lp:ubuntu/karmic-proposed/ecryptfs-utils
- Get this branch:
- bzr branch lp:ubuntu/karmic-proposed/ecryptfs-utils
Branch merges
Branch information
Recent revisions
- 61. By Dustin Kirkland
-
* Cherry-pick upstream commit bzr r520
* src/utils/mount.ecryptfs_ private. c:
- fix bug LP: #313812, clear used keys on unmount
- add ecryptfs_unlink_ sigs to the mount opts, so that unmounts from
umount.ecryptfs behave similarly
- use ecryptfs_remove_ auth_tok_ from_keyring( ) on the sig and sig_fnek - 60. By Dustin Kirkland
-
* src/utils/
ecryptfs- setup-private, debian/control: LP: #456565
- fix typo, s/getext/gettext
- depend on gettext-base - 59. By Dustin Kirkland
-
src/utils/
ecryptfs- setup-private: fix bug where setup-private
incorrectly assumed that the home/private dir ownerships should
be owned by USER:USER; instead, default to USER:GROUP, where
GROUP is the USER's primary group by default, cherry-pick upstream
r463, LP: #445301 - 58. By Dustin Kirkland
-
[ Michael Terry ]
* src/utils/ecryptfs- setup=swap: clean up some error message reporting,
LP: #430891, #430890[ Dustin Kirkland ]
* doc/manpage/ecryptfs. 7: note the 64-char passphrase limit, LP: #386504
* src/utils/ecryptfs- setup-private: minor documentation change - 55. By Dustin Kirkland
-
[ James Westby ]
* src/libecryptfs/main.c flockfile the filehandle after checking that
we were able to successfully open it (LP: #403011)
* debian/libecryptfs0. shlibs: bump shlibs dep to 77 since we added new
symbols there - 54. By James Westby
-
flockfile the filehandle after checking that we were able to successfully
open if (LP: #403011) - 53. By Dustin Kirkland
-
[ Dustin Kirkland ]
* src/libecryptfs/key_management .c, src/pam_ ecryptfs/ pam_ecryptfs. c:
revert the zombie code removal from pam_ecryptfs as it seems this
bit is still needed; fix the source of the problem introduced in
commit r407; check for non-zero return codes; this problem would
manifest itself as a) unable to unlock screensaver, b) unable to
switch users, c) unable to mount home folder on initial login;
LP: #402222, #402029
* src/utils/ecryptfs- umount- private: use for loop to loop over key
ids on removal
* src/utils/mount.ecryptfs_ private. c: return non-zero on unmount failure
due to open sessions; handle this in ecryptfs-umount- private too; make
the flock() blocking; use /dev/shm for counter; add an iterator to the
counter file to prevent users from DoS'ing one another from accessing
their encrypted directories, LP: #402745
* debian/ecryptfs- utils.postinst: move /tmp counters to /dev/shm
* configure.ac: link against pam, silence shlib warning
* src/include/ecryptfs. h, src/libecryptfs /main.c,
src/pam_ecryptfs/ pam_ecryptfs. c, src/utils/ Makefile. am,
src/utils/mount.ecryptfs_ private. c: move two functions from
mount.ecryptfs_ private to libecryptfs, namely is_mounted() and
fetch_private_ mnt(); use these in both pam_ecryptfs and
mount.ecryptfs_ private; also move PRIVATE to ECRYPTFS_PRIVATE in
the ecryptfs.h headers; this will allow us to short-circuit some of the
costly key-loading code on pam_auth if the private dir is already
mounted, speeding up some subsequent authentications significantly,
LP: #402748
* doc/ecryptfs-mount-private. txt: removed the "$" to make copy-n-paste
more user friendly
* src/utils/ecryptfs- setup-private: when encrypting home, put the
.ecryptfs and .Private data in /home/.ecryptfs rather than /var/lib,
as users are forgetting to backup /var/lib, and are often putting
/home on a separate partition; furthermore, this gives users a place
to access their encrypted data for backup, rather than hiding the
data below $HOME, LP: #371719[ Tyler Hicks ]
* src/libecryptfs/cipher_ list.c, src/libecryptfs /module_ mgr.c:
add blowfish/56-bytes to the list of ciphers we officially support,
LP: #402790 - 52. By Dustin Kirkland
-
src/pam_
ecryptfs/ pam_ecryptfs. c: remove deprecated zombie code,
LP: #401770
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp:ubuntu/natty/ecryptfs-utils