<feed xmlns='http://www.w3.org/2005/Atom'>
<title>gocryptfs/internal/exitcodes, branch aegis</title>
<subtitle>Mirror of gocryptfs source code on Github</subtitle>
<id>http://nuetzlich.net/cgit/gocryptfs/atom?h=aegis</id>
<link rel='self' href='http://nuetzlich.net/cgit/gocryptfs/atom?h=aegis'/>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/'/>
<updated>2025-03-12T19:43:23+00:00</updated>
<entry>
<title>Add optional support for AEGIS encryption</title>
<updated>2025-03-12T19:43:23+00:00</updated>
<author>
<name>Frank Denis</name>
</author>
<published>2025-02-25T14:03:50+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=779a850e0fb967aac79124c7e18b14706d5f2652'/>
<id>urn:sha1:779a850e0fb967aac79124c7e18b14706d5f2652</id>
<content type='text'>
AEGIS is a new family of authenticated encryption algorithms that offers
stronger security, higher usage limits, and better performance than AES-GCM.

This pull request adds support for a new `-aegis` command-line flag, allowing
AEGIS-128X2 to be used as an alternative to AES-GCM on CPUs with AES acceleration.

It also introduces the ability to use ciphers with different key sizes.

More information on AEGIS is available here:
- https://cfrg.github.io/draft-irtf-cfrg-aegis-aead/draft-irtf-cfrg-aegis-aead.html
- https://github.com/cfrg/draft-irtf-cfrg-aegis-aead

gocryptfs -speed speed on Apple M1:

AES-GCM-256-OpenSSL              3718.79 MB/s
AES-GCM-256-Go                   5083.43 MB/s   (selected in auto mode)
AES-SIV-512-Go                    625.20 MB/s
XChaCha20-Poly1305-OpenSSL       1358.63 MB/s   (selected in auto mode)
XChaCha20-Poly1305-Go             832.11 MB/s
Aegis128X2-Go                   11818.73 MB/s

gocryptfs -speed speed on AMD Zen 4:

AES-GCM-256-OpenSSL              5215.86 MB/s
AES-GCM-256-Go                   6918.01 MB/s   (selected in auto mode)
AES-SIV-512-Go                    449.61 MB/s
XChaCha20-Poly1305-OpenSSL       2643.48 MB/s
XChaCha20-Poly1305-Go            3727.46 MB/s   (selected in auto mode)
Aegis128X2-Go                   28109.92 MB/s
</content>
</entry>
<entry>
<title>Add support for FIDO2 tokens</title>
<updated>2020-09-12T16:06:54+00:00</updated>
<author>
<name>Pavol Rusnak</name>
</author>
<published>2020-09-05T20:42:15+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1e624a4cc3aafa57b5fa213c88bcd3689cefd1c3'/>
<id>urn:sha1:1e624a4cc3aafa57b5fa213c88bcd3689cefd1c3</id>
<content type='text'>
</content>
</entry>
<entry>
<title>remove Trezor support</title>
<updated>2019-12-28T18:50:49+00:00</updated>
<author>
<name>Pavol Rusnak</name>
</author>
<published>2019-12-27T21:27:57+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=1364b44ae356da31e24e5605fe73a307e9d6fb03'/>
<id>urn:sha1:1364b44ae356da31e24e5605fe73a307e9d6fb03</id>
<content type='text'>
</content>
</entry>
<entry>
<title>main: ensure fds 0,1,2 are always open</title>
<updated>2019-01-05T13:17:51+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2019-01-05T13:12:00+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ad15ad99856f90f3a72be4bd22ce44338645c963'/>
<id>urn:sha1:ad15ad99856f90f3a72be4bd22ce44338645c963</id>
<content type='text'>
The Go stdlib, as well as the gocryptfs code, relies on the fact
that fds 0,1,2 are always open.

See https://github.com/rfjakob/gocryptfs/issues/320 for details.
</content>
</entry>
<entry>
<title>Assorted spelling fixes.</title>
<updated>2018-12-27T14:19:55+00:00</updated>
<author>
<name>Sebastian Lackner</name>
</author>
<published>2018-12-27T11:03:00+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=874eaf9734cc10940e08f7b043652449e1e220b5'/>
<id>urn:sha1:874eaf9734cc10940e08f7b043652449e1e220b5</id>
<content type='text'>
Mostly detected with the 'codespell' utility, but also includes some
manual grammar fixes.
</content>
</entry>
<entry>
<title>reverse mode: add --exclude option</title>
<updated>2018-08-11T21:26:49+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-08-11T21:26:49+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=ec2fdc19cf9358ae7ba09c528a5807b6b0760f9b'/>
<id>urn:sha1:ec2fdc19cf9358ae7ba09c528a5807b6b0760f9b</id>
<content type='text'>
https://github.com/rfjakob/gocryptfs/issues/235
</content>
</entry>
<entry>
<title>trezor: add skeleton for Trezor support</title>
<updated>2018-07-01T18:56:04+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-06-17T13:25:09+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=c6f6e8ec4d71475a24ebbb0e64f19ad94249efd9'/>
<id>urn:sha1:c6f6e8ec4d71475a24ebbb0e64f19ad94249efd9</id>
<content type='text'>
readpassword.Trezor() is not implemented yet and returns
a hardcoded dummy key.
</content>
</entry>
<entry>
<title>fsck: test against example_filesystems</title>
<updated>2018-04-02T16:43:50+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-04-02T16:43:50+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=a0fd3eca98218aa7d165080ab20cf234330e5e09'/>
<id>urn:sha1:a0fd3eca98218aa7d165080ab20cf234330e5e09</id>
<content type='text'>
</content>
</entry>
<entry>
<title>fsck: add initial implementation</title>
<updated>2018-04-02T14:38:18+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2018-04-01T19:23:32+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=f28d85fad599ffaef9a8e1f353911c81a6605d2f'/>
<id>urn:sha1:f28d85fad599ffaef9a8e1f353911c81a6605d2f</id>
<content type='text'>
Most corruption cases except xattr should be covered.
With test filesystem.

The output is still pretty ugly. xattr support will
be added in the next commits.
</content>
</entry>
<entry>
<title>Add "-trace" flag (record execution trace)</title>
<updated>2017-06-07T20:09:06+00:00</updated>
<author>
<name>Jakob Unterwurzacher</name>
</author>
<published>2017-06-05T20:45:11+00:00</published>
<link rel='alternate' type='text/html' href='http://nuetzlich.net/cgit/gocryptfs/commit/?id=71978ec88a2aa8ec92df080a4a6becf623957c81'/>
<id>urn:sha1:71978ec88a2aa8ec92df080a4a6becf623957c81</id>
<content type='text'>
Uses the runtime/trace functionality.

TODO: add to man page.
</content>
</entry>
</feed>
