<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/cryptfs, branch v0.2</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v0.2</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v0.2'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2015-10-11T16:33:28+00:00</updated>
<entry>
<title>main: check directories for existence early</title>
<updated>2015-10-11T16:33:28+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-11T16:33:28+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d1d444435cf4351fc50ffd02c203cf4a2209b8e5'/>
<id>urn:sha1:d1d444435cf4351fc50ffd02c203cf4a2209b8e5</id>
<content type='text'>
This prevents that the user enters the password only to get an error
later.
</content>
</entry>
<entry>
<title>Run go fmt</title>
<updated>2015-10-07T20:59:36+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-07T20:58:22+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ed1df49af5bb616e5ec34585b20c9c93a96b8088'/>
<id>urn:sha1:ed1df49af5bb616e5ec34585b20c9c93a96b8088</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add test.bash</title>
<updated>2015-10-07T20:09:34+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-07T20:08:30+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=440abcbac63a5994d4bac1b5dfcf838aaaefdbd7'/>
<id>urn:sha1:440abcbac63a5994d4bac1b5dfcf838aaaefdbd7</id>
<content type='text'>
...also adapt the cryptfs tests for 256 bit long keys
</content>
</entry>
<entry>
<title>Implement "gocryptfs --passwd" (pasword changing)</title>
<updated>2015-10-07T19:26:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-07T19:26:17+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=65ba0739d5de756a437e0f840649583fa835a560'/>
<id>urn:sha1:65ba0739d5de756a437e0f840649583fa835a560</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Use block number as authentication data</title>
<updated>2015-10-06T20:27:37+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-06T20:27:37+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a3d286069f989dd16c6f91930a0df9fedfa2dd64'/>
<id>urn:sha1:a3d286069f989dd16c6f91930a0df9fedfa2dd64</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Switch to AES-256</title>
<updated>2015-10-06T18:51:35+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-06T18:51:35+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=5c6df490678e7dc1aa7a09425d2fdf14fb13f7be'/>
<id>urn:sha1:5c6df490678e7dc1aa7a09425d2fdf14fb13f7be</id>
<content type='text'>
AES-256 seems to be becoming the industry standard. While AES-128 is
good enough for tens of years to come, let's follow suit and be extra
safe.
</content>
</entry>
<entry>
<title>Implement proper daemonization</title>
<updated>2015-10-05T22:31:18+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-05T22:29:08+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=022a6968ae0ede1259141e32b8e32553dad7d824'/>
<id>urn:sha1:022a6968ae0ede1259141e32b8e32553dad7d824</id>
<content type='text'>
The shell wrapper sends gocryptfs into the background and waits for SIGUSR1
</content>
</entry>
<entry>
<title>openssl AEAD wrapper: handle authenticated data</title>
<updated>2015-10-04T21:58:22+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-04T21:55:58+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=53ecebc71ec132fc8e5fab486c63e13c0925d142'/>
<id>urn:sha1:53ecebc71ec132fc8e5fab486c63e13c0925d142</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Switch nonce generation to purely random</title>
<updated>2015-10-04T19:36:16+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-04T19:36:16+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e6b7353f4e9516a712d7cd9dab7d73c6c79ae7d0'/>
<id>urn:sha1:e6b7353f4e9516a712d7cd9dab7d73c6c79ae7d0</id>
<content type='text'>
The old implementation of counting up from a random starting
point had the problem that is allowed an attacker to find out
the write order of the blocks.
</content>
</entry>
<entry>
<title>Run go fmt</title>
<updated>2015-10-04T12:49:47+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-10-04T12:36:20+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=89fef80d32708874c95742db0a7b593bcfd3b31d'/>
<id>urn:sha1:89fef80d32708874c95742db0a7b593bcfd3b31d</id>
<content type='text'>
</content>
</entry>
</feed>
