Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert "-S" ABI change #282

Merged
merged 2 commits into from
Feb 6, 2017
Merged

Revert "-S" ABI change #282

merged 2 commits into from
Feb 6, 2017

Conversation

rfjakob
Copy link
Collaborator

@rfjakob rfjakob commented Feb 5, 2017

Revert c3a7da5 and enforce empty password ban.

Context: tomm/cryptkeeper#23 #280

The change intended to fix a segfault when encfs is passed a zero-length
password (#241).

However, it also changed the CLI ABI which caused breakage in Cryptkeeper
(tomm/cryptkeeper#23) and other third-party
projects that call EncFS.

Fixes #280 .

This reverts commit c3a7da5.
The requirement that the password is not empty was not enforced
properly in all getUserKey() variants. Add the check to makeKey()
instead that is called in every code path.

This also fixes the crash desribed at #241 .
@rfjakob rfjakob added the bug label Feb 5, 2017
@rfjakob
Copy link
Collaborator Author

rfjakob commented Feb 5, 2017

@vgough I will merge this tomorrow unless you object

@jrchamp
Copy link

jrchamp commented Feb 6, 2017

Does it make sense to consider requiring the password length to be greater than 1? Or is that just a pointless, compatibility-breaking change?

@rfjakob rfjakob merged commit 3b1b07f into vgough:master Feb 6, 2017
@rfjakob
Copy link
Collaborator Author

rfjakob commented Feb 7, 2017

@jrchamp I'm already afraid that enforcing non-empty passwords will cause some complaints, I'd rather not take this further ;)

@rfjakob rfjakob deleted the issue280 branch July 23, 2017 17:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants