Age | Commit message (Collapse) | Author | |
---|---|---|---|
2016-01-20 | Convert logging to standard Go log.Logger | Jakob Unterwurzacher | |
This is in preparation of logging to syslog. | |||
2015-12-19 | Increase GCM IV size from 96 to 128 bits | Jakob Unterwurzacher | |
This pushes back the birthday bound for collisions to make it virtually irrelevant. | |||
2015-12-19 | diriv: handle directory rename over directory | Jakob Unterwurzacher | |
If an empty directory is overwritten we will always get ENOTEMPTY as the "empty" directory will still contain gocryptfs.diriv. Handle that case by removing the target directory and trying again. Fixes issue #10 | |||
2015-12-13 | go fmt | Jakob Unterwurzacher | |
...and minimal comment changes. | |||
2015-12-11 | Rmdir: handle creating and removing unreadable directories | Jakob Unterwurzacher | |
This patch also splits off Mkdir and Rmdir into its own file. Fixes issue #8, thanks to @diseq for the bug report. | |||
2015-12-10 | Add missing PlaintextNames checks in OpenDir, Mkdir, Rmdir, initDir | Jakob Unterwurzacher | |
Plaintextnames support has bitrotted during the DirIV additions, this needs test cases. Will be added in a future patch. Fixes issue #9. | |||
2015-12-08 | Add EME filename encryption & enable it by default | Jakob Unterwurzacher | |
2015-12-06 | Fix rename, was broken broken by DirIV introduction | Jakob Unterwurzacher | |
As it was, CIPHERDIR was prepended twice, causing every rename to fail with ENOENT. | |||
2015-11-29 | Run go fmt | Jakob Unterwurzacher | |
2015-11-29 | Add single-element cache for DirIV lookup | Jakob Unterwurzacher | |
Another 3x performance boost for applications that walk the directory tree. Excerpt from performance.txt: VERSION UNTAR LS RM v0.4 48 1.5 5 v0.5-rc1 56 7 19 v0.5-rc1-1 54 4.1 9 v0.5-rc1-2 45 1.7 3.4 <---- THIS VERSION | |||
2015-11-29 | OpenDir performance: Read DirIV once and reuse it for all names | Jakob Unterwurzacher | |
Formerly, we called decryptPath for every name. That resulted in a directory walk that reads in all diriv files on the way. Massive improvement for RM and LS (check performance.txt for details) VERSION UNTAR RM LS v0.4 48 5 1.5 v0.5-rc1 56 19 7 v0.5-rc1-1 54 9 4.1 <---- THIS VERSION | |||
2015-11-28 | diriv: also support old CBC symlink | Jakob Unterwurzacher | |
2015-11-28 | diriv: fix Symlink() and Readlink() | Jakob Unterwurzacher | |
Both were missing adaptions for diriv usage resulting in broken functionality | |||
2015-11-28 | diriv: fix readdir | Jakob Unterwurzacher | |
It decrypted all file names using the root directory iv | |||
2015-11-28 | diriv: use "DirIV" flag to discern and support mounting old filesystems | Jakob Unterwurzacher | |
2015-11-27 | Run go fmt | Jakob Unterwurzacher | |
2015-11-27 | diriv: Move WriteDirIV() to cryptfs; add locking to Mkdir, Rmdir | Jakob Unterwurzacher | |
2015-11-27 | diriv: Convert filename encryption users to diriv | Jakob Unterwurzacher | |
2015-11-25 | diriv: Transactionally delete gocryptfs.diriv in Rmdir | Jakob Unterwurzacher | |
2015-11-25 | diriv: Create gocryptfs.diriv in every directory | Jakob Unterwurzacher | |
2015-11-14 | Run go fmt and go vet | Jakob Unterwurzacher | |
2015-11-09 | Add "-q" (quiet) flag | Jakob Unterwurzacher | |
2015-11-03 | Centralize path filter decision in CryptFS.IsFiltered() | Jakob Unterwurzacher | |
2015-11-03 | Implement PlainTextNames mode | Jakob Unterwurzacher | |
Also, forbid access to "gocryptfs.conf" in the root dir. | |||
2015-11-01 | Refactor ciphertext <-> plaintext offset translation functions | Jakob Unterwurzacher | |
Move all the intelligence into the new file address_translation.go. That the calculations were spread out too much became apparent when adding the file header. This should make the code much easier to modify in the future. | |||
2015-11-01 | Add file header (on-disk-format change) | Jakob Unterwurzacher | |
Format: [ "Version" uint16 big endian ] [ "Id" 16 random bytes ] Quoting SECURITY.md: * Every file has a header that contains a 16-byte random *file id* * Each block uses the file id and its block number as GCM *authentication data* * This means the position of the blocks is protected as well. The blocks can not be reordered or copied between different files without causing an decryption error. | |||
2015-10-04 | Run go fmt | Jakob Unterwurzacher | |
2015-09-19 | Fix Chown parameter order | Jakob Unterwurzacher | |
2015-09-17 | Fix read benchmark | Jakob Unterwurzacher | |
2015-09-16 | Fix symlink size reporting | Jakob Unterwurzacher | |
2015-09-13 | Don't warn about "gocryptfs.conf" in the ciphertext root dir | Jakob Unterwurzacher | |
2015-09-13 | Encrypt key with scrypt-hashed password | Jakob Unterwurzacher | |
2015-09-09 | Fix File.GettAttr() size reporting | Jakob Unterwurzacher | |
The too-large reported value broke mmap (applications saw appended zero bytes) Also * Add locking for all fd operations * Add "--debug" command line switch | |||
2015-09-08 | Fix panic on absolute symlink | Jakob Unterwurzacher | |
2015-09-08 | Add pathfs frontend (uses go-fuse instead of bazil-fuse), part I | Jakob Unterwurzacher | |
Currently fails main_test.go, will be fixed in part II |