Download passfile
Author: c | 2025-04-25
Download PassFile 1.0 - PassFile is a tool that will create a password protected central repository for all your user names and passwords Download PassFile 1.0 - PassFile is a tool that will create a password protected central repository for all your user names and passwords
PassFile 1.0 free download. PassFile is a tool that will
Filesystem (note that you must specify -aessiv):gocryptfs -masterkey=stdin -aessiv cipher mntApplies to: all actions that ask for a password.-memprofile stringWrite memory profile to the specified file. This is useful when debuggingmemory usage of gocryptfs.Applies to: all actions.-o COMMA-SEPARATED-OPTIONSFor compatibility with mount(1), options are also accepted as"-o COMMA-SEPARATED-OPTIONS" at the end of the command line.For example, "-o q,zerokey" is equivalent to passing "-q -zerokey".Note that you can only use options that are understood by gocryptfswith "-o". If you want to pass special flags to the kernel, you shoulduse "-ko" (kernel option). This is different in libfuse-basedfilesystems, that automatically pass any "-o" options they do notunderstand along to the kernel.Example:gocryptfs /tmp/foo /tmp/bar -o q,zerokeyApplies to: all actions.-openssl bool/"auto"Use OpenSSL instead of built-in Go crypto (default "auto"). Usingbuilt-in crypto is 4x slower unless your CPU has AES instructions andyou are using Go 1.6+. In mode "auto", gocrypts chooses the fasteroption.Applies to: all actions.-passfile FILE [-passfile FILE2 ...]Read password from the specified plain text file. The file should contain exactlyone line (do not use binary files!).A warning will be printed if there is more than one line, and onlythe first line will be used. A singletrailing newline is allowed and does not cause a warning.Pass this option multiple times to read the first line from multiplefiles. They are concatenated for the effective password.Example: hello.txtecho world > world.txtgocryptfs -passfile hello.txt -passfile world.txt">echo hello > hello.txtecho world > world.txtgocryptfs -passfile hello.txt -passfile world.txtThe effective password will be "helloworld".Applies to: all actions that ask for a password.-q, -quietQuiet - silence informational messages.Applies to: all actions.-scryptn intgocryptfs uses scrypt for hashing the password when mounting,which protects from brute-force attacks.-scryptn controls the scrypt cost parameter "N" expressed as scryptn=log2(N).Possible values are -scryptn=10 to -scryptn=28, representing N=2^10 to N=2^28.Setting this to a lowervalue speeds up mounting and reduces its memory needs, but makesthe password susceptible to brute-force attacks. The default is 16.The memory usage for scrypt during mounting is as follows:scryptn Memory Usage ======= ============10 1 MiB11 2 12 4 13 8 14 16 15 32 16 64 17 128 18 256 19 512 20 1 GiB21 2 22 4 23 8 24 16 25 32 26 64 27 128 28 256 Applies to: -init, -passwdSee also: the benchmarks in the gocryptfs source code in internal/configfile.-trace stringWrite execution trace to file. View the trace using "go tool trace FILE".Applies to: all actions.-wpanicWhen encountering a warning, panic and exit immediately. This isuseful in regression testing.Applies to: all actions.--Stop option parsing. Helpful when CIPHERDIR may start with adash "-".Applies to: all actions.EXCLUDING FILESIn reverse mode, it is possible to exclude files from the encrypted view, usingthe -exclude, -exclude-wildcard and -exclude-from options.