libgocryptfs/internal/syscallcompat
Jakob Unterwurzacher 03bf604fc0 syscallcompat: OpenNofollow: use O_DIRECTORY flag
...when opening intermedia directories to give us an
extra layer of safety.

From the FreeBSD man page:

     This flag can be used to prevent applications with elevated
     privileges from opening files which are even unsafe to open with O_RDONLY,
     such as device nodes.
2017-12-05 23:31:07 +01:00
..
emulate_test.go syscallcompat: add Fstatat + emulation + test 2017-12-03 19:32:59 +01:00
emulate.go syscallcompat: add Fstatat + emulation + test 2017-12-03 19:32:59 +01:00
getdents_linux.go syscallcompat: convert Getdents to fd input, add emulation 2017-12-03 19:33:26 +01:00
getdents_other.go syscallcompat: convert Getdents to fd input, add emulation 2017-12-03 19:33:26 +01:00
getdents_test.go syscallcompat: convert Getdents to fd input, add emulation 2017-12-03 19:33:26 +01:00
main_test.go syscallcompat: move test setup into its own file 2017-12-02 19:57:23 +01:00
open_nofollow_test.go syscallcompat: OpenNofollow: use O_DIRECTORY flag 2017-12-05 23:31:07 +01:00
open_nofollow.go syscallcompat: OpenNofollow: use O_DIRECTORY flag 2017-12-05 23:31:07 +01:00
sys_darwin.go syscallcompat: add Fstatat + emulation + test 2017-12-03 19:32:59 +01:00
sys_linux.go syscallcompat: convert Getdents to fd input, add emulation 2017-12-03 19:33:26 +01:00