diff options
-rw-r--r-- | Documentation/logo.svg | 104 | ||||
-rw-r--r-- | Documentation/logo.svg.png | bin | 0 -> 5186 bytes | |||
-rw-r--r-- | README.md | 15 |
3 files changed, 116 insertions, 3 deletions
diff --git a/Documentation/logo.svg b/Documentation/logo.svg new file mode 100644 index 0000000..0431984 --- /dev/null +++ b/Documentation/logo.svg @@ -0,0 +1,104 @@ +<?xml version="1.0" encoding="UTF-8" standalone="no"?> +<!-- Created with Inkscape (http://www.inkscape.org/) --> + +<svg + xmlns:dc="http://purl.org/dc/elements/1.1/" + xmlns:cc="http://creativecommons.org/ns#" + xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" + xmlns:svg="http://www.w3.org/2000/svg" + xmlns="http://www.w3.org/2000/svg" + xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd" + xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" + width="25.916233mm" + height="5.4700227mm" + viewBox="0 0 91.829172 19.38197" + id="svg2" + version="1.1" + inkscape:version="0.91 r13725" + sodipodi:docname="logo.svg" + inkscape:export-filename="/home/jakob/src/github.com/rfjakob/gocryptfs/Documentation/logo.svg.png" + inkscape:export-xdpi="185.73964" + inkscape:export-ydpi="185.73964"> + <defs + id="defs4" /> + <sodipodi:namedview + id="base" + pagecolor="#ffffff" + bordercolor="#666666" + borderopacity="1.0" + inkscape:pageopacity="0.0" + inkscape:pageshadow="2" + inkscape:zoom="7.9195959" + inkscape:cx="57.488876" + inkscape:cy="17.268134" + inkscape:document-units="px" + inkscape:current-layer="layer1" + showgrid="false" + showguides="true" + inkscape:guide-bbox="true" + fit-margin-top="0.1" + fit-margin-left="0.1" + fit-margin-right="0.1" + fit-margin-bottom="0.1" + inkscape:window-width="1614" + inkscape:window-height="1012" + inkscape:window-x="773" + inkscape:window-y="31" + inkscape:window-maximized="0"> + <sodipodi:guide + position="69.311981,15.348769" + orientation="0,1" + id="guide4148" /> + </sodipodi:namedview> + <metadata + id="metadata7"> + <rdf:RDF> + <cc:Work + rdf:about=""> + <dc:format>image/svg+xml</dc:format> + <dc:type + rdf:resource="http://purl.org/dc/dcmitype/StillImage" /> + <dc:title></dc:title> + </cc:Work> + </rdf:RDF> + </metadata> + <g + inkscape:label="Layer 1" + inkscape:groupmode="layer" + id="layer1" + transform="translate(-134.04435,-372.91575)"> + <text + xml:space="preserve" + style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:20px;line-height:125%;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';text-align:start;letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;text-anchor:start;fill:#99cc99;fill-opacity:1;stroke:none;stroke-width:0.1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" + x="133.57837" + y="387.70511" + id="text3336" + sodipodi:linespacing="125%"><tspan + sodipodi:role="line" + id="tspan3338" + x="133.57837" + y="387.70511">go</tspan></text> + <text + xml:space="preserve" + style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:20px;line-height:125%;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';text-align:start;letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;text-anchor:start;fill:#66cccc;fill-opacity:1;stroke:none;stroke-width:0.1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" + x="158.28761" + y="387.68668" + id="text3340" + sodipodi:linespacing="125%"><tspan + sodipodi:role="line" + id="tspan3342" + x="158.28761" + y="387.68668">crypt</tspan></text> + <text + xml:space="preserve" + style="font-style:normal;font-variant:normal;font-weight:bold;font-stretch:normal;font-size:20px;line-height:125%;font-family:'Liberation Sans';-inkscape-font-specification:'Liberation Sans, Bold';text-align:start;letter-spacing:0px;word-spacing:0px;writing-mode:lr-tb;text-anchor:start;fill:#6699cc;fill-opacity:1;stroke:none;stroke-width:0.1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" + x="208.53677" + y="387.76227" + id="text3344" + sodipodi:linespacing="125%"><tspan + sodipodi:role="line" + id="tspan3346" + x="208.53677" + y="387.76227">fs</tspan></text> + </g> +</svg> diff --git a/Documentation/logo.svg.png b/Documentation/logo.svg.png Binary files differnew file mode 100644 index 0000000..1be9d8c --- /dev/null +++ b/Documentation/logo.svg.png @@ -1,4 +1,4 @@ -GoCryptFS [![Build Status](https://travis-ci.org/rfjakob/gocryptfs.svg?branch=master)](https://travis-ci.org/rfjakob/gocryptfs) ![Release Status](https://img.shields.io/badge/status-beta-yellow.svg?style=flat) +![gocryptfs](Documentation/logo.svg.png) [![Build Status](https://travis-ci.org/rfjakob/gocryptfs.svg?branch=master)](https://travis-ci.org/rfjakob/gocryptfs) ![Release Status](https://img.shields.io/badge/status-beta-yellow.svg?style=flat) ============== An encrypted overlay filesystem written in Go. @@ -97,6 +97,15 @@ The output should look like this: Changelog --------- +v0.7 +* **Extend GCM IV size to 128 bit from Go's default of 96 bit** + * This pushes back the birthday bound to make IV collisions virtually + impossible + * This is a forwards-compatible change. gocryptfs v0.7 can mount filesystems + created by earlier versions but not the other way round. +* New command-line option: + * `-gcmiv128`: Use 128-bit GCM IVs (default true) + v0.6 * **Wide-block filename encryption using EME + DirIV** * EME (ECB-Mix-ECB) provides even better security than CBC as it fixes @@ -104,7 +113,7 @@ v0.6 https://github.com/rfjakob/eme which is, as far as I know, the first implementation of EME in Go. * This is a forwards-compatible change. gocryptfs v0.6 can mount filesystems - created by earlier version but not the other way round. + created by earlier versions but not the other way round. * New command-line option: * `-emenames`: Enable EME filename encryption (default true) @@ -117,7 +126,7 @@ v0.5 * A single-entry IV cache brings the performance cost of DirIV close to zero for common operations (see performance.txt) * This is a forwards-compatible change. gocryptfs v0.5 can mount filesystems - created by earlier version but not the other way round. + created by earlier versions but not the other way round. * New command-line option: * `-diriv`: Use the new per-directory IV file name encryption (default true) * `-scryptn`: allows to set the scrypt cost parameter N. This option |