diff options
| -rw-r--r-- | README.md | 28 | 
1 files changed, 17 insertions, 11 deletions
| @@ -166,9 +166,11 @@ Example for a CPU without AES-NI:  ```  $ ./gocryptfs -speed -AES-GCM-256-OpenSSL    165.67 MB/s  (selected in auto mode) -AES-GCM-256-Go          49.62 MB/s -AES-SIV-512-Go          39.98 MB/s +gocryptfs v2.0; go-fuse v2.1.1-0.20210508151621-62c5aa1919a7; 2021-06-06 go1.16.5 linux/amd64 +AES-GCM-256-OpenSSL    536.63 MB/s   +AES-GCM-256-Go         831.84 MB/s  (selected in auto mode) +AES-SIV-512-Go         155.85 MB/s   +XChaCha20-Poly1305-Go  700.02 MB/s  (benchmark only, not selectable yet)  ```  You can run `./benchmark.bash` to run gocryptfs' canonical set of @@ -177,19 +179,23 @@ tarball, recursively listing and finally deleting it. The output will  look like this:  ``` -$ ./benchmark.bash -Testing gocryptfs at /tmp/benchmark.bash.DwL: gocryptfs v1.6; go-fuse v20170619-45-g95c6370; 2018-08-18 go1.10.3 -WRITE: 262144000 bytes (262 MB, 250 MiB) copied, 1.1033 s, 238 MB/s -READ:  262144000 bytes (262 MB, 250 MiB) copied, 0.945291 s, 277 MB/s -UNTAR: 17.768 -MD5:   8.459 -LS:    1.460 -RM:    3.379 +$ ./benchmark.bash  +Testing gocryptfs at /tmp/benchmark.bash.xFD: gocryptfs v2.0; go-fuse v2.1.1-0.20210508151621-62c5aa1919a7; 2021-06-06 go1.16.5 linux/amd64 +WRITE: 262144000 bytes (262 MB, 250 MiB) copied, 0,698174 s, 375 MB/s +READ:  262144000 bytes (262 MB, 250 MiB) copied, 0,268916 s, 975 MB/s +UNTAR: 8,970 +MD5:   4,846 +LS:    1,851 +RM:    2,367  ```  Changelog  --------- +v2.0.1, 2021-06-07 +* Fix symlink creation reporting the wrong size, causing git to report it as modified +  ([#574](https://github.com/rfjakob/gocryptfs/issues/574)) +  v2.0, 2021-06-05  * Fix a few [issues discovered by xfstests](https://github.com/rfjakob/fuse-xfstests/wiki/results_2021-05-19)    * Biggest change: rewrite SEEK_HOLE / SEEK_DATA logic (now emulates 4k alignment) | 
