summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-10-11main: check directories for existence earlyJakob Unterwurzacher
This prevents that the user enters the password only to get an error later.
2015-10-11Drop shell wrapperJakob Unterwurzacher
2015-10-11Add native daemonizationJakob Unterwurzacher
2015-10-11Rename sendSig to sendUsr1Jakob Unterwurzacher
This matches waitForUsr1 in daemonize()
2015-10-11Move main files to top level dirJakob Unterwurzacher
This is in preparation of getting rid of the shell wrapper
2015-10-10README: Remove dots noticeJakob Unterwurzacher
2015-10-08Shell wrapper: Also search the binary in $GOPATH/binJakob Unterwurzacher
2015-10-07README: Mention that only Linux is testedJakob Unterwurzacher
2015-10-07Update READMEJakob Unterwurzacher
2015-10-07Run go fmtJakob Unterwurzacher
2015-10-07Add package.bashJakob Unterwurzacher
2015-10-07Add test.bashv0.1Jakob Unterwurzacher
...also adapt the cryptfs tests for 256 bit long keys
2015-10-07Adapt openssl benchmark for 256 bit long keysJakob Unterwurzacher
2015-10-07Better usage textJakob Unterwurzacher
2015-10-07Move gocryptfs wrapper into the same folder as the binaryJakob Unterwurzacher
2015-10-07Implement "gocryptfs --passwd" (pasword changing)Jakob Unterwurzacher
2015-10-06Reword help textJakob Unterwurzacher
2015-10-06Split off SECURITY.mdJakob Unterwurzacher
2015-10-06Update README.mdJakob Unterwurzacher
2015-10-06Use block number as authentication dataJakob Unterwurzacher
2015-10-06Add "--masterkey=" parameter for recovery purposesJakob Unterwurzacher
2015-10-06Switch to AES-256Jakob Unterwurzacher
AES-256 seems to be becoming the industry standard. While AES-128 is good enough for tens of years to come, let's follow suit and be extra safe.
2015-10-06Add "--openssl=false" command line optionJakob Unterwurzacher
Also make main_test try both variants
2015-10-06Rewrite README.md (in progress)Jakob Unterwurzacher
2015-10-06Implement proper daemonizationJakob Unterwurzacher
The shell wrapper sends gocryptfs into the background and waits for SIGUSR1
2015-10-05Move main binary to gocryptfs_mainJakob Unterwurzacher
That way the wrapper shell script can be named just "gocryptfs"
2015-10-04openssl AEAD wrapper: handle authenticated dataJakob Unterwurzacher
2015-10-04Switch nonce generation to purely randomJakob Unterwurzacher
The old implementation of counting up from a random starting point had the problem that is allowed an attacker to find out the write order of the blocks.
2015-10-04Clean up openssl benchmarkJakob Unterwurzacher
2015-10-04tests: simplify namesJakob Unterwurzacher
main_test_tmp -> tmp main_benchmark.bash -> benchmark.bash
2015-10-04Utimens: Use UtimesNano instead of FutimesJakob Unterwurzacher
Futimes() only takes microsecond resolution while the FUSE call Utimens() wants nanosecond precision. This is why UTIME_OMIT did not work - this change fixes the xfstests generic/258 test failure. The go library does not provide a FutimesNano() function which is why I use UtimesNano() on /proc/self/fd/n. This is what the Go library does in Futimes().
2015-10-04fallocate: return ENOSYSJakob Unterwurzacher
The implementation was incomplete, disable fallocate completely for now. See https://github.com/rfjakob/gocryptfs/issues/1 Fixes xfstests generic/075
2015-10-04truncate: Fix bug that caused xfstests generic/030 to failJakob Unterwurzacher
The bug was caused by using cipherOff where plainOff should have been used. Renamed the symbols for less confusion.
2015-10-04Truncate: Logging improvements, show number of blocks as floatJakob Unterwurzacher
2015-10-04Fix Trucate() bug causing files to be too smallJakob Unterwurzacher
Uncovered by running xfstests generic/014 several times
2015-10-04Enable ClientInodes so hard links workJakob Unterwurzacher
Fixes xfstests generic/002
2015-10-04Run go fmtJakob Unterwurzacher
2015-10-04Remove ClueFS frontendJakob Unterwurzacher
Development has focused on PathFS for some time now and things are working well.
2015-10-04intraBlock: Rename Offset to SkipJakob Unterwurzacher
"Offset" is unclear whether it is an offset from the start of file or start of block. "Skip" seems much better.
2015-10-04Utilize file hole passtrough capability in Truncate()Jakob Unterwurzacher
Cuts down the runtime of xfstests generic/014 from 1822 seconds to 36 seconds
2015-10-04Zero-pad last block if a file hole is created on Write()Jakob Unterwurzacher
Fixes TestFileHoles test
2015-10-04Add BlockNoPlainOff() and BlockNoCipherOff() + testJakob Unterwurzacher
Also, fix key, it is now []byte, not [16]byte
2015-10-04tests: add TestFileHolesJakob Unterwurzacher
Create a file with holes by writing to offset 0 (block #0) and offset 4096 (block #1). This test currently fails.
2015-10-04Fix xfstests generic/030 failureJakob Unterwurzacher
The actual fix is oldSize := f.cfs.PlainSize(uint64(fi.Size())) the rest is logging improvements
2015-10-03Add daemonization shell scriptJakob Unterwurzacher
2015-10-03debug: log inode number instead of encrypted filenameJakob Unterwurzacher
Makes the log output smaller and more readable.
2015-10-03Implement file hole passtroughJakob Unterwurzacher
Fixes xfstests generic/010 Note that file holes are not authenticated,
2015-09-30tests: Add append testJakob Unterwurzacher
2015-09-30Implement Truncate() + TestJakob Unterwurzacher
2015-09-30debug: Log encrypted filenameJakob Unterwurzacher