20b058a333
Another 3x performance boost for applications that walk the directory tree. Excerpt from performance.txt: VERSION UNTAR LS RM v0.4 48 1.5 5 v0.5-rc1 56 7 19 v0.5-rc1-1 54 4.1 9 v0.5-rc1-2 45 1.7 3.4 <---- THIS VERSION
70 lines
1.3 KiB
Go
70 lines
1.3 KiB
Go
package cryptfs
|
|
|
|
// CryptFS is the crypto backend of GoCryptFS
|
|
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"fmt"
|
|
)
|
|
|
|
const (
|
|
DEFAULT_PLAINBS = 4096
|
|
KEY_LEN = 32 // AES-256
|
|
NONCE_LEN = 12
|
|
AUTH_TAG_LEN = 16
|
|
BLOCK_OVERHEAD = NONCE_LEN + AUTH_TAG_LEN
|
|
DIRIV_LEN = 16 // identical to AES block size
|
|
DIRIV_FILENAME = "gocryptfs.diriv"
|
|
)
|
|
|
|
type CryptFS struct {
|
|
blockCipher cipher.Block
|
|
gcm cipher.AEAD
|
|
plainBS uint64
|
|
cipherBS uint64
|
|
// Stores an all-zero block of size cipherBS
|
|
allZeroBlock []byte
|
|
plaintextNames bool
|
|
// DirIV cache for filename encryption
|
|
DirIVCacheEnc DirIVCache
|
|
}
|
|
|
|
func NewCryptFS(key []byte, useOpenssl bool, plaintextNames bool) *CryptFS {
|
|
|
|
if len(key) != KEY_LEN {
|
|
panic(fmt.Sprintf("Unsupported key length %d", len(key)))
|
|
}
|
|
|
|
b, err := aes.NewCipher(key)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
var gcm cipher.AEAD
|
|
if useOpenssl {
|
|
gcm = opensslGCM{key}
|
|
} else {
|
|
gcm, err = cipher.NewGCM(b)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
cipherBS := DEFAULT_PLAINBS + NONCE_LEN + AUTH_TAG_LEN
|
|
|
|
return &CryptFS{
|
|
blockCipher: b,
|
|
gcm: gcm,
|
|
plainBS: DEFAULT_PLAINBS,
|
|
cipherBS: uint64(cipherBS),
|
|
allZeroBlock: make([]byte, cipherBS),
|
|
plaintextNames: plaintextNames,
|
|
}
|
|
}
|
|
|
|
// Get plaintext block size
|
|
func (be *CryptFS) PlainBS() uint64 {
|
|
return be.plainBS
|
|
}
|