aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2017-08-15crypto: Switch from session to user keyringJoe Richey joerichey@google.com
2017-08-13util: Slice/Pointer conversion fits in MatInt32Joseph Richey
2017-08-07Merge pull request #33 from ebiggers/fix_hashing_calibrationJoseph Richey
actions: calculate password hash difficulty correctly
2017-08-07Merge pull request #32 from ebiggers/ErrKeyFileLength_fixJoseph Richey
cmd/fscrypt: fix help message for ErrKeyFileLength
2017-08-07actions: calculate password hash difficulty correctlyEric Biggers
'fscrypt setup' is supposed to calibrate the Argon2 password hashing difficulty to 1s by default, but actually it was setting it to only 1s / num_cpus because the hashing is done with all CPUs and it is timed using the CLOCK_PROCESS_CPUTIME_ID clock, which measures the time spent by all threads in the process. Fix this by dividing the elapsed time by HashingCosts.Parallelism, which is used as the number of threads.
2017-08-07cmd/fscrypt: fix help message for ErrKeyFileLengthEric Biggers
The key file for the raw_key source is required to contain a wrapping key (32 bytes), not a policy key (64 bytes).
2017-07-25Merge pull request #30 from google/josephlr-patch-1Joseph Richey
README reformatting
2017-07-25README reformattingJoseph Richey
The version badge was broken. This fixes it and inlines the version in the top line.
2017-07-23Merge pull request #29 from google/docsJoseph Richey
Fixed cloning instructions
2017-07-23README: Fixed cloning documentationJoseph Richey
2017-07-19Merge pull request #27 from google/testsJoseph Richey
coveralls: Adding Travis CI integration
2017-07-19Build system: no longer run make gen for make allJoe Richey joerichey@google.com
2017-07-19crypto: Add more tests for bad key lengthsJoe Richey joerichey@google.com
2017-07-19README: add badges for license and code coverageJoe Richey joerichey@google.com
2017-07-19coveralls: Adding Travis CI integrationJoe Richey joerichey@google.com
2017-07-18Merge pull request #23 from google/fixJoseph Richey
travis CI: Test config file
2017-07-18Makefile: typoJoe Richey joerichey@google.com
2017-07-18Update documentation about new build systemJoe Richey joerichey@google.com
2017-07-18metadata: Remove "go generate" and regenerateJoe Richey joerichey@google.com
2017-07-18tests: Unit tests and Integration tests workJoe Richey joerichey@google.com
Now the testing functions will skip the integration tests if a testing filesystem is not specified.
2017-07-18Travis.yml and Makefile now run integration tests.Joe Richey joerichey@google.com
2017-07-18Merge pull request #22 from google/fixJoseph Richey
Fixing fscrypt build system
2017-07-17actions: Fixed flaky hashing testJoe Richey joerichey@google.com
2017-07-17Better output for input_fail.pyJoe Richey joerichey@google.com
2017-07-17cmd/fscrypt: more nits to fix "make lint"Joe Richey joerichey@google.com
2017-07-17Small fixes so "make lint" doesn't complain.Joe Richey joerichey@google.com
2017-07-17pam: Added missing documentation (fix "make lint")Joe Richey joerichey@google.com
2017-07-17Changes from "make format"Joe Richey joerichey@google.com
2017-07-17Makefile: Rewrite for presubmit checksJoe Richey joerichey@google.com
The commit reorganizes the Makefile, so that "make check" can run on each PR to detect any errors.
2017-07-17Merge pull request #21 from google/fixJoseph Richey
Add PAM package
2017-07-17cmd/fscrypt: username and login token fixJoe Richey joerichey@google.com
The commit changes how we get the username representation, and uses the new pam API for checking the proposed login token.
2017-07-17pam: IsUserLoginToken now uses PAM libraryJoe Richey joerichey@google.com
2017-07-17pam: Add Go wrappers around PAM functionsJoe Richey joerichey@google.com
This commit provides a Go interface to the PAM functions.
2017-07-17pam: C implementation for conversation and cleanupJoe Richey joerichey@google.com
This commit adds in a C implementation for the pam_conv we will use in login.go as well as adding three CleanupFuncs that will be used with pam_set_data(). It also adds copyInfoSecret() which should be paired with freeSecret().
2017-07-17crypto: Conversion to/from C stringsJoe Richey joerichey@google.com
2017-07-17pam: Add PAM Items and FlagsJoe Richey joerichey@google.com
Code pulled from github.com/msteinert/pam
2017-07-17util: Add conversions for byte/pointer arraysJoe Richey joerichey@google.com
2017-07-17Merge pull request #20 from google/fixJoseph Richey
Refactor ReadLine functions
2017-07-17cmd/fscrypt: prompts now use command functionsJoe Richey joerichey@google.com
2017-07-17util: Move line reading into common packageJoe Richey joerichey@google.com
2017-07-17Merge pull request #19 from google/fixJoseph Richey
Separate encryption support from metadata support
2017-07-17cmd/fscrypt: Improve "fscrypt status"Joe Richey joerichey@google.com
Now that we can distinguish between lacking encryption support and lacking fscrypt metadata, "fscrypt status" can now display this additional information.
2017-07-17cmd/fscrypt: Check support before encryptingJoe Richey joerichey@google.com
Almost all actions only need to to check that the fscrypt metadata exists (this is handled by the Mount methods). Only "fscrypt encrypt" need to be sure the filesystem also supports encryption, so this check is added.
2017-07-17filesystem: Distinguish support and setup for fsJoe Richey joerichey@google.com
This commit splits two pieces of functionality. Detecting if the fscrypt metadata exists is now in CheckSetup() and checking if the filesystem supports encryption is now in CheckSupport().
2017-07-17Merge pull request #18 from google/fixJoseph Richey
Polices can now be directly unlocked with Protectors
2017-07-17actions: Add tests for policy unlockingJoe Richey joerichey@google.com
2017-07-17actions: Protectors can directly unlock PoliciesJoe Richey joerichey@google.com
In addition to using callbacks, unlocked Protectors can now directly unlock a policy. The error codes are updated to make more sense.
2017-07-14Merge pull request #16 from google/fixJoseph Richey
Use Description when placing keys in the keyring
2017-07-14actions: Policies now have Description methodJoe Richey joerichey@google.com
2017-07-14crypto: Use single description parameterJoe Richey joerichey@google.com
Instead of using the service+descriptor parameters (which are always combined in the same way), use a single description parameter.