<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/cryptfs, branch v0.6</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v0.6</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v0.6'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2015-12-08T15:17:04+00:00</updated>
<entry>
<title>Add EME filename encryption &amp; enable it by default</title>
<updated>2015-12-08T15:17:04+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-08T15:13:29+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c6dacd6f913b4c6eb7a8917af49190dce32db108'/>
<id>urn:sha1:c6dacd6f913b4c6eb7a8917af49190dce32db108</id>
<content type='text'>
</content>
</entry>
<entry>
<title>opensslGCM: preallocate buffer space, improves performance by 11%</title>
<updated>2015-12-08T12:22:57+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-08T12:22:57+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f4ae0304aff2f721ebe6088aa4f4c83f872f1ee9'/>
<id>urn:sha1:f4ae0304aff2f721ebe6088aa4f4c83f872f1ee9</id>
<content type='text'>
Results of cryptfs/openssl_benchmark.bash :

Before:
  BenchmarkEnc_OpenSSL_4k_AES256_nonce96-2 	   50000	     31802 ns/op	 127.28 MB/s
  BenchmarkEnc_OpenSSL_4k_AES256_nonce128-2	   50000	     32110 ns/op	 126.06 MB/s

After:
  BenchmarkEnc_OpenSSL_4k_AES256_nonce96-2 	   50000	     28612 ns/op	 141.47 MB/s
  BenchmarkEnc_OpenSSL_4k_AES256_nonce128-2	   50000	     28613 ns/op	 141.47 MB/s
</content>
</entry>
<entry>
<title>tests: add encryption benchmarks to cryptfs</title>
<updated>2015-12-08T12:19:19+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-08T12:19:19+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c6a6641b58d4bd8fd9e64ad7a653eff9886ee6e2'/>
<id>urn:sha1:c6a6641b58d4bd8fd9e64ad7a653eff9886ee6e2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fallocate the space needed for the file header beforehand</title>
<updated>2015-12-06T14:05:52+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-06T14:05:52+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=56888d83dd50a10bad56eaa512ce0b6a2f2d41ed'/>
<id>urn:sha1:56888d83dd50a10bad56eaa512ce0b6a2f2d41ed</id>
<content type='text'>
This makes sure writing to a file fails early if the underlying
filesystem does not support fallocate. It also prevents partial header
write due to ENOSPC.
</content>
</entry>
<entry>
<title>init: create gocryptfs.diriv after creating gocryptfs.conf</title>
<updated>2015-12-06T13:24:45+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-12-06T13:24:45+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=71b94828edb00d3a86bbe366f49295d81f91c28c'/>
<id>urn:sha1:71b94828edb00d3a86bbe366f49295d81f91c28c</id>
<content type='text'>
Creating the config file can fail easily, for example if the
password is not entered the same twice. This would leave an
orphaned gocryptfs.diriv behind.
</content>
</entry>
<entry>
<title>Run go fmt</title>
<updated>2015-11-29T20:55:20+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-11-29T20:55:20+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ce42a6f23d9fd50ddf2e66a68e6ec57cad80c018'/>
<id>urn:sha1:ce42a6f23d9fd50ddf2e66a68e6ec57cad80c018</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add single-element cache for DirIV lookup</title>
<updated>2015-11-29T20:41:38+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-11-29T20:41:38+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=20b058a33335f48812864513cc13ea0a276aaaa3'/>
<id>urn:sha1:20b058a33335f48812864513cc13ea0a276aaaa3</id>
<content type='text'>
Another 3x performance boost for applications that walk the
directory tree.

Excerpt from performance.txt:

VERSION         UNTAR    LS     RM
v0.4               48     1.5    5
v0.5-rc1           56     7     19
v0.5-rc1-1         54     4.1    9
v0.5-rc1-2         45     1.7	 3.4  &lt;---- THIS VERSION
</content>
</entry>
<entry>
<title>OpenDir performance: Read DirIV once and reuse it for all names</title>
<updated>2015-11-29T19:03:37+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-11-29T18:57:48+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1d0a442405e8fc7a0742a8f8db2ea0f874f750a5'/>
<id>urn:sha1:1d0a442405e8fc7a0742a8f8db2ea0f874f750a5</id>
<content type='text'>
Formerly, we called decryptPath for every name.
That resulted in a directory walk that reads in all diriv files
on the way.

Massive improvement for RM and LS (check performance.txt for details)

VERSION         UNTAR   RM   LS
v0.4               48    5    1.5
v0.5-rc1           56   19    7
v0.5-rc1-1         54    9    4.1   &lt;---- THIS VERSION
</content>
</entry>
<entry>
<title>Add "-scryptn" option that sets the cost parameter for scrypt</title>
<updated>2015-11-29T17:53:40+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-11-29T17:52:58+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=bb116282b7db6a6400586d756c6dfdcc8f85fdab'/>
<id>urn:sha1:bb116282b7db6a6400586d756c6dfdcc8f85fdab</id>
<content type='text'>
Use that option to speed up the automated tests by 7 seconds.

Before:
	ok  	github.com/rfjakob/gocryptfs/integration_tests	26.667s
After:
	ok  	github.com/rfjakob/gocryptfs/integration_tests	19.534s
</content>
</entry>
<entry>
<title>tests: add scrypt benchmark</title>
<updated>2015-11-29T13:50:02+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2015-11-29T13:50:02+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=71bfa1f0fb540790f87faac600e4041052b4d217'/>
<id>urn:sha1:71bfa1f0fb540790f87faac600e4041052b4d217</id>
<content type='text'>
Times the impact of the parameter "N" to scrypt.

Results on a 2.7GHz Pentium G630:

gocryptfs/cryptfs$ go test -bench=.
PASS
BenchmarkScrypt10-2	     300	   6021435 ns/op ... 6ms
BenchmarkScrypt11-2	     100	  11861460 ns/op
BenchmarkScrypt12-2	     100	  23420822 ns/op
BenchmarkScrypt13-2	      30	  47666518 ns/op
BenchmarkScrypt14-2	      20	  92561590 ns/op ... 92ms
BenchmarkScrypt15-2	      10	 183971593 ns/op
BenchmarkScrypt16-2	       3	 368506365 ns/op
BenchmarkScrypt17-2	       2	 755502608 ns/op ... 755ms
ok  	github.com/rfjakob/gocryptfs/cryptfs	18.772s
</content>
</entry>
</feed>