-exclude matches complete paths, so -exclude file.txt only excludes a filenamed file.txt Download PassFile 1.0 - PassFile is a tool that will create a password protected central repository for all your user names and passwords Home directory using reverse mode:mkdir /home/joe.cryptgocryptfs -init -reverse /home/joegocryptfs -reverse /home/joe /home/joe.cryptfstabAdding this line to /etc/fstab will mount /tmp/cipher to /tmp/plain on boot, using thepassword in /tmp/passfile. Use sudo mount -av to test the line without havingto reboot. Adjust the gocryptfs path acc. to the output of the command which gocryptfs.Do use the nofail option to prevent an unbootable system if the gocryptfs mount fails (seethe -nofail option for details)./tmp/cipher /tmp/plain fuse./usr/local/bin/gocryptfs nofail,allow_other,passfile=/tmp/password 0 0ENVIRONMENT VARIABLESNO_COLORIf NO_COLOR is set (regardless of value), colored output is disabled (see CODES0: success6: CIPHERDIR is not an empty directory (on "-init")10: MOUNTPOINT is not an empty directory12: password incorrect22: password is empty (on "-init")23: could not read gocryptfs.conf24: could not write gocryptfs.conf (on "-init" or "-password")26: fsck found errorsother: please check the error messageSee also: duplicationgocryptfs v2.1 switched to the pflag library for command-line parsingto support flags and positional arguments in any order. To stay compatiblewith single-dash long options like -extpass, an ugly hack was added:The command line is preprocessed, and all single-dash options are converted todouble-dash.Unfortunately, this means that ingocryptfs -extpass myapp -extpass -Xgocryptfs transforms the -X to --X, and it will call myapp --X as the extpass program.Please usegocryptfs -extpass myapp -extpass=-Xto work around this bug.SEE ALSOmount(2) fuse(8) fallocate(2) encfs(1) gitignore(5)Comments
Filesystem (note that you must specify -aessiv):gocryptfs -masterkey=stdin -aessiv cipher mntApplies to: all actions that ask for a password.-memprofile stringWrite memory profile to the specified file. This is useful when debuggingmemory usage of gocryptfs.Applies to: all actions.-o COMMA-SEPARATED-OPTIONSFor compatibility with mount(1), options are also accepted as"-o COMMA-SEPARATED-OPTIONS" at the end of the command line.For example, "-o q,zerokey" is equivalent to passing "-q -zerokey".Note that you can only use options that are understood by gocryptfswith "-o". If you want to pass special flags to the kernel, you shoulduse "-ko" (kernel option). This is different in libfuse-basedfilesystems, that automatically pass any "-o" options they do notunderstand along to the kernel.Example:gocryptfs /tmp/foo /tmp/bar -o q,zerokeyApplies to: all actions.-openssl bool/"auto"Use OpenSSL instead of built-in Go crypto (default "auto"). Usingbuilt-in crypto is 4x slower unless your CPU has AES instructions andyou are using Go 1.6+. In mode "auto", gocrypts chooses the fasteroption.Applies to: all actions.-passfile FILE [-passfile FILE2 ...]Read password from the specified plain text file. The file should contain exactlyone line (do not use binary files!).A warning will be printed if there is more than one line, and onlythe first line will be used. A singletrailing newline is allowed and does not cause a warning.Pass this option multiple times to read the first line from multiplefiles. They are concatenated for the effective password.Example: hello.txtecho world > world.txtgocryptfs -passfile hello.txt -passfile world.txt">echo hello > hello.txtecho world > world.txtgocryptfs -passfile hello.txt -passfile world.txtThe effective password will be "helloworld".Applies to: all actions that ask for a password.-q, -quietQuiet - silence informational messages.Applies to: all actions.-scryptn intgocryptfs uses scrypt for hashing the password when mounting,which protects from brute-force attacks.-scryptn controls the scrypt cost parameter "N" expressed as scryptn=log2(N).Possible values are -scryptn=10 to -scryptn=28, representing N=2^10 to N=2^28.Setting this to a lowervalue speeds up mounting and reduces its memory needs, but makesthe password susceptible to brute-force attacks. The default is 16.The memory usage for scrypt during mounting is as follows:scryptn Memory Usage ======= ============10 1 MiB11 2 12 4 13 8 14 16 15 32 16 64 17 128 18 256 19 512 20 1 GiB21 2 22 4 23 8 24 16 25 32 26 64 27 128 28 256 Applies to: -init, -passwdSee also: the benchmarks in the gocryptfs source code in internal/configfile.-trace stringWrite execution trace to file. View the trace using "go tool trace FILE".Applies to: all actions.-wpanicWhen encountering a warning, panic and exit immediately. This isuseful in regression testing.Applies to: all actions.--Stop option parsing. Helpful when CIPHERDIR may start with adash "-".Applies to: all actions.EXCLUDING FILESIn reverse mode, it is possible to exclude files from the encrypted view, usingthe -exclude, -exclude-wildcard and -exclude-from options.-exclude matches complete paths, so -exclude file.txt only excludes a filenamed file.txt
