|
@@ -70,6 +70,8 @@
|
|
# define RPCDBG_FACILITY RPCDBG_AUTH
|
|
# define RPCