| Age | Commit message (Collapse) | Author | 
|---|
|  | Allows to use /dev/random for generating the master key instead of the
default Go implementation. When the kernel random generator has been
properly initialized both are considered equally secure, however:
* Versions of Go prior to 1.9 just fall back to /dev/urandom if the
  getrandom() syscall would be blocking (Go Bug #19274)
* Kernel versions prior to 3.17 do not support getrandom(), and there
  is no check if the random generator has been properly initialized
  before reading from /dev/urandom
This is especially useful for embedded hardware with low-entroy. Please
note that generation of the master key might block indefinitely if the
kernel cannot harvest enough entropy. | 
|  | Currently fails, as reported at
https://github.com/rfjakob/gocryptfs/issues/130 . | 
|  | We used to return code 8, now we return code 12 as documented in
the man page.
Also adds a test. | 
|  | This commit defines all exit codes in one place in the exitcodes
package.
Also, it adds a test to verify the exit code on incorrect
password, which is what SiriKali cares about the most.
Fixes https://github.com/rfjakob/gocryptfs/issues/77 . | 
|  | From the comment:
// CheckTrailingGarbage tries to read one byte from stdin and exits with a
// fatal error if the read returns any data.
// This is meant to be called after reading the password, when there is no more
// data expected. This helps to catch problems with third-party tools that
// interface with gocryptfs. | 
|  | Also, make the other password tests more rigorous by verifying the
fs content. | 
|  | It was actually testing extpass a second time. | 
|  | Also fixes the failure to run the benchmarks do to the missing
gocryptfs.diriv. |