2025-04-08Home directory using reverse mode:mkdir /home/joe.cryptgocryptfs -init -reverse /home/joegocryptfs -reverse /home/joe /home/joe.cryptfstabAdding this line to /etc/fstab will mount /tmp/cipher to /tmp/plain on boot, using thepassword in /tmp/passfile. Use sudo mount -av to test the line without havingto reboot. Adjust the gocryptfs path acc. to the output of the command which gocryptfs.Do use the nofail option to prevent an unbootable system if the gocryptfs mount fails (seethe -nofail option for details)./tmp/cipher /tmp/plain fuse./usr/local/bin/gocryptfs nofail,allow_other,passfile=/tmp/password 0 0ENVIRONMENT VARIABLESNO_COLORIf NO_COLOR is set (regardless of value), colored output is disabled (see CODES0: success6: CIPHERDIR is not an empty directory (on "-init")10: MOUNTPOINT is not an empty directory12: password incorrect22: password is empty (on "-init")23: could not read gocryptfs.conf24: could not write gocryptfs.conf (on "-init" or "-password")26: fsck found errorsother: please check the error messageSee also: duplicationgocryptfs v2.1 switched to the pflag library for command-line parsingto support flags and positional arguments in any order. To stay compatiblewith single-dash long options like -extpass, an ugly hack was added:The command line is preprocessed, and all single-dash options are converted todouble-dash.Unfortunately, this means that ingocryptfs -extpass myapp -extpass -Xgocryptfs transforms the -X to --X, and it will call myapp --X as the extpass program.Please usegocryptfs -extpass myapp -extpass=-Xto work around this bug.SEE ALSOmount(2) fuse(8) fallocate(2) encfs(1) gitignore(5)
2025-04-24Path to be used as the scratch directory. See Setting Options for the Platform Assistant.Platform Assistant Command-Line HelpThere are two ways to get online help: Run PAServer only to display the help screen (paserver quits after displaying help)Use the h command while PAServer is already runningDisplaying the Help ScreenTo display the help screen for the Platform Assistant, pass the -help switch when you run paserver on the command line, as follows:On macOS:MacOS username $ ./paserver -helpOn Windows:> paserver -helpOn Linux:$ ./paserver -helpHere is the paserver help screen:Platform Assistant Server Copyright Embarcadero Technologies, Inc.Usage: paserver [options>]where include:-port= Specify the port number, default=64211-scratchdir= Specify the parent directory for client temporary files-libextension= Specify the dynamic library extensions, default=,dylib, h-tarcommand= Specify the path for tar binary, default=/usr/bin/tar-debuglauncher= Specify the debugger launcher application-devicetimeout= Specify the device connection timeout, in seconds, default=10-nopermissioncheck Do not attempt to acquire permission to support debugging-unrestricted Allow put and remove file(s) operation outside client temporary files directory, default is not allowed-password= Specify the remote profile login password, default is to prompt for the login password-passfile= Specify the remote profile login passfile, default is to prompt for the login password-config= Specify the default settings-help Print this help screenDisplaying Help While paserver is RunningAfter you start the Platform Assistant, you can use the h (help) command to show a detailed list of the available commands. For example:> hq - stop the serverc - print all clientsp - print port numberi - print available IP addressess - print scratch directoryg - generate login passfilev
2025-04-16