<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/cryptocore, branch v1.2.1</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.2.1</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.2.1'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2016-12-10T10:54:36+00:00</updated>
<entry>
<title>Replace all calls to naked panic() with log.Panic()</title>
<updated>2016-12-10T10:54:36+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-12-10T10:50:16+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c9f4400e6dc71a36df5dc9725f52a8968f5f9803'/>
<id>urn:sha1:c9f4400e6dc71a36df5dc9725f52a8968f5f9803</id>
<content type='text'>
We want all panics to show up in the syslog.
</content>
</entry>
<entry>
<title>Fix misspellings</title>
<updated>2016-10-24T17:18:13+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-24T17:18:13+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=aeda9721d0150b9b77d9522bb3b4fcd17f2cbbfa'/>
<id>urn:sha1:aeda9721d0150b9b77d9522bb3b4fcd17f2cbbfa</id>
<content type='text'>
Close https://github.com/rfjakob/gocryptfs/issues/54
</content>
</entry>
<entry>
<title>reverse: add panics against API abuse</title>
<updated>2016-10-09T15:05:12+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-09T15:05:12+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d3b78fea959dfb0e1c1f5079ae516303bdb9a0f8'/>
<id>urn:sha1:d3b78fea959dfb0e1c1f5079ae516303bdb9a0f8</id>
<content type='text'>
These should help prevent later programming errors.
</content>
</entry>
<entry>
<title>A few more lint fixes</title>
<updated>2016-10-04T21:30:05+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-04T21:30:05+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a4956fa6bfde27c21f70e8577ebb586ccc9a3691'/>
<id>urn:sha1:a4956fa6bfde27c21f70e8577ebb586ccc9a3691</id>
<content type='text'>
</content>
</entry>
<entry>
<title>lint fixes</title>
<updated>2016-10-04T21:18:33+00:00</updated>
<author>
<name>Valient Gough</name>
</author>
<published>2016-10-02T04:14:18+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b764917cd5c1b1d61b8ce08e7af0b29793fbbb80'/>
<id>urn:sha1:b764917cd5c1b1d61b8ce08e7af0b29793fbbb80</id>
<content type='text'>
</content>
</entry>
<entry>
<title>tests: skip tests with -openssl=false on Go 1.4 and lower</title>
<updated>2016-10-04T20:34:12+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-04T20:29:14+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=db5782028aaff99dbf15c62d851a4f6ec8227748'/>
<id>urn:sha1:db5782028aaff99dbf15c62d851a4f6ec8227748</id>
<content type='text'>
Go versions 1.4 and lower lack NewGCMWithNonceSize(), which causes
a panic in the test.
</content>
</entry>
<entry>
<title>cryptocore: rename "gcm" variable to generic "aeadCipher"</title>
<updated>2016-10-03T22:17:09+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-03T22:15:27+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a00402cc47d245355c6556a17a1cacaf5102a31c'/>
<id>urn:sha1:a00402cc47d245355c6556a17a1cacaf5102a31c</id>
<content type='text'>
As we now also support AES-SIV the old name is no longer
correct.
</content>
</entry>
<entry>
<title>cryptocore: derive 512-bit key for AES-SIV</title>
<updated>2016-10-03T22:16:56+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-03T22:12:29+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=bb52937834e8adb8e746a1951aba633e02dc87f2'/>
<id>urn:sha1:bb52937834e8adb8e746a1951aba633e02dc87f2</id>
<content type='text'>
AES-SIV uses 1/2 of the key for authentication, 1/2 for
encryption, so we need a 64-byte key for AES-256. Derive
it from the master key by hashing it with SHA-512.
</content>
</entry>
<entry>
<title>reverse: switch from GCM-SIV to AES-SIV</title>
<updated>2016-09-26T21:25:13+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-09-26T21:25:13+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e9bb8b800c6c724125ccd862f4d20946317b31f5'/>
<id>urn:sha1:e9bb8b800c6c724125ccd862f4d20946317b31f5</id>
<content type='text'>
GCM-SIV is not yet finalized, and the reference implemenation is
painfully slow at about 2 MB/s. Switch to AES-SIV.
</content>
</entry>
<entry>
<title>contentenc: add GCM-SIV support</title>
<updated>2016-09-25T14:43:17+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-09-20T20:59:10+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=5f726aaa9d95be30ecfcb61637df3ccc133bf2ea'/>
<id>urn:sha1:5f726aaa9d95be30ecfcb61637df3ccc133bf2ea</id>
<content type='text'>
Also add ReverseDummyNonce nonce generation.
</content>
</entry>
</feed>
