diff options
author | Jakob Unterwurzacher | 2020-07-17 22:14:40 +0200 |
---|---|---|
committer | Jakob Unterwurzacher | 2020-07-17 22:14:40 +0200 |
commit | 7eae35e2d317f737cd69afdf88539c5d29b91296 (patch) | |
tree | e8a138f87d44994168022f8daac2be9b9d40da18 /internal | |
parent | 57d572dbc10cfb1d14642598b0827d4119b26b64 (diff) |
v2api: implement ctlsocksrv.Interface
Diffstat (limited to 'internal')
-rw-r--r-- | internal/fusefrontend/ctlsock_interface.go | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/internal/fusefrontend/ctlsock_interface.go b/internal/fusefrontend/ctlsock_interface.go index 2131463..f34739a 100644 --- a/internal/fusefrontend/ctlsock_interface.go +++ b/internal/fusefrontend/ctlsock_interface.go @@ -13,17 +13,17 @@ import ( "github.com/rfjakob/gocryptfs/internal/tlog" ) -var _ ctlsocksrv.Interface = &FS{} // Verify that interface is implemented. +var _ ctlsocksrv.Interface = &RootNode{} // Verify that interface is implemented. // EncryptPath implements ctlsock.Backend // // Symlink-safe through openBackingDir(). -func (fs *FS) EncryptPath(plainPath string) (string, error) { +func (rn *RootNode) EncryptPath(plainPath string) (string, error) { if plainPath == "" { // Empty string gets encrypted as empty string return plainPath, nil } - if fs.args.PlaintextNames { + if rn.args.PlaintextNames { return plainPath, nil } // Encrypt path level by level using openBackingDir. Pretty inefficient, @@ -33,7 +33,7 @@ func (fs *FS) EncryptPath(plainPath string) (string, error) { cPath := "" for _, part := range parts { wd = filepath.Join(wd, part) - dirfd, cName, err := fs.openBackingDir(wd) + dirfd, cName, err := rn.openBackingDir(wd) if err != nil { return "", err } @@ -48,20 +48,20 @@ func (fs *FS) EncryptPath(plainPath string) (string, error) { // // DecryptPath is symlink-safe because openBackingDir() and decryptPathAt() // are symlink-safe. -func (fs *FS) DecryptPath(cipherPath string) (plainPath string, err error) { - dirfd, _, err := fs.openBackingDir("") +func (rn *RootNode) DecryptPath(cipherPath string) (plainPath string, err error) { + dirfd, _, err := rn.openBackingDir("") if err != nil { return "", err } defer syscall.Close(dirfd) - return fs.decryptPathAt(dirfd, cipherPath) + return rn.decryptPathAt(dirfd, cipherPath) } // decryptPathAt decrypts a ciphertext path relative to dirfd. // // Symlink-safe through ReadDirIVAt() and ReadLongNameAt(). -func (fs *FS) decryptPathAt(dirfd int, cipherPath string) (plainPath string, err error) { - if fs.args.PlaintextNames || cipherPath == "" { +func (rn *RootNode) decryptPathAt(dirfd int, cipherPath string) (plainPath string, err error) { + if rn.args.PlaintextNames || cipherPath == "" { return cipherPath, nil } parts := strings.Split(cipherPath, "/") @@ -80,7 +80,7 @@ func (fs *FS) decryptPathAt(dirfd int, cipherPath string) (plainPath string, err return "", err } } - name, err := fs.nameTransform.DecryptName(longPart, dirIV) + name, err := rn.nameTransform.DecryptName(longPart, dirIV) if err != nil { fmt.Printf("DecryptName: %v\n", err) return "", err |