Sebastian Stenzel
3adfe6871b
reduced visibility of test classes [ci skip]
2015-12-07 15:05:01 +01:00
Sebastian Stenzel
97a72ecbf7
make some better use of mocks during unit tests
2015-12-07 14:59:12 +01:00
Sebastian Stenzel
0697e19b01
less random numbers in tests, explicit test timeout
2015-12-06 14:52:46 +01:00
Sebastian Stenzel
973a2fb395
fail with exception, if crypto worker is waiting too long (1 second) to be able to write to the output stream
2015-12-06 14:41:27 +01:00
Sebastian Stenzel
fc06595977
cancel work if poisoning (i.e. graceful termination) fails after timeout
2015-12-06 12:02:56 +01:00
Sebastian Stenzel
e4220246ab
(now really) fixed deadlock when crypto workers die due to exceptions
2015-12-06 11:10:19 +01:00
Sebastian Stenzel
128a93d44e
fixed deadlock when crypto workers die due to exceptions
2015-12-06 02:05:20 +01:00
Sebastian Stenzel
a7c19624ce
randomizing masterkeys is now a explicit task, so random numbers are not needed when loading a masterkey file from disk. trying to use an uninitialized cryptor results in runtime exceptions
2015-11-23 15:09:39 +01:00
Sebastian Stenzel
2fca4629b9
externalized AES-SIV to independent library
2015-11-18 08:25:50 +01:00
Sebastian Stenzel
4d5cc7a5a0
fixes #104
2015-11-05 20:39:05 +01:00
Sebastian Stenzel
55d1ffe703
improved smoothing, stricter IO impl during encryption
2015-10-28 17:55:28 +01:00
Sebastian Stenzel
c1f32105d8
last byte in request range inclusive (!!)
2015-10-03 14:07:41 +02:00
Sebastian Stenzel
09b4130c3e
- fixed size obfuscation padding
...
- fixed behaviour when serving invalid content ranges, thus improving random access performance (thats why we created the 0.8.2 workaround)
- reduced loglevels of some frequent messages
2015-10-03 13:10:28 +02:00
Sebastian Stenzel
6b073c1499
small I/O tweaks
2015-08-25 10:55:46 +02:00
Sebastian Stenzel
db2297d2f1
fixed unit test
2015-08-15 23:19:34 +02:00
Sebastian Stenzel
ecb178d5b2
simplified code
2015-08-02 15:13:56 +02:00
Sebastian Stenzel
ed7dc60f5e
slow start, increasing number of blocks worked on per thread, reusing ciphers for multiple consecutive blocks
2015-08-02 00:37:26 +02:00
Sebastian Stenzel
6bbfacd794
small changes for easier debugging
2015-08-01 21:34:47 +02:00
Sebastian Stenzel
5a06d01ef5
moved to ByteBuffers
2015-07-31 10:56:34 +02:00
Sebastian Stenzel
aac9ead633
- mutlithreaded encryption
...
- moved to bytebuffer (experimental)
2015-07-27 22:25:24 +02:00
Sebastian Stenzel
cdcc1626ce
multithreaded decryption using producer/consumer pattern
2015-07-26 22:22:50 +02:00
Sebastian Stenzel
738d2dfc34
first multithreaded decryption test (PoC quality)
2015-07-25 17:28:00 +02:00
Sebastian Stenzel
9771c6d1e7
don't decrypt file size obfucscation padding
2015-07-25 16:18:02 +02:00
Sebastian Stenzel
e8e80f306b
WebDAV range request refinements
2015-07-25 01:52:37 +02:00
Sebastian Stenzel
e1ce400bcd
fixed wrong long-to-bytearray conversion
2015-07-14 15:20:50 +02:00
Sebastian Stenzel
8c4d5a9614
non-interchangable chunks by adding additional data to MACs
2015-07-14 14:34:17 +02:00
Sebastian Stenzel
93a87c86a4
sensitive header data is now encrypted using a single enc_cbc(concat(fileSize, fileKey)) instead of encrypting both data separately
2015-07-13 17:37:06 +02:00
Sebastian Stenzel
685e347524
New MAC authentication warning, preventing CCAs, but allowing to force-decrypt unauthentic files.
