===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
fscrypt-0.2.9/README.md-132-```
fscrypt-0.2.9/README.md:133:Running `make` in `$GOPATH/src/github.com/google/fscrypt` builds the
fscrypt-0.2.9/README.md-134-executable (`fscrypt`) and PAM module (`pam_fscrypt.so`) in the `bin/`
##############################################
fscrypt-0.2.9/README.md-147-Alternatively, if you only want to install the `fscrypt` binary to
fscrypt-0.2.9/README.md:148:`$GOPATH/bin`, simply run:
fscrypt-0.2.9/README.md-149-```shell
##############################################
fscrypt-0.2.9/README.md-321-passphrase hash may still be recoverable from disk), then instead run
fscrypt-0.2.9/README.md:322:`sudo passwd $USER` and enter your existing passphrase.  This re-hashes your
fscrypt-0.2.9/README.md-323-existing passphrase with the new `rounds`.
##############################################
fscrypt-0.2.9/README.md-766-authentication.  The most common case of this is public-key ssh login.  To
fscrypt-0.2.9/README.md:767:trigger a password authentication event, run `su $USER -c exit`.
fscrypt-0.2.9/README.md-768-
##############################################
fscrypt-0.2.9/cli-tests/README.md-44-
fscrypt-0.2.9/cli-tests/README.md:45:* `$DEV`, `$DEV_ROOT`: ext4 filesystem images with encryption enabled
fscrypt-0.2.9/cli-tests/README.md-46-
fscrypt-0.2.9/cli-tests/README.md:47:* `$MNT`, `$MNT_ROOT`: the mountpoints of the above filesystems.
fscrypt-0.2.9/cli-tests/README.md-48-  Initially all filesystems are mounted and are setup for fscrypt.
fscrypt-0.2.9/cli-tests/README.md:49:  Login protectors will be stored on `$MNT_ROOT`.
fscrypt-0.2.9/cli-tests/README.md-50-
fscrypt-0.2.9/cli-tests/README.md:51:* `$TMPDIR`: a temporary directory that the test may use
fscrypt-0.2.9/cli-tests/README.md-52-
fscrypt-0.2.9/cli-tests/README.md:53:* `$FSCRYPT_CONF`: location of the fscrypt.conf file.  Initially this
fscrypt-0.2.9/cli-tests/README.md-54-  file exists and specifies to use v2 policies with the default
##############################################
fscrypt-0.2.9/cli-tests/README.md-56-
fscrypt-0.2.9/cli-tests/README.md:57:* `$TEST_USER`: a non-root user that the test may use.  Their password
fscrypt-0.2.9/cli-tests/README.md-58-  is `TEST_USER_PASS`.