From 4fee11f2e35b08e4184c2f4615074ad0b187b84a Mon Sep 17 00:00:00 2001 From: Jeff Layton Date: Tue, 17 Jan 2012 14:43:24 -0500 Subject: cifscreds: use the session keyring This seems like a reasonable change, but I'm willing to listen to arguments to the contrary... cifscreds currently hangs the keys off of the uid keyring. It seems more appropriate though that we require that each session have its own set. This might be particularly important in a containerized situation. If a user authenticates in one container, then we probably don't want to allow a user in another to "borrow" those creds. Signed-off-by: Jeff Layton --- cifscreds.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cifscreds.c b/cifscreds.c index cbd431e..6079b38 100644 --- a/cifscreds.c +++ b/cifscreds.c @@ -51,7 +51,7 @@ #define DOMAIN_DISALLOWED_CHARS "\\/:*?\"<>|" /* destination keyring */ -#define DEST_KEYRING KEY_SPEC_USER_KEYRING +#define DEST_KEYRING KEY_SPEC_SESSION_KEYRING struct cmdarg { char *host; -- cgit v1.2.3