提交 717757ad 编写于 作者: J J. Bruce Fields 提交者: Trond Myklebust

rpcgss: krb5: ignore seed

We're currently not actually using seed or seed_init.
Signed-off-by: NJ. Bruce Fields <bfields@citi.umich.edu>
Signed-off-by: NTrond Myklebust <Trond.Myklebust@netapp.com>
上级 d922a84a
...@@ -42,8 +42,6 @@ ...@@ -42,8 +42,6 @@
struct krb5_ctx { struct krb5_ctx {
int initiate; /* 1 = initiating, 0 = accepting */ int initiate; /* 1 = initiating, 0 = accepting */
int seed_init;
unsigned char seed[16];
struct crypto_blkcipher *enc; struct crypto_blkcipher *enc;
struct crypto_blkcipher *seq; struct crypto_blkcipher *seq;
s32 endtime; s32 endtime;
......
...@@ -137,12 +137,13 @@ gss_import_sec_context_kerberos(const void *p, ...@@ -137,12 +137,13 @@ gss_import_sec_context_kerberos(const void *p,
p = simple_get_bytes(p, end, &ctx->initiate, sizeof(ctx->initiate)); p = simple_get_bytes(p, end, &ctx->initiate, sizeof(ctx->initiate));
if (IS_ERR(p)) if (IS_ERR(p))
goto out_err_free_ctx; goto out_err_free_ctx;
p = simple_get_bytes(p, end, &ctx->seed_init, sizeof(ctx->seed_init)); /* The downcall format was designed before we completely understood
if (IS_ERR(p)) * the uses of the context fields; so it includes some stuff we
goto out_err_free_ctx; * just give some minimal sanity-checking, and some we ignore
p = simple_get_bytes(p, end, ctx->seed, sizeof(ctx->seed)); * completely (like the next twenty bytes): */
if (IS_ERR(p)) if (unlikely(p + 20 > end || p + 20 < p))
goto out_err_free_ctx; goto out_err_free_ctx;
p += 20;
p = simple_get_bytes(p, end, &tmp, sizeof(tmp)); p = simple_get_bytes(p, end, &tmp, sizeof(tmp));
if (IS_ERR(p)) if (IS_ERR(p))
goto out_err_free_ctx; goto out_err_free_ctx;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册