[PATCH 04/06] ecryptfs: Use the passed-in max value as the upper bound.

From: Stephan Müller
Date: Mon Jun 26 2006 - 19:46:49 EST


Kernel version: 2.6.17-mm1

Function encrypted_session_key_set is given a maximum length it is allowed
to write. This patch makes this function to obey this length.

Signed-off-by: Stephan Mueller <smueller@xxxxxxxxxx>

---

fs/ecryptfs/keystore.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)

f64944018925812338c59adab29982be8f963386
diff --git a/fs/ecryptfs/keystore.c b/fs/ecryptfs/keystore.c
index efcf00a..4b9b742 100644
--- a/fs/ecryptfs/keystore.c
+++ b/fs/ecryptfs/keystore.c
@@ -929,7 +929,7 @@ encrypted_session_key_set:
/* TODO: Packet size limit */
/* We have 5 bytes of surrounding packet data */
if ((0x05 + ECRYPTFS_SALT_SIZE
- + (*key_rec).enc_key_size) >= PAGE_CACHE_SIZE) {
+ + (*key_rec).enc_key_size) >= max) {
ecryptfs_printk(KERN_ERR, "Authentication token is too "
"large\n");
rc = -EINVAL;
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/