| Age | Commit message (Collapse) | Author | 
 | 
Also run go fmt
 | 
 | 
Also, forbid access to "gocryptfs.conf" in the root dir.
 | 
 | 
Move all the intelligence into the new file address_translation.go.
That the calculations were spread out too much became apparent when adding
the file header. This should make the code much easier to modify in the
future.
 | 
 | 
Format: [ "Version" uint16 big endian ] [ "Id" 16 random bytes ]
Quoting SECURITY.md:
* Every file has a header that contains a 16-byte random *file id*
* Each block uses the file id and its block number as GCM *authentication data*
 * This means the position of the blocks is protected as well. The blocks
   can not be reordered or copied between different files without
   causing an decryption error.
 | 
 | 
 | 
 | 
AES-256 seems to be becoming the industry standard. While AES-128 is
good enough for tens of years to come, let's follow suit and be extra
safe.
 | 
 | 
The shell wrapper sends gocryptfs into the background and waits for SIGUSR1
 | 
 | 
 | 
 | 
Makes the log output smaller and more readable.
 | 
 | 
Fixes xfstests generic/010
Note that file holes are not authenticated,
 | 
 | 
 | 
 | 
 | 
 | 
This brings streaming read performance from 30MB/s to 81MB/s
(similar improvement for writes)
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
 |