| Commit message (Collapse) | Author | Age |
... | |
| |
|
| |
|
|
|
|
| |
no agent.
|
| |
|
| |
|
|
|
|
|
|
| |
I was offline last night and going by function signatures, and unable to
tell which was which. Note sure it matters to HMAC which comes first;
better safe than sorry.
|
|
|
|
|
|
|
| |
Per bugs/S3_bucket_uses_the_same_key_for_encryption_and_hashing
It may be paranoid to worry about the cipher being recovered
from hmac keys, but yes.. let's be paranoid.
|
|
|
|
|
|
| |
Forking a new process rather than relying on a thread to feed gpg.
The feeder thread was stalling, probably when the main thread got
to the point it was wait()ing on the gpg to exit.
|
|
|
|
|
|
| |
For HMAC, using the Data.Digest.Pure.SHA library. I have been avoiding
this library for checksumming generally, since it's (probably) not
as fast as external utilities, but it's fine to use it for HMAC.
|
| |
|
| |
|
|
|
|
|
| |
Piping data through gpg with symmetric cipher is working.
Only Key encryption is not done.
|
|
|
|
|
| |
Encrypted remotes don't yet encrypt data, but git annex initremote can
be used to generate a cipher and add additional gpg keys that can use it.
|
|
|