[prev in list] [next in list] [prev in thread] [next in thread] 

List:       linux-nfsv4
Subject:    =?iso-8859-1?q?R=E9f=2E_=3A_Re=3A_Error_on_mount_with_Kerbero?=
From:       kwc () citi ! umich ! edu (Kevin Coffman)
Date:       2005-04-14 11:06:56
Message-ID: 20050414150644.1B0581BB7F () citi ! umich ! edu
[Download RAW message or body]

This behavior looks like the failure when the negotiated context has an 
unsupported encryption type.

What is the output from "klist -ke"?  (client and server)
What does your /etc/krb5.conf file look like? (client and server)

You've already got this patch applied?

diff -puN utils/gssd/context.c~64bit-serialize utils/gssd/context.c
--- nfs-utils-1.0.7/utils/gssd/context.c~64bit-serialize        
2005-03-24 16:14:52.000000000 -0500
+++ nfs-utils-1.0.7-kwc/utils/gssd/context.c    2005-03-24 
16:15:37.000000000 -0500
@@ -220,7 +220,7 @@ prepare_krb5_rfc1964_buffer(gss_krb5_luc
        gss_buffer_desc *buf)
 {
        char *p, *end;
-       static int constant_zero = 0;
+       static int32_t constant_zero = 0;
        unsigned char fakeseed[16];
        uint32_t word_send_seq;
        gss_krb5_lucid_key_t enc_key;
@@ -348,8 +348,8 @@ serialize_krb5_ctx(gss_ctx_id_t ctx, gss
 {
        krb5_gss_ctx_id_t       kctx = (krb5_gss_ctx_id_t)ctx;
        char *p, *end;
-       static int constant_one = 1;
-       static int constant_zero = 0;
+       static int32_t constant_one = 1;
+       static int32_t constant_zero = 0;
        uint32_t word_seq_send;
 
        if (!(buf->value = calloc(1, MAX_CTX_LEN)))

_



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic