<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fscrypt.git/actions, branch refactor</title>
<subtitle>Go tool for managing Linux filesystem encryption
</subtitle>
<id>https://git.hodgden.net/cgit.cgi/fscrypt.git/atom?h=refactor</id>
<link rel='self' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/atom?h=refactor'/>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/'/>
<updated>2017-10-20T18:24:14Z</updated>
<entry>
<title>crypto: Remove crypto.randReader</title>
<updated>2017-10-20T18:24:14Z</updated>
<author>
<name>Joseph Richey</name>
<email>joerichey94@gmail.com</email>
</author>
<published>2017-10-19T18:34:07Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=6de6b14a09b3695fe797e5fd59a04b3c3834641a'/>
<id>urn:sha1:6de6b14a09b3695fe797e5fd59a04b3c3834641a</id>
<content type='text'>
As #19274 is now fixed in Go 1.9, there is no longer any reason to have
a duplicate implementation to the standard library. We can now move
safely to crypto/rand.
</content>
</entry>
<entry>
<title>util: Add better user lookup functions</title>
<updated>2017-10-19T10:34:51Z</updated>
<author>
<name>Joseph Richey</name>
<email>joerichey94@gmail.com</email>
</author>
<published>2017-10-19T10:15:28Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=b7de8535f899f2b88d61f4f1264fe6a272196536'/>
<id>urn:sha1:b7de8535f899f2b88d61f4f1264fe6a272196536</id>
<content type='text'>
When looking up users in fscrypt, we often want to proceed even if the
requested uid doesn't appear to be a valid user on the system. This
mainly occurs when a user is deleted, but they still have a login
protector on disk.

Thus, GetUser() with a bad uid creates a fake user with a pretty
placeholder name. The corresponding call sites of util.EffectiveUser are
changed (often simplifying logic). Various documentation is updated and
typos are fixed.
</content>
</entry>
<entry>
<title>security: Change user keyring lookup algorithm</title>
<updated>2017-09-01T07:53:07Z</updated>
<author>
<name>Joseph Richey</name>
<email>joerichey94@gmail.com</email>
</author>
<published>2017-09-01T07:53:07Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=1ce72a7367967152948dbe332ea8d9834f194c27'/>
<id>urn:sha1:1ce72a7367967152948dbe332ea8d9834f194c27</id>
<content type='text'>
Now instead of spawning a seperate thread we alternate between changing
the euid and ruid to both find the keyring and link it to the process
keyring. Note that we also ensure that the user keyring is linked into
the root keyring whenever possible.
</content>
</entry>
<entry>
<title>actions: context now hold a target user.User</title>
<updated>2017-08-31T01:00:04Z</updated>
<author>
<name>Joe Richey</name>
<email>joerichey@google.com</email>
</author>
<published>2017-08-31T01:00:04Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=dad0a047cefc79cbe664afc07d69db6b8bf123bd'/>
<id>urn:sha1:dad0a047cefc79cbe664afc07d69db6b8bf123bd</id>
<content type='text'>
This user is used with policies to interface with the keryings and with
protectors to indicate which user's login passphrase should be used to
protectors of type pam_passphrase.
</content>
</entry>
<entry>
<title>Various small nits a helper functions for PAM</title>
<updated>2017-08-22T18:51:31Z</updated>
<author>
<name>Joe Richey joerichey@google.com</name>
<email>joerichey@google.com</email>
</author>
<published>2017-07-19T22:40:35Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=f3f1d2f98de26e8180c56d87aaad0e4e98fb4e47'/>
<id>urn:sha1:f3f1d2f98de26e8180c56d87aaad0e4e98fb4e47</id>
<content type='text'>
</content>
</entry>
<entry>
<title>cmd/fscrypt: purge command now clears cache</title>
<updated>2017-08-18T05:49:44Z</updated>
<author>
<name>Joe Richey joerichey@google.com</name>
<email>joerichey@google.com</email>
</author>
<published>2017-08-16T01:11:29Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=151e8965fa3a9c8f65e316430f9df0fa763fb02d'/>
<id>urn:sha1:151e8965fa3a9c8f65e316430f9df0fa763fb02d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>crypto: Switch from session to user keyring</title>
<updated>2017-08-15T20:16:08Z</updated>
<author>
<name>Joe Richey joerichey@google.com</name>
<email>joerichey@google.com</email>
</author>
<published>2017-08-15T19:06:11Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=5e8dfc196020693d2a9dc809cf6bc87096ddc09f'/>
<id>urn:sha1:5e8dfc196020693d2a9dc809cf6bc87096ddc09f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>actions: calculate password hash difficulty correctly</title>
<updated>2017-08-07T17:05:53Z</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2017-08-07T17:05:53Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=297b46e65415c7d032844b39e7504bb862e2ea28'/>
<id>urn:sha1:297b46e65415c7d032844b39e7504bb862e2ea28</id>
<content type='text'>
'fscrypt setup' is supposed to calibrate the Argon2 password hashing
difficulty to 1s by default, but actually it was setting it to only 1s /
num_cpus because the hashing is done with all CPUs and it is timed using
the CLOCK_PROCESS_CPUTIME_ID clock, which measures the time spent by all
threads in the process.  Fix this by dividing the elapsed time by
HashingCosts.Parallelism, which is used as the number of threads.
</content>
</entry>
<entry>
<title>tests: Unit tests and Integration tests work</title>
<updated>2017-07-19T04:08:02Z</updated>
<author>
<name>Joe Richey joerichey@google.com</name>
<email>joerichey@google.com</email>
</author>
<published>2017-07-19T04:08:02Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=3afdd84a5c0cea217043e9d32ce61e9f6bccf18b'/>
<id>urn:sha1:3afdd84a5c0cea217043e9d32ce61e9f6bccf18b</id>
<content type='text'>
Now the testing functions will skip the integration tests if a testing
filesystem is not specified.
</content>
</entry>
<entry>
<title>actions: Fixed flaky hashing test</title>
<updated>2017-07-18T06:29:27Z</updated>
<author>
<name>Joe Richey joerichey@google.com</name>
<email>joerichey@google.com</email>
</author>
<published>2017-07-18T06:29:27Z</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=17f7dd867d0fd450377c6862c0782483d39ae408'/>
<id>urn:sha1:17f7dd867d0fd450377c6862c0782483d39ae408</id>
<content type='text'>
</content>
</entry>
</feed>
