Age | Commit message (Collapse) | Author | |
---|---|---|---|
2015-11-25 | diriv: Create gocryptfs.diriv in every directory | Jakob Unterwurzacher | |
2015-11-14 | Run go fmt and go vet | Jakob Unterwurzacher | |
2015-11-09 | Add "-q" (quiet) flag | Jakob Unterwurzacher | |
2015-11-08 | Handle ENOSPC errors better by preallocating the space before writing | Jakob Unterwurzacher | |
Prevent the case that we run out of space in the middle of writing a block - that would leave a corrupt block behind. | |||
2015-11-03 | Centralize path filter decision in CryptFS.IsFiltered() | Jakob Unterwurzacher | |
2015-11-03 | Implement PlainTextNames mode | Jakob Unterwurzacher | |
Also, forbid access to "gocryptfs.conf" in the root dir. | |||
2015-11-01 | Remove code detected by "deadcode" | Jakob Unterwurzacher | |
go get github.com/remyoudompheng/go-misc/deadcode | |||
2015-11-01 | Refactor ciphertext <-> plaintext offset translation functions | Jakob Unterwurzacher | |
Move all the intelligence into the new file address_translation.go. That the calculations were spread out too much became apparent when adding the file header. This should make the code much easier to modify in the future. | |||
2015-11-01 | Add file header (on-disk-format change) | Jakob Unterwurzacher | |
Format: [ "Version" uint16 big endian ] [ "Id" 16 random bytes ] Quoting SECURITY.md: * Every file has a header that contains a 16-byte random *file id* * Each block uses the file id and its block number as GCM *authentication data* * This means the position of the blocks is protected as well. The blocks can not be reordered or copied between different files without causing an decryption error. | |||
2015-10-06 | Use block number as authentication data | Jakob Unterwurzacher | |
2015-10-04 | Utimens: Use UtimesNano instead of Futimes | Jakob Unterwurzacher | |
Futimes() only takes microsecond resolution while the FUSE call Utimens() wants nanosecond precision. This is why UTIME_OMIT did not work - this change fixes the xfstests generic/258 test failure. The go library does not provide a FutimesNano() function which is why I use UtimesNano() on /proc/self/fd/n. This is what the Go library does in Futimes(). | |||
2015-10-04 | fallocate: return ENOSYS | Jakob Unterwurzacher | |
The implementation was incomplete, disable fallocate completely for now. See https://github.com/rfjakob/gocryptfs/issues/1 Fixes xfstests generic/075 | |||
2015-10-04 | truncate: Fix bug that caused xfstests generic/030 to fail | Jakob Unterwurzacher | |
The bug was caused by using cipherOff where plainOff should have been used. Renamed the symbols for less confusion. | |||
2015-10-04 | Truncate: Logging improvements, show number of blocks as float | Jakob Unterwurzacher | |
2015-10-04 | Fix Trucate() bug causing files to be too small | Jakob Unterwurzacher | |
Uncovered by running xfstests generic/014 several times | |||
2015-10-04 | Run go fmt | Jakob Unterwurzacher | |
2015-10-04 | intraBlock: Rename Offset to Skip | Jakob Unterwurzacher | |
"Offset" is unclear whether it is an offset from the start of file or start of block. "Skip" seems much better. | |||
2015-10-04 | Utilize file hole passtrough capability in Truncate() | Jakob Unterwurzacher | |
Cuts down the runtime of xfstests generic/014 from 1822 seconds to 36 seconds | |||
2015-10-04 | Zero-pad last block if a file hole is created on Write() | Jakob Unterwurzacher | |
Fixes TestFileHoles test | |||
2015-10-04 | Fix xfstests generic/030 failure | Jakob Unterwurzacher | |
The actual fix is oldSize := f.cfs.PlainSize(uint64(fi.Size())) the rest is logging improvements | |||
2015-10-03 | debug: log inode number instead of encrypted filename | Jakob Unterwurzacher | |
Makes the log output smaller and more readable. | |||
2015-09-30 | tests: Add append test | Jakob Unterwurzacher | |
2015-09-30 | Implement Truncate() + Test | Jakob Unterwurzacher | |
2015-09-30 | debug: Log encrypted filename | Jakob Unterwurzacher | |
2015-09-19 | Fix Chown parameter order | Jakob Unterwurzacher | |
2015-09-17 | Fix read benchmark | Jakob Unterwurzacher | |
2015-09-16 | Fix symlink size reporting | Jakob Unterwurzacher | |
2015-09-13 | Don't warn about "gocryptfs.conf" in the ciphertext root dir | Jakob Unterwurzacher | |
2015-09-13 | Encrypt key with scrypt-hashed password | Jakob Unterwurzacher | |
2015-09-09 | Fix File.GettAttr() size reporting | Jakob Unterwurzacher | |
The too-large reported value broke mmap (applications saw appended zero bytes) Also * Add locking for all fd operations * Add "--debug" command line switch | |||
2015-09-08 | Explain both frontends in readme | Jakob Unterwurzacher | |
Also, re-enable openssl and disable debug messages so testing gocryptfs is less painful | |||
2015-09-08 | Fix panic on absolute symlink | Jakob Unterwurzacher | |
2015-09-08 | tests: add TestCiphertextRange | Jakob Unterwurzacher | |
2015-09-08 | Fix append issue | Jakob Unterwurzacher | |
2015-09-08 | More debug logging, improve main_test.go (do not use all-zero content) | Jakob Unterwurzacher | |
2015-09-08 | Add pathfs frontend, part II | Jakob Unterwurzacher | |
Fix issues in read and write paths. Now passes selftest. | |||
2015-09-08 | Add pathfs frontend (uses go-fuse instead of bazil-fuse), part I | Jakob Unterwurzacher | |
Currently fails main_test.go, will be fixed in part II |