<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs, branch v0.6</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v0.6</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v0.6'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2015-12-08T15:41:45+00:00</updated>
<entry>
<title>Update README + docs for v0.6 release</title>
<updated>2015-12-08T15:41:45+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-08T15:41:45+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=9419e7ae85b3a7f9a721717f5676215b450d7c7b'/>
<id>urn:sha1:9419e7ae85b3a7f9a721717f5676215b450d7c7b</id>
<content type='text'>
</content>
</entry>
<entry>
<title>tests: add v0.6 example filesystem with EME</title>
<updated>2015-12-08T15:17:19+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-08T15:17:19+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e3f35d38b599801312e982c19b191aa5dd76f94d'/>
<id>urn:sha1:e3f35d38b599801312e982c19b191aa5dd76f94d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add EME filename encryption &amp; enable it by default</title>
<updated>2015-12-08T15:17:04+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-08T15:13:29+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c6dacd6f913b4c6eb7a8917af49190dce32db108'/>
<id>urn:sha1:c6dacd6f913b4c6eb7a8917af49190dce32db108</id>
<content type='text'>
</content>
</entry>
<entry>
<title>go fmt</title>
<updated>2015-12-08T12:51:06+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-08T12:51:06+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ff8c81f95b311eb1cd9c822202519f1a90a8cdd4'/>
<id>urn:sha1:ff8c81f95b311eb1cd9c822202519f1a90a8cdd4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>opensslGCM: preallocate buffer space, improves performance by 11%</title>
<updated>2015-12-08T12:22:57+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-08T12:22:57+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f4ae0304aff2f721ebe6088aa4f4c83f872f1ee9'/>
<id>urn:sha1:f4ae0304aff2f721ebe6088aa4f4c83f872f1ee9</id>
<content type='text'>
Results of cryptfs/openssl_benchmark.bash :

Before:
  BenchmarkEnc_OpenSSL_4k_AES256_nonce96-2 	   50000	     31802 ns/op	 127.28 MB/s
  BenchmarkEnc_OpenSSL_4k_AES256_nonce128-2	   50000	     32110 ns/op	 126.06 MB/s

After:
  BenchmarkEnc_OpenSSL_4k_AES256_nonce96-2 	   50000	     28612 ns/op	 141.47 MB/s
  BenchmarkEnc_OpenSSL_4k_AES256_nonce128-2	   50000	     28613 ns/op	 141.47 MB/s
</content>
</entry>
<entry>
<title>tests: add encryption benchmarks to cryptfs</title>
<updated>2015-12-08T12:19:19+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-08T12:19:19+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c6a6641b58d4bd8fd9e64ad7a653eff9886ee6e2'/>
<id>urn:sha1:c6a6641b58d4bd8fd9e64ad7a653eff9886ee6e2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Update README</title>
<updated>2015-12-06T14:13:06+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-06T14:13:06+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=21abf57abbfc6ad818df623f007cac1aa1945682'/>
<id>urn:sha1:21abf57abbfc6ad818df623f007cac1aa1945682</id>
<content type='text'>
gocryptfs is no longer developed in gocryptfs because of the inconvenience
that you cannot mount a FUSE filesystem inside a FUSE mount
</content>
</entry>
<entry>
<title>tests: add TestRename</title>
<updated>2015-12-06T14:10:23+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-06T14:10:23+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=7375d86adae6f9ddcb403c67c5a97ed917b2ae3f'/>
<id>urn:sha1:7375d86adae6f9ddcb403c67c5a97ed917b2ae3f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fallocate the space needed for the file header beforehand</title>
<updated>2015-12-06T14:05:52+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-06T14:05:52+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=56888d83dd50a10bad56eaa512ce0b6a2f2d41ed'/>
<id>urn:sha1:56888d83dd50a10bad56eaa512ce0b6a2f2d41ed</id>
<content type='text'>
This makes sure writing to a file fails early if the underlying
filesystem does not support fallocate. It also prevents partial header
write due to ENOSPC.
</content>
</entry>
<entry>
<title>Fix rename, was broken broken by DirIV introduction</title>
<updated>2015-12-06T14:00:54+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-06T14:00:54+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=edc289fb7578036ecc7571cb0207ceac17af9eec'/>
<id>urn:sha1:edc289fb7578036ecc7571cb0207ceac17af9eec</id>
<content type='text'>
As it was, CIPHERDIR was prepended twice, causing every rename
to fail with ENOENT.
</content>
</entry>
</feed>
