Updated debdiff. Thoroughly tested: * ecryptfs-add-passphrase: - tested with no and bad parameters, still shows usage statement - regression tested with command line parameters, and using stdin - verified that passphrase makes it into the keyring . check with "keyctl show" . clear with "keyctl clear @u") - tested adding arbitrary trailing new line characters and no newline character . verifying fgets() is working as expected
* ecryptfs-wrap-passphrase: - tested with no and bad parameters, still shows usage statement - regression tested with command line parameters, and using stdin - verify that the passphrase get's encrypted . cat encrypted file - verify that the passphrase can be decrypted with the encryption passphrase . ecryptfs-unwrap-passphrase * ecryptfs-setup-private - tested with good and bad passphrases - tested on the command line, and interactively - unwrapped the passphrases written by ecryptfs-setup-private - mounted/unmounted - logged out, mounted/unmounted - rebooted, mounted/unmounted :-Dustin ** Attachment added: "ecryptfs-utils.debdiff" http://launchpadlibrarian.net/18823465/ecryptfs-utils.debdiff -- ecryptfs-setup-private potentially exposes passwords in the process table https://bugs.launchpad.net/bugs/287908 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
