You can browse the source code for the development focus branch or get a copy of the branch using the command:
bzr branch lp://staging/ecryptfs

There are download files available for eCryptfs.

eCryptfs has 4 active reviews. See all merge proposals.

eCryptfs has 23 active branches owned by 11 people and 1 team. There were 0 commits in the last month.

Bazaar branches

Name Status Last Modified Last Commit
lp://staging/ecryptfs
Series: trunk
bug 1 Development 2017-06-09 15:39:12 UTC
894. Remove unreachable code when parsing ...

Author: Tyler Hicks
Revision Date: 2017-06-09 15:39:12 UTC

Remove unreachable code when parsing mount opt name value pairs

Revision 886 introduced a change to the mount option parsing code for
name-value pairs. A break was added to a loop once the first '=' is seen.
Before the break was added, it was possible that a '=' would be seen, then
memory allocated for the name portion of the string, then another '=' could be
seen and the previous name string be freed and then reallocated. However,
there's no longer a chance of needing to reallocate the name string so the
free() is not needed.

Discovered by Coverity (CID 1375979)

lp://staging/~wlxing/ecryptfs/lp342398 bug(Has a merge proposal) 1 Development 2017-06-10 01:45:29 UTC
895. src/utils/ecryptfs-stat.c, src/libecr...

Author: Jason Xing
Revision Date: 2017-06-10 01:10:42 UTC

src/utils/ecryptfs-stat.c, src/libecryptfs/ecryptfs-stat.c, src/include/ecryptfs.h: Add ecryptfs-stat support for encrypted filenames (LP: #342398)

lp://staging/~tyhicks/ecryptfs/cid1375979 (Has a merge proposal) 1 Development 2017-06-09 15:29:49 UTC
894. Remove unreachable code when parsing ...

Author: Tyler Hicks
Revision Date: 2017-06-09 15:21:43 UTC

Remove unreachable code when parsing mount opt name value pairs

Revision 886 introduced a change to the mount option parsing code for
name-value pairs. A break was added to a loop once the first '=' is seen.
Before the break was added, it was possible that a '=' would be seen, then
memory allocated for the name portion of the string, then another '=' could be
seen and the previous name string be freed and then reallocated. However,
there's no longer a chance of needed to reallocate the name string so the
free() is not needed.

Discovered by Coverity (CID 1375979)

lp://staging/~wlxing/ecryptfs/fix-command-termination (Has a merge proposal) 1 Development 2017-06-09 03:49:57 UTC
893. src/utils/ecryptfs-recover-private: P...

Author: Jason Xing
Revision Date: 2017-06-09 03:42:12 UTC

src/utils/ecryptfs-recover-private: Prevent ecryptfs-recover-private command is terminated because of printing warnings. So just get rid of line "exit 1" in the warn() function.

lp://staging/~wlxing/ecryptfs/lp1449253 bug(Has a merge proposal) 1 Development 2017-06-08 15:08:29 UTC
889. src/utils/ecryptfs-mount-private, doc...

Author: Jason Xing
Revision Date: 2017-06-08 15:08:29 UTC

src/utils/ecryptfs-mount-private, doc/manpage/ecryptfs-mount-private.1: ecryptfs-mount-private -h prints short usage message (LP: #1449253)

lp://staging/~wlxing/ecryptfs/lp1695767 bug(Has a merge proposal) 1 Development 2017-06-07 03:51:30 UTC
888. Reproduce case: 1) User doesn't insta...

Author: Jason Xing
Revision Date: 2017-06-07 03:29:02 UTC

Reproduce case:
1) User doesn't install openssl.
2) Run ecryptfs-manager and make selection 3.
It goes in the infinite loop...which means whatever selection you enter next cannot end this command or alter your option.

Explanation for the patch:
Adding several lines to take such a case into consideration, through testing whether "num_transitions" is set to zero or not we could prevent the infinite loop. If it is set to zero, it will return -EINVAL because "num_transitions" means how many options this command could show to users and zero means that user has no option to choose. (LP: #1695767)

lp://staging/~wlxing/ecryptfs/fix-bug-1678689 bug(Has a merge proposal) 1 Development 2017-04-03 02:36:00 UTC
886. src/libecryptfs/cmd_ln_parser.c: fix ...

Author: Jason Xing
Revision Date: 2017-04-02 06:35:19 UTC

src/libecryptfs/cmd_ln_parser.c: fix bug1419861

lp://staging/~alberto-o/ecryptfs/swapfile-fix bug(Has a merge proposal) 1 Development 2017-03-06 20:22:40 UTC
886. [ Alberto Pianon ] src/utils/ecryptfs...

Author: Alberto Pianon
Revision Date: 2017-03-06 20:10:26 UTC

[ Alberto Pianon ]
src/utils/ecryptfs-setup-swap: Fix to make the script work with swapfiles
and to use the right script to start encrypted swap (LP: #1670336)

lp://staging/~tyhicks/ecryptfs/lp1597154-packaging bug(Has a merge proposal) 1 Development 2016-07-08 21:32:48 UTC
884. debian/ecryptfs-utils.postinst: Fix a...

Author: Tyler Hicks
Revision Date: 2016-07-08 21:32:05 UTC

debian/ecryptfs-utils.postinst: Fix any unencrypted GPT swap partitions
that have mistakenly remained marked as auto mount. This should only
modify the swap partitions on systems that ecryptfs-setup-swap has been
used on. (LP: #1447282, LP: #1597154)

lp://staging/~rlaager/ecryptfs/fix-lp-1574174 bug(Has a merge proposal) 1 Development 2016-04-25 17:58:45 UTC
881. Fix improper "already mounted" errors...

