7e69063a29
This works well, and it interoperates with gpg in my testing (although some SOP commands might choose to use a profile that does not so caveat emptor). Note that for creating the Cipher, gpg --gen-random is still used. SOP does not have an eqivilant, and as long as the user has gpg around, which seems likely, it doesn't matter that it uses gpg here, it's not being used for encryption. That seemed better than implementing a second way to get high quality entropy, at least for now. The need for the sop command to run in an empty directory has each call to encrypt and decrypt creating a new temporary directory. That is some unncessary overhead, though probably swamped by the overhead of running the sop command. This could be improved in the future by passing an already empty directory to them, or a sufficiently empty directory (.git/annex/tmp would probably suffice). Sponsored-by: Brett Eisenberg on Patreon |
||
---|---|---|
.. | ||
Chunked | ||
AWS.hs | ||
Chunked.hs | ||
Encryptable.hs | ||
ExportImport.hs | ||
Git.hs | ||
Hooks.hs | ||
Http.hs | ||
Messages.hs | ||
P2P.hs | ||
Path.hs | ||
ReadOnly.hs | ||
Special.hs | ||
Ssh.hs | ||
ThirdPartyPopulated.hs |