<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/cryptocore, branch v1.3</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.3</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=v1.3'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2017-04-29T12:50:58+00:00</updated>
<entry>
<title>fix golint complaints</title>
<updated>2017-04-29T12:50:58+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-04-29T12:50:58+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=edb3e19cb5543c580261052395d461fa47c7cf58'/>
<id>urn:sha1:edb3e19cb5543c580261052395d461fa47c7cf58</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add -forcedecode</title>
<updated>2017-04-23T21:11:56+00:00</updated>
<author>
<name>danim7</name>
</author>
<published>2017-04-08T00:09:28+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f1945c4daae65074cfca8f0ab5b97ac5a50c24a0'/>
<id>urn:sha1:f1945c4daae65074cfca8f0ab5b97ac5a50c24a0</id>
<content type='text'>
Force decode of encrypted files even if the integrity check fails, instead of
failing with an IO error. Warning messages are still printed to syslog if corrupted
files are encountered.
It can be useful to recover files from disks with bad sectors or other corrupted
media.

Closes https://github.com/rfjakob/gocryptfs/pull/102 .
</content>
</entry>
<entry>
<title>full stack: implement HKDF support</title>
<updated>2017-03-05T20:59:55+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-05T20:59:55+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d0bc7970f721cee607d993406d97d32e2c660abe'/>
<id>urn:sha1:d0bc7970f721cee607d993406d97d32e2c660abe</id>
<content type='text'>
...but keep it disabled by default for new filesystems.

We are still missing an example filesystem and CLI arguments
to explicitely enable and disable it.
</content>
</entry>
<entry>
<title>configfile: switch to 128-bit IVs for master key encryption</title>
<updated>2017-03-05T17:03:03+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-05T17:03:03+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=b7328815183b7a4ff37156085fb78e8e86aff165'/>
<id>urn:sha1:b7328815183b7a4ff37156085fb78e8e86aff165</id>
<content type='text'>
There is no security reason for doing this, but it will allow
to consolidate the code once we drop compatibility with gocryptfs v1.2
(and earlier) filesystems.
</content>
</entry>
<entry>
<title>Drop Go 1.4 compatability code everywhere</title>
<updated>2017-03-05T16:44:14+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-05T16:44:14+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=966308eeb7793a4a8ca578e160981e3b059b82e6'/>
<id>urn:sha1:966308eeb7793a4a8ca578e160981e3b059b82e6</id>
<content type='text'>
Yields a nice reduction in code size.
</content>
</entry>
<entry>
<title>cryptocore: rename "BackendTypeEnum" -&gt; "AEADTypeEnum"</title>
<updated>2017-03-05T16:10:57+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-05T16:08:16+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=874e4fb5e911cc3654b4bd314f3bef764aa39b74'/>
<id>urn:sha1:874e4fb5e911cc3654b4bd314f3bef764aa39b74</id>
<content type='text'>
There are two independent backends, one for name encryption,
the other one, AEAD, for file content.

"BackendTypeEnum" only applies to AEAD (file content), so make that
clear in the name.
</content>
</entry>
<entry>
<title>cryptocore: use eme v1.1 interface</title>
<updated>2017-03-05T12:58:24+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-03-05T12:58:24+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=e032539e2c09cd4d1f007d33d7ef97b0fec689ed'/>
<id>urn:sha1:e032539e2c09cd4d1f007d33d7ef97b0fec689ed</id>
<content type='text'>
Version 1.1 of the EME package (github.com/rfjakob/eme) added
a more convenient interface. Use it.

Note that you have to upgrade your EME package (go get -u)!
</content>
</entry>
<entry>
<title>Replace all calls to naked panic() with log.Panic()</title>
<updated>2016-12-10T10:54:36+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-12-10T10:50:16+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c9f4400e6dc71a36df5dc9725f52a8968f5f9803'/>
<id>urn:sha1:c9f4400e6dc71a36df5dc9725f52a8968f5f9803</id>
<content type='text'>
We want all panics to show up in the syslog.
</content>
</entry>
<entry>
<title>Fix misspellings</title>
<updated>2016-10-24T17:18:13+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-24T17:18:13+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=aeda9721d0150b9b77d9522bb3b4fcd17f2cbbfa'/>
<id>urn:sha1:aeda9721d0150b9b77d9522bb3b4fcd17f2cbbfa</id>
<content type='text'>
Close https://github.com/rfjakob/gocryptfs/issues/54
</content>
</entry>
<entry>
<title>reverse: add panics against API abuse</title>
<updated>2016-10-09T15:05:12+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2016-10-09T15:05:12+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=d3b78fea959dfb0e1c1f5079ae516303bdb9a0f8'/>
<id>urn:sha1:d3b78fea959dfb0e1c1f5079ae516303bdb9a0f8</id>
<content type='text'>
These should help prevent later programming errors.
</content>
</entry>
</feed>