Author: Richard Laager
Revision Date: 2016-04-25 17:54:44 UTC

Fix improper "already mounted" errors with ZFS

The obvious approach for using ZFS and ecryptfs together involves
creating a dataset like this:
zfs create -o mountpoint=/home/.ecryptfs/USER rpool/home/USER

As a result, /proc/mounts looks like this:
rpool/home/USER /home/.ecryptfs/USER zfs rw,xattr 0 0

ecryptfs-setup-private checked for existing mount points using a grep
which was effectively left-anchored. Unfortunately, this can match the
device column. A space at the beginning of the pattern corrects this.

I applied the same fix to the CRYPTDIR for consistency and correctness,
though I do not believe it was a practical problem in the same way.

lp://staging/~wiebe-halfgaar/ecryptfs/1539553 bug(Has a merge proposal) 1 Development 2016-01-29 11:53:16 UTC
874. LP: #1539553 Error handling reading ...

Author: Wiebe Cazemier
Revision Date: 2016-01-29 11:50:20 UTC

LP: #1539553

Error handling reading /dev/urandom fixed.

lp://staging/~ecryptfs/ecryptfs/website 1 Development 2015-11-22 04:44:20 UTC
31. fix config

Author: Dustin Kirkland 
Revision Date: 2015-11-22 04:44:20 UTC

fix config

lp://staging/~tyhicks/ecryptfs/namelen-test (Has a merge proposal) 1 Development 2014-11-26 18:41:18 UTC
835. Add test for validating reported name...

Author: Tyler Hicks
Revision Date: 2014-11-26 18:41:18 UTC

Add test for validating reported namelen value

lp://staging/~zmanji/ecryptfs/1270455 bug(Has a merge proposal) 1 Development 2014-01-18 17:12:15 UTC
825. Adding -o flags option to pass arbitr...

Author: Zameer Manji
Revision Date: 2014-01-18 17:10:21 UTC

Adding -o flags option to pass arbitrary flags to ecryptfs through the test harness.

lp://staging/~nobuto/ecryptfs/verify-wrapped-passphrase bug(Has a merge proposal) 1 Development 2013-03-18 15:43:21 UTC
776. src/utils/ecryptfs-verify: check exis...

Author: Nobuto Murata
Revision Date: 2013-03-18 15:42:19 UTC

src/utils/ecryptfs-verify: check existence and permission of
wrapped-passphrase (LP: #1156672)

lp://staging/~ecryptfs/ecryptfs/ecryptfs-utils-bootstrapped 1 Development 2012-07-26 08:05:43 UTC
651. bzr merge lp:ecryptfs && autoreconf -...

Author: Tyler Hicks
Revision Date: 2012-07-26 08:05:43 UTC

bzr merge lp:ecryptfs && autoreconf -i -v -f && intltoolize -f

lp://staging/~ecryptfs/ecryptfs/oldtrunk2 bug 1 Development 2012-05-14 21:40:57 UTC
687. * src/libecryptfs/module_mgr.c: - U...

Author: Dustin Kirkland 
Revision Date: 2012-05-13 18:10:16 UTC

* src/libecryptfs/module_mgr.c:
  - Use correct blowfish block size when displaying supported ciphers to
    the user

lp://staging/~kirkland/ecryptfs/new 1 Development 2012-02-13 15:06:40 UTC This branch has not been pushed to yet.
lp://staging/~serge-hallyn/ecryptfs/emountjan.2010 (Has a merge proposal) 1 Development 2011-01-03 21:57:27 UTC
520. define emount emount is a program to...

Author: Serge Hallyn
Revision Date: 2011-01-03 21:53:00 UTC

define emount

emount is a program to ease mounting and umounting of
various ecryptfs directories. For instance, I like to
have ~/Ubuntu\ One/gtd mounted on ~/gtd. To do this,
I would create .ecryptfs/gtd.conf, containing an fstab-like
entry:

  /home/serge/Ubuntu\ One/gtd /home/serge/gtd ecryptfs none 0 0

and create .ecryptfs/gtd.sig containing the signature. I
can ecryptfs-add-passphrase to preload my keychain, and then
just do

  emount gtd

to mount, and eumount gtd to unmount it.

lp://staging/~ecryptfs/ecryptfs/ecryptfs-utils bug(Has a merge proposal) 1 Development 2010-02-17 16:43:28 UTC
497. src/desktop/ecryptfs-record-passphras...

Author: Dustin Kirkland
Revision Date: 2010-02-17 16:43:28 UTC

src/desktop/ecryptfs-record-passphrase: improve text

lp://staging/~ev/ecryptfs/installer-support 1 Development 2009-08-19 15:03:15 UTC
455. * ecryptfs-setup-swap: - Add a -...

Author: Evan
Revision Date: 2009-08-19 15:01:21 UTC

 * ecryptfs-setup-swap:
   - Add a -no-reload option, so that it may be used in Ubuntu's installer.
   - Filter out RAM devices.
   - Cleaner check for swap block devices.

lp://staging/~mrooney/ecryptfs/nautilus-integration 1 Development 2009-05-28 13:32:10 UTC
411. merge from pythonapi branch

Author: Michael Rooney
Revision Date: 2009-05-28 13:32:10 UTC

merge from pythonapi branch

lp://staging/~kirkland/ecryptfs/release-tarballs 1 Development 2009-02-06 16:21:42 UTC
5. removed bz2 tarballs

Author: Dustin Kirkland 
Revision Date: 2008-10-21 13:03:42 UTC

removed bz2 tarballs

123 of 23 results
You can't create new branches for eCryptfs.