An encrypted filesystem
Not compatible with previous version. This introduces password hash checking to make sure correct pass entered. Please build from source. No binaries will be provided.
This supports several new ciphers made possible by use of the crypto++ libraries. The XTEA algorithm which I originally implemented myself as a proof-of-concept placeholder has been removed. Please build from source. No binaries will be provided.
Introduces a shell utility that can be used to access and modify TeaSafe containers without requiring fuse. The shell is in some ways similar to a standard terminal program. It has commands like 'ls' and 'pwd' etc. When running the teashell, type in 'help' for a list of available commands.
The following sha 256 values were generated for the binaries that go with this release.
36e14529da900ab8b7cd5974df423aff5e4ae09c4003cdbb5630af305a02c8f7 teasafe_Darwin c6edcd3e14abe057bfb58fa06e9f6e4ab28e24f772d818d10ef176e90242be9e teasafe_Linux dd1e882c91633355dc7fc5f21eaa8dfbd19ea20f5111afa5d600e84cde30e48e teashell_Darwin 46298bf8841a78fc4ecd4b4d48a0668c1d5fc9ae79ce2f94d4ed9c0409a06de0 teashell_Linux af8caa5bbc993f26870f510493ce5072e2daa5b8f52c7fc5665080df5ca60d67 maketeasafe_Darwin 06774cffed04e53262960dba851852103ac9d628d69d30a3dfcb7ec73503113e maketeasafe_Linux
Experimental mac and linux binaries.
NOTE: requires fuse or osxfuse (mac). Binaries have been statically linked against required boost libraries so I believe these should just work. As a caveat, however, I've not tested them on anything other than my dev machines.
sha256sums:
22a483cc12c2895518077d2e2a546fbcf81ed4e75b79b0779df95dd418827cfe teasafe_mac 11d65487da61d00cb4eb07143a8f11223d3e0e850d5848b774cea8c496c04d2b teasafe_linux 97e9a01bfaf49805044f4b069251f486726529fb06df2fc5b4775708d4b4c707 maketeasafe_mac 75125250197bb061ddd9fd4cc8ba52dcf181314ca7b1a7dcb968bb75a5e0310a maketeasafe_linux
Significant speed-ups.
Replaced mersenne twister rng with random_device for more secure random number generation
Now using iv for key generation salt and upped p to 8 (with N = 2^20 and r = 1)
IV generation now achieved using a Mersenne Twister PRNG
Updated scrypt code. Now using original reference implementation which seems lot cleaner Not compat with previous version due to bigger size of N being used
Now using the scrypt key-derivation algorithm (n = 1024, r = 1, p = 1) for key derivation Note, this is not compatible with previous versions