=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== fscrypt-0.2.9/README.md-132-``` fscrypt-0.2.9/README.md:133:Running `make` in `$GOPATH/src/github.com/google/fscrypt` builds the fscrypt-0.2.9/README.md-134-executable (`fscrypt`) and PAM module (`pam_fscrypt.so`) in the `bin/` ############################################## fscrypt-0.2.9/README.md-147-Alternatively, if you only want to install the `fscrypt` binary to fscrypt-0.2.9/README.md:148:`$GOPATH/bin`, simply run: fscrypt-0.2.9/README.md-149-```shell ############################################## fscrypt-0.2.9/README.md-321-passphrase hash may still be recoverable from disk), then instead run fscrypt-0.2.9/README.md:322:`sudo passwd $USER` and enter your existing passphrase. This re-hashes your fscrypt-0.2.9/README.md-323-existing passphrase with the new `rounds`. ############################################## fscrypt-0.2.9/README.md-766-authentication. The most common case of this is public-key ssh login. To fscrypt-0.2.9/README.md:767:trigger a password authentication event, run `su $USER -c exit`. fscrypt-0.2.9/README.md-768- ############################################## fscrypt-0.2.9/cli-tests/README.md-44- fscrypt-0.2.9/cli-tests/README.md:45:* `$DEV`, `$DEV_ROOT`: ext4 filesystem images with encryption enabled fscrypt-0.2.9/cli-tests/README.md-46- fscrypt-0.2.9/cli-tests/README.md:47:* `$MNT`, `$MNT_ROOT`: the mountpoints of the above filesystems. fscrypt-0.2.9/cli-tests/README.md-48- Initially all filesystems are mounted and are setup for fscrypt. fscrypt-0.2.9/cli-tests/README.md:49: Login protectors will be stored on `$MNT_ROOT`. fscrypt-0.2.9/cli-tests/README.md-50- fscrypt-0.2.9/cli-tests/README.md:51:* `$TMPDIR`: a temporary directory that the test may use fscrypt-0.2.9/cli-tests/README.md-52- fscrypt-0.2.9/cli-tests/README.md:53:* `$FSCRYPT_CONF`: location of the fscrypt.conf file. Initially this fscrypt-0.2.9/cli-tests/README.md-54- file exists and specifies to use v2 policies with the default ############################################## fscrypt-0.2.9/cli-tests/README.md-56- fscrypt-0.2.9/cli-tests/README.md:57:* `$TEST_USER`: a non-root user that the test may use. Their password fscrypt-0.2.9/cli-tests/README.md-58- is `TEST_USER_PASS`.