[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-nfsv4
Subject: =?iso-8859-1?q?R=E9f=2E_=3A_Re=3A_Error_on_mount_with_Kerbero?=
From: kwc () citi ! umich ! edu (Kevin Coffman)
Date: 2005-04-14 11:06:56
Message-ID: 20050414150644.1B0581BB7F () citi ! umich ! edu
[Download RAW message or body]
This behavior looks like the failure when the negotiated context has an
unsupported encryption type.
What is the output from "klist -ke"? (client and server)
What does your /etc/krb5.conf file look like? (client and server)
You've already got this patch applied?
diff -puN utils/gssd/context.c~64bit-serialize utils/gssd/context.c
--- nfs-utils-1.0.7/utils/gssd/context.c~64bit-serialize
2005-03-24 16:14:52.000000000 -0500
+++ nfs-utils-1.0.7-kwc/utils/gssd/context.c 2005-03-24
16:15:37.000000000 -0500
@@ -220,7 +220,7 @@ prepare_krb5_rfc1964_buffer(gss_krb5_luc
gss_buffer_desc *buf)
{
char *p, *end;
- static int constant_zero = 0;
+ static int32_t constant_zero = 0;
unsigned char fakeseed[16];
uint32_t word_send_seq;
gss_krb5_lucid_key_t enc_key;
@@ -348,8 +348,8 @@ serialize_krb5_ctx(gss_ctx_id_t ctx, gss
{
krb5_gss_ctx_id_t kctx = (krb5_gss_ctx_id_t)ctx;
char *p, *end;
- static int constant_one = 1;
- static int constant_zero = 0;
+ static int32_t constant_one = 1;
+ static int32_t constant_zero = 0;
uint32_t word_seq_send;
if (!(buf->value = calloc(1, MAX_CTX_LEN)))
_
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic