diff options
author | Roberto Sassu <roberto.sassu@polito.it> | 2011-03-21 11:00:53 -0400 |
---|---|---|
committer | Tyler Hicks <tyhicks@linux.vnet.ibm.com> | 2011-03-28 02:49:41 -0400 |
commit | 0e1fc5ef470cc1d157005c437a434868d59fead4 (patch) | |
tree | a15889a237ad7db00ef695d4338286e663127ee0 /fs/ecryptfs/main.c | |
parent | 7762e230fd31fcc1abc03ba32ee957fadc8eafb4 (diff) |
eCryptfs: verify authentication tokens before their use
Authentication tokens content may change if another requestor calls the
update() method of the corresponding key. The new function
ecryptfs_verify_auth_tok_from_key() retrieves the authentication token from
the provided key and verifies if it is still valid before being used to
encrypt or decrypt an eCryptfs file.
Signed-off-by: Roberto Sassu <roberto.sassu@polito.it>
[tyhicks: Minor formatting changes]
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
Diffstat (limited to 'fs/ecryptfs/main.c')
-rw-r--r-- | fs/ecryptfs/main.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/fs/ecryptfs/main.c b/fs/ecryptfs/main.c index 63e412cf0fa1..520d05f5ad01 100644 --- a/fs/ecryptfs/main.c +++ b/fs/ecryptfs/main.c | |||
@@ -239,14 +239,14 @@ static int ecryptfs_init_global_auth_toks( | |||
239 | struct ecryptfs_mount_crypt_stat *mount_crypt_stat) | 239 | struct ecryptfs_mount_crypt_stat *mount_crypt_stat) |
240 | { | 240 | { |
241 | struct ecryptfs_global_auth_tok *global_auth_tok; | 241 | struct ecryptfs_global_auth_tok *global_auth_tok; |
242 | struct ecryptfs_auth_tok *auth_tok; | ||
242 | int rc = 0; | 243 | int rc = 0; |
243 | 244 | ||
244 | list_for_each_entry(global_auth_tok, | 245 | list_for_each_entry(global_auth_tok, |
245 | &mount_crypt_stat->global_auth_tok_list, | 246 | &mount_crypt_stat->global_auth_tok_list, |
246 | mount_crypt_stat_list) { | 247 | mount_crypt_stat_list) { |
247 | rc = ecryptfs_keyring_auth_tok_for_sig( | 248 | rc = ecryptfs_keyring_auth_tok_for_sig( |
248 | &global_auth_tok->global_auth_tok_key, | 249 | &global_auth_tok->global_auth_tok_key, &auth_tok, |
249 | &global_auth_tok->global_auth_tok, | ||
250 | global_auth_tok->sig); | 250 | global_auth_tok->sig); |
251 | if (rc) { | 251 | if (rc) { |
252 | printk(KERN_ERR "Could not find valid key in user " | 252 | printk(KERN_ERR "Could not find valid key in user " |