Age | Commit message (Collapse) | Author | |
---|---|---|---|
2015-12-19 | Use NewGCMWithNonceSize only through goGCMWrapper to support Go 1.4 | Jakob Unterwurzacher | |
2015-12-19 | Increase GCM IV size from 96 to 128 bits | Jakob Unterwurzacher | |
This pushes back the birthday bound for collisions to make it virtually irrelevant. | |||
2015-12-13 | go fmt | Jakob Unterwurzacher | |
...and minimal comment changes. | |||
2015-12-08 | Add EME filename encryption & enable it by default | Jakob Unterwurzacher | |
2015-11-29 | Add single-element cache for DirIV lookup | Jakob Unterwurzacher | |
Another 3x performance boost for applications that walk the directory tree. Excerpt from performance.txt: VERSION UNTAR LS RM v0.4 48 1.5 5 v0.5-rc1 56 7 19 v0.5-rc1-1 54 4.1 9 v0.5-rc1-2 45 1.7 3.4 <---- THIS VERSION | |||
2015-11-25 | diriv: Create gocryptfs.diriv in every directory | Jakob Unterwurzacher | |
2015-11-03 | Update USAGE.txt | Jakob Unterwurzacher | |
Also run go fmt | |||
2015-11-03 | Implement PlainTextNames mode | Jakob Unterwurzacher | |
Also, forbid access to "gocryptfs.conf" in the root dir. | |||
2015-11-01 | Refactor ciphertext <-> plaintext offset translation functions | Jakob Unterwurzacher | |
Move all the intelligence into the new file address_translation.go. That the calculations were spread out too much became apparent when adding the file header. This should make the code much easier to modify in the future. | |||
2015-11-01 | Add file header (on-disk-format change) | Jakob Unterwurzacher | |
Format: [ "Version" uint16 big endian ] [ "Id" 16 random bytes ] Quoting SECURITY.md: * Every file has a header that contains a 16-byte random *file id* * Each block uses the file id and its block number as GCM *authentication data* * This means the position of the blocks is protected as well. The blocks can not be reordered or copied between different files without causing an decryption error. | |||
2015-10-06 | Use block number as authentication data | Jakob Unterwurzacher | |
2015-10-06 | Switch to AES-256 | Jakob Unterwurzacher | |
AES-256 seems to be becoming the industry standard. While AES-128 is good enough for tens of years to come, let's follow suit and be extra safe. | |||
2015-10-06 | Implement proper daemonization | Jakob Unterwurzacher | |
The shell wrapper sends gocryptfs into the background and waits for SIGUSR1 | |||
2015-10-04 | Run go fmt | Jakob Unterwurzacher | |
2015-10-03 | debug: log inode number instead of encrypted filename | Jakob Unterwurzacher | |
Makes the log output smaller and more readable. | |||
2015-10-03 | Implement file hole passtrough | Jakob Unterwurzacher | |
Fixes xfstests generic/010 Note that file holes are not authenticated, | |||
2015-09-13 | Encrypt key with scrypt-hashed password | Jakob Unterwurzacher | |
2015-09-13 | Implement json config storage (not yet encrypted) | Jakob Unterwurzacher | |
2015-09-06 | Add OpenSSL support for file content encryption/decryption | Jakob Unterwurzacher | |
This brings streaming read performance from 30MB/s to 81MB/s (similar improvement for writes) | |||
2015-09-05 | Cleanup and rename files | Jakob Unterwurzacher | |
2015-09-05 | Fix size reporting | Jakob Unterwurzacher | |
2015-09-05 | Fix write path | Jakob Unterwurzacher | |
2015-09-05 | Wrap cluefs part I | Jakob Unterwurzacher | |