5b54577d2e
HashLongName() incorrectly hardcoded the call to base64.URLEncoding.
39 lines
1.2 KiB
Go
39 lines
1.2 KiB
Go
package fusefrontend_reverse
|
|
|
|
import (
|
|
"path/filepath"
|
|
"strings"
|
|
"syscall"
|
|
|
|
"github.com/rfjakob/gocryptfs/internal/ctlsock"
|
|
)
|
|
|
|
var _ ctlsock.Interface = &ReverseFS{} // Verify that interface is implemented.
|
|
|
|
// EncryptPath implements ctlsock.Backend.
|
|
// This is actually not used inside reverse mode, but we implement it because
|
|
// third-party tools want to encrypt paths through the control socket.
|
|
func (rfs *ReverseFS) EncryptPath(plainPath string) (string, error) {
|
|
if rfs.args.PlaintextNames || plainPath == "" {
|
|
return plainPath, nil
|
|
}
|
|
cipherPath := ""
|
|
parts := strings.Split(plainPath, "/")
|
|
for _, part := range parts {
|
|
dirIV := derivePathIV(cipherPath, ivPurposeDirIV)
|
|
encryptedPart := rfs.nameTransform.EncryptName(part, dirIV)
|
|
if rfs.args.LongNames && len(encryptedPart) > syscall.NAME_MAX {
|
|
encryptedPart = rfs.nameTransform.HashLongName(encryptedPart)
|
|
}
|
|
cipherPath = filepath.Join(cipherPath, encryptedPart)
|
|
}
|
|
return cipherPath, nil
|
|
}
|
|
|
|
// DecryptPath implements ctlsock.Backend
|
|
func (rfs *ReverseFS) DecryptPath(cipherPath string) (string, error) {
|
|
p, err := rfs.decryptPath(cipherPath)
|
|
//fmt.Printf("rfs DecryptPath: %q -> %q %v\n", cipherPath, p, err)
|
|
return p, err
|
|
}
|