Updated debdiff.  Thoroughly tested:

 * ecryptfs-add-passphrase:
 - tested with no and bad parameters, still shows usage statement
  - regression tested with command line parameters, and using stdin
  - verified that passphrase makes it into the keyring
   . check with "keyctl show"
   . clear with "keyctl clear @u")
 - tested adding arbitrary trailing new line characters and no newline character
   . verifying fgets() is working as expected

 * ecryptfs-wrap-passphrase:
  - tested with no and bad parameters, still shows usage statement
  - regression tested with command line parameters, and using stdin
  - verify that the passphrase get's encrypted
   . cat encrypted file
  - verify that the passphrase can be decrypted with the encryption passphrase
   . ecryptfs-unwrap-passphrase

 * ecryptfs-setup-private
 - tested with good and bad passphrases
 - tested on the command line, and interactively
 - unwrapped the passphrases written by ecryptfs-setup-private
 - mounted/unmounted
 - logged out, mounted/unmounted
 - rebooted, mounted/unmounted


:-Dustin

** Attachment added: "ecryptfs-utils.debdiff"
   http://launchpadlibrarian.net/18823465/ecryptfs-utils.debdiff

-- 
ecryptfs-setup-private potentially exposes passwords in the process table
https://bugs.launchpad.net/bugs/287908
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to