2015-07-09 17:16:43 +02:00
Sebastian Stenzel
d76154c8d1
- reduced size of chunks, a MAC is calculated for (not final yet)
...
- faster range requests due to reduced chunk size, thus faster video playback start
- fixed range requests
- making file locks optional (if not supported by file system)
2015-07-03 19:30:49 +02:00
Sebastian Stenzel
bc76ab285d
fixed unit test
2015-06-27 08:09:12 +02:00
Sebastian Stenzel
0d3a5b4e70
- increased vault version
...
- Showing "per vault" MAC authentication failure dialogs
2015-06-26 23:35:24 +02:00
Sebastian Stenzel
48f544ef91
- support for http range requests in new schema
2015-06-21 22:11:15 +02:00
Sebastian Stenzel
45cf87d089
new, more secure encryption scheme
...
- fixed flaw reported by Stan Drapkin (SecurityDriven.NET) reducing effective key size to 96 bit
- multiple file content MACs for 1MB blocks, preventing chosen ciphertext attacks, as authentication now happens before decryption
- allowing files bigger than 64GiB
2015-06-21 18:51:39 +02:00
Sebastian Stenzel
8d8fe74d3a
restored ability to open vaults with 128 bit keylength
2015-05-30 20:13:11 +02:00
Sebastian Stenzel
0e3513e86d
- locking file header during creation,
...
- suggesting range request for files > 32MiB only
2015-05-22 22:26:39 +02:00
Sebastian Stenzel
0d969432c2
some more flat hierarchy fixes
2015-05-15 18:13:34 +02:00
Sebastian Stenzel
be369b480b
some more destruction...
2015-05-14 21:48:02 +02:00
Sebastian Stenzel
6f9b16a7dc
fixes #53
2015-05-10 14:00:00 +02:00
Sebastian Stenzel
a07efc5209
Proper error handling for outdated vault formats
2015-05-05 17:29:51 +02:00
Sebastian Stenzel
bbeeb79812
reduced max file name size, locking metadata files before read/write.
2015-05-05 06:50:16 +02:00
Sebastian Stenzel
4d08e9d72b
cleanup
2015-05-04 22:02:47 +02:00
Sebastian Stenzel
040f260bf0
authenticated file header
2015-05-04 21:31:41 +02:00
Sebastian Stenzel
cdf9c28a38
refactored directory structure, so windows (and OneDrive) can handle vaults better
2015-04-28 18:19:05 +02:00
Sebastian Stenzel
652c4cbafb
Using 96 bit of random data and a 32 bit counter (as specified in https://tools.ietf.org/html/rfc3686#section-4 ). Thus maximum file size supported by Cryptomator is 64GiB, but decreasing risk of IV collisions to 1 : 2^48
2015-03-14 21:58:06 +01:00
Sebastian Stenzel
188a13b202
- better handling of MAC auth fails, providing link to help page
...
- use random data as file size obfuscation padding
- fixed osx unmount error
- new attempt to close #41
2015-03-14 19:11:24 +01:00
Sebastian Stenzel
c1dd902a10
Async MAC authentication for HTTP range requests. Fixes #38
2015-03-09 16:32:59 +01:00
Sebastian Stenzel
2849e39e85
on-the-fly MAC calculation for better performance (addresses issue #38 )
...
we still need to add some kind of warning on the UI and create an async MAC checker for ranged requests
2015-03-01 22:23:42 +01:00
Sebastian Stenzel
9433c22d7f
minor I/O improvements
2015-03-01 20:55:32 +01:00
Sebastian Stenzel
63f64fae03
Fixed performance implications due to slow /dev/random. Now seeding PRNG only once per Cryptor. Fixes #36
2015-02-23 14:51:52 +01:00
Sebastian Stenzel
ea3384d189
removed multi user functionality (see #21 )
...
using fixed masterkey filename now
2015-02-22 15:15:43 +01:00