Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp4034775pxp; Wed, 23 Mar 2022 10:05:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzbcC8yCnKkfjUOg3BdSRufNyJmHVznJCqdFAg4aZFOT2hZpF2cZm47DNIBsD1XfwLwUp3R X-Received: by 2002:a17:907:7f8b:b0:6e0:612b:38fd with SMTP id qk11-20020a1709077f8b00b006e0612b38fdmr1122343ejc.552.1648055139220; Wed, 23 Mar 2022 10:05:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648055139; cv=none; d=google.com; s=arc-20160816; b=w+XhHAiKuDBqC2IaYB9/MaEDQC5ZnWARG13N4kInd2vFM1DgDKAhW8xV/Uy6bFJjBe gP7UaSZoD1PMGiWDQwKyRimKOexWhmTrLcNaV7bRETdduyAtB/jsE4esl73rWvdMAv8S 5p0NJ+v23nYy6qYc48WDYJpsUEZwjc/GtLgP0zWjLKq4SfoYlyiOGQbFXFyLAv/VpzLj lUQ4GT0TI559rm1/b04dc7XsY5ATpBpaji1Ul9VMzAxHR5GJ9VaSBuSlp0bID8apYgDR jjIjIFCYPPrJXRjUXn1vvhMHiGR54WnLOt24iUlNptzXobZ3O5DB1tr92IMxHPVLbAPa 3xKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=UVNkDJGx18bZucUtxmw8miV9k2kKVCJm126H6T7GmSA=; b=rPI9JMzqgz1umeB94VnZIEyreUkXhHLQJQW/j43aC3WzLm1iEruFWrgvEUJ2fafq1k XsSu4Vf6SmSEaOItj41xA9PpFDCu26zuHJn1mt3yDz5rdq2fnmN/eX7guTDU9/oVA8An TPi+kjZ2Ur2I4DbayizoazxxY8FFyZcmzJQ6yKNd4wGsnFYj7vZL37Debe3RvtjpV91R bLX3AJsrVpwh42zuQ1xHW+h73wZMWayK+RBfDR13ftcA6Bw5hZm+jB2aOXG9ZpTlQKzl mN52q6vpuPhLtbNJdAsSaJgySYHQIayDIK8Awjh4FC0o97xMFZOjDoFb6rHHfwd4UXr/ UgXg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=mskWwbvS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ji15-20020a170907980f00b006df76385cfdsi16568165ejc.413.2022.03.23.10.05.11; Wed, 23 Mar 2022 10:05:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=mskWwbvS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237374AbiCVOQf (ORCPT + 99 others); Tue, 22 Mar 2022 10:16:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52194 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236618AbiCVOPP (ORCPT ); Tue, 22 Mar 2022 10:15:15 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 43E9C140A1; Tue, 22 Mar 2022 07:13:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 94628CE1E22; Tue, 22 Mar 2022 14:13:43 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3E4EFC340F0; Tue, 22 Mar 2022 14:13:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1647958421; bh=+gRzqyCT8opSF9C50+LafLaC81QcPvoC9e2YA+al/TU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mskWwbvSqug0wjMP13SwBbdEOUcol4J1lRz++hvSvFxUCOF21YWgw0RgekU+Vo3A2 M/ue0PC+72Oh+G6kiTFC1kPERDd/loKakbx/M6X+0joiMFxMWyLmtVIHv+0LqXsiyP morEUQr4QpiGPoSIoXbYH35hnkE6rzN1gGFsYcWKSR0s0h2CCjUV9DHjKf3kv7du4w 9MMvpn2s+c9QAsXePQ6sJNjQJXHgjnrN9Zk2epxFDgR12uEfcZTkO75dfKFLhOCUKW Bw/WAuqoyC0Ca8FU5h4Da8oEUSHkpF03II2QY3OwDcYn0Erf8EzLN8opjhUys2NNgk Q4hiWFEKGU9fg== From: Jeff Layton To: idryomov@gmail.com, xiubli@redhat.com Cc: ceph-devel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-kernel@vger.kernel.org, lhenriques@suse.de Subject: [RFC PATCH v11 24/51] ceph: add ceph_encode_encrypted_dname() helper Date: Tue, 22 Mar 2022 10:12:49 -0400 Message-Id: <20220322141316.41325-25-jlayton@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220322141316.41325-1-jlayton@kernel.org> References: <20220322141316.41325-1-jlayton@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xiubo Li Add a new helper that basically calls ceph_encode_encrypted_fname, but with a qstr pointer instead of a dentry pointer. This will make it simpler to decrypt names in a readdir reply, before we have a dentry. Signed-off-by: Xiubo Li Signed-off-by: Jeff Layton --- fs/ceph/crypto.c | 11 ++++++++--- fs/ceph/crypto.h | 8 ++++++++ 2 files changed, 16 insertions(+), 3 deletions(-) diff --git a/fs/ceph/crypto.c b/fs/ceph/crypto.c index e56017d66354..420a2cc1a8e5 100644 --- a/fs/ceph/crypto.c +++ b/fs/ceph/crypto.c @@ -128,7 +128,7 @@ void ceph_fscrypt_as_ctx_to_req(struct ceph_mds_request *req, struct ceph_acl_se swap(req->r_fscrypt_auth, as->fscrypt_auth); } -int ceph_encode_encrypted_fname(const struct inode *parent, struct dentry *dentry, char *buf) +int ceph_encode_encrypted_dname(const struct inode *parent, struct qstr *d_name, char *buf) { u32 len; int elen; @@ -143,7 +143,7 @@ int ceph_encode_encrypted_fname(const struct inode *parent, struct dentry *dentr * * See: fscrypt_setup_filename */ - if (!fscrypt_fname_encrypted_size(parent, dentry->d_name.len, NAME_MAX, &len)) + if (!fscrypt_fname_encrypted_size(parent, d_name->len, NAME_MAX, &len)) return -ENAMETOOLONG; /* Allocate a buffer appropriate to hold the result */ @@ -151,7 +151,7 @@ int ceph_encode_encrypted_fname(const struct inode *parent, struct dentry *dentr if (!cryptbuf) return -ENOMEM; - ret = fscrypt_fname_encrypt(parent, &dentry->d_name, cryptbuf, len); + ret = fscrypt_fname_encrypt(parent, d_name, cryptbuf, len); if (ret) { kfree(cryptbuf); return ret; @@ -175,6 +175,11 @@ int ceph_encode_encrypted_fname(const struct inode *parent, struct dentry *dentr return elen; } +int ceph_encode_encrypted_fname(const struct inode *parent, struct dentry *dentry, char *buf) +{ + return ceph_encode_encrypted_dname(parent, &dentry->d_name, buf); +} + /** * ceph_fname_to_usr - convert a filename for userland presentation * @fname: ceph_fname to be converted diff --git a/fs/ceph/crypto.h b/fs/ceph/crypto.h index 7e56aded5124..e54150260eba 100644 --- a/fs/ceph/crypto.h +++ b/fs/ceph/crypto.h @@ -67,6 +67,7 @@ void ceph_fscrypt_free_dummy_policy(struct ceph_fs_client *fsc); int ceph_fscrypt_prepare_context(struct inode *dir, struct inode *inode, struct ceph_acl_sec_ctx *as); void ceph_fscrypt_as_ctx_to_req(struct ceph_mds_request *req, struct ceph_acl_sec_ctx *as); +int ceph_encode_encrypted_dname(const struct inode *parent, struct qstr *d_name, char *buf); int ceph_encode_encrypted_fname(const struct inode *parent, struct dentry *dentry, char *buf); static inline int ceph_fname_alloc_buffer(struct inode *parent, struct fscrypt_str *fname) @@ -108,6 +109,13 @@ static inline void ceph_fscrypt_as_ctx_to_req(struct ceph_mds_request *req, { } +static inline int ceph_encode_encrypted_dname(const struct inode *parent, + struct qstr *d_name, char *buf) +{ + memcpy(buf, d_name->name, d_name->len); + return d_name->len; +} + static inline int ceph_encode_encrypted_fname(const struct inode *parent, struct dentry *dentry, char *buf) { -- 2.35.1