100644
--- a/internal/syscallcompat/quirks.go
+++ b/internal/syscallcompat/quirks.go
@@ -16,5 +16,5 @@ const (
)
func logQuirk(s string) {
- tlog.Info.Printf(tlog.ColorYellow + "DetectQuirks: " + s + tlog.ColorReset)
+ tlog.Info.Println(tlog.ColorYellow + "DetectQuirks: " + s + tlog.ColorReset)
}
diff --git a/internal/tlog/log.go b/internal/tlog/log.go
index 62d791d..02c760c 100644
--- a/internal/tlog/log.go
+++ b/internal/tlog/log.go
@@ -73,7 +73,7 @@ func (l *toggledLogger) Printf(format string, v ...interface{}) {
return
}
msg := trimNewline(fmt.Sprintf(format, v...))
- l.Logger.Printf(l.prefix + msg + l.postfix)
+ l.Logger.Print(l.prefix + msg + l.postfix)
if l.Wpanic {
l.Logger.Panic(wpanicMsg + msg)
}
diff --git a/main.go b/main.go
index cd643b5..62a7985 100644
--- a/main.go
+++ b/main.go
@@ -120,7 +120,7 @@ func changePassword(args *argContainer) {
tlog.Fatal.Println(err)
os.Exit(exitcodes.WriteConf)
}
- tlog.Info.Printf(tlog.ColorGreen + "Password changed." + tlog.ColorReset)
+ tlog.Info.Println(tlog.ColorGreen + "Password changed." + tlog.ColorReset)
}
func main() {
diff --git a/masterkey.go b/masterkey.go
index d488441..c67c5d5 100644
--- a/masterkey.go
+++ b/masterkey.go
@@ -24,9 +24,9 @@ func unhexMasterKey(masterkey string, fromStdin bool) []byte {
tlog.Fatal.Printf("Master key has length %d but we require length %d", len(key), cryptocore.KeyLen)
os.Exit(exitcodes.MasterKey)
}
- tlog.Info.Printf("Using explicit master key.")
+ tlog.Info.Println("Using explicit master key.")
if !fromStdin {
- tlog.Info.Printf(tlog.ColorYellow +
+ tlog.Info.Println(tlog.ColorYellow +
"THE MASTER KEY IS VISIBLE VIA \"ps ax\" AND MAY BE STORED IN YOUR SHELL HISTORY!\n" +
"ONLY USE THIS MODE FOR EMERGENCIES" + tlog.ColorReset)
}
@@ -52,8 +52,8 @@ func handleArgsMasterkey(args *argContainer) (masterkey []byte) {
}
// "-zerokey"
if args.zerokey {
- tlog.Info.Printf("Using all-zero dummy master key.")
- tlog.Info.Printf(tlog.ColorYellow +
+ tlog.Info.Println("Using all-zero dummy master key.")
+ tlog.Info.Println(tlog.ColorYellow +
"ZEROKEY MODE PROVIDES NO SECURITY AT ALL AND SHOULD ONLY BE USED FOR TESTING." +
tlog.ColorReset)
return make([]byte, cryptocore.KeyLen)
diff --git a/mount.go b/mount.go
index 5c0f064..7f72773 100644
--- a/mount.go
+++ b/mount.go
@@ -412,7 +412,7 @@ func initGoFuse(rootNode fs.InodeEmbedder, args *argContainer) *fuse.Server {
mOpts := &fuseOpts.MountOptions
opts := make(map[string]string)
if args.allow_other {
- tlog.Info.Printf(tlog.ColorYellow + "The option \"-allow_other\" is set. Make sure the file " +
+ tlog.Info.Println(tlog.ColorYellow + "The option \"-allow_other\" is set. Make sure the file " +
"permissions protect your data from unwanted access." + tlog.ColorReset)
mOpts.AllowOther = true
// Make the kernel check the file permissions for us