Commit graph

29 commits

Author SHA1 Message Date
fa738a53e1 update to openssl of debian bullseye 2021-09-20 17:31:46 -05:00
Jeff Epler
da9e5d2bd4 Add a note about development status 2017-05-03 07:40:03 -05:00
Jeff Epler
177e93dd76 Merge pull request #1 from tmbinc/master
support for keyfiles
2016-01-20 18:34:18 -06:00
Felix Domke
7d35a02381 support for keyfiles 2016-01-21 00:55:03 +01:00
Jeff Epler
e4243f1985 note version number restriction, update note about invocation 2013-12-04 21:45:25 -06:00
Jeff Epler
f0083a97b6 Don't try to decrypt unsupported geli versions
Version 7 is in the wild (at least in FreeBSD 10) and it changed something
about encryption that isn't handled yet:
    http://svnweb.freebsd.org/base?view=revision&revision=238116
presumably earlier versions have other differences I haven't accounted for,
so don't try to read them either.
2013-12-04 21:44:06 -06:00
Jeff Epler
7b16581360 Notes on some spurious(?) valgrind diagnostics 2013-12-04 21:43:43 -06:00
Jeff Epler
9bb5d74b09 Squash some scan-build diagnostics 2013-12-01 09:34:15 -06:00
Jeff Epler
fb7baaedc3 Enable compiler optimization 2013-11-30 21:39:15 -06:00
Jeff Epler
6f92ca6e3f Remove unneeded file
I don't think there's anything left in this which is of particular
interest...
2013-11-30 21:39:15 -06:00
Jeff Epler
f6284fe90e Update README to reflect that Python is not needed now 2013-11-30 21:39:15 -06:00
Jeff Epler
85c877b1d9 Include the password which geli-test is encrypted with 2013-11-30 21:39:15 -06:00
Jeff Epler
9c046dda59 Let ungeli do its own computation of the keys
C's pkcs5v2 is much faster than Python (even a naive implementation)
and it stops the need to pass around keys on the commandline which is
good for a feeling of security.
2013-11-30 21:39:12 -06:00
Jeff Epler
9d4ea85db9 Don't read or write from a terminal 2013-11-30 21:38:37 -06:00
Jeff Epler
5748325d7a Improve error message 2013-11-30 21:37:52 -06:00
Jeff Epler
dc65e413e8 Get rid of debugging prints 2013-11-30 21:37:41 -06:00
Jeff Epler
2394cf4912 Update the readme with information about mounting encryped zfs pools 2013-11-30 12:15:18 -06:00
Jeff Epler
6b5322c751 Implement network block device on Linux 2013-11-30 12:00:57 -06:00
Jeff Epler
a8dfe23a14 Factor out nbd_decrypt_range 2013-11-30 12:00:57 -06:00
Jeff Epler
53383590d1 Remove unused code 2013-11-30 12:00:57 -06:00
Jeff Epler
1a4cfe99de Improve handling of incomplete reads
a failure with EAGAIN should be tried again (though a timeout / select
would be appropriate?); a success with zero bytes read or written is
treated as a failure (is this correct?)
2013-11-30 12:00:57 -06:00
Jeff Epler
08afc2c2f3 Correct function name in fatal call 2013-11-30 12:00:57 -06:00
Jeff Epler
41643a1668 A fatal-family function that can format its argument 2013-11-30 12:00:57 -06:00
Jeff Epler
2cf6867dce Hint to the compiler that these functions never return 2013-11-30 12:00:57 -06:00
Jeff Epler
f45bd432b9 Add the testing volume I've been using
It contains the text of the GNU GPL version 3, encrypted
2013-11-29 20:24:58 -06:00
Jeff Epler
60c3284796 Explain what this all is 2013-11-29 20:24:47 -06:00
Jeff Epler
a9f7d6a49a Add a program to decrypt blocks given the master key 2013-11-29 20:21:53 -06:00
Jeff Epler
3d086cdf52 Add a program to extract master keys from metadata 2013-11-29 20:21:28 -06:00
Jeff Epler
b72f84f9c5 State the license the software will be under 2013-11-29 20:21:14 -06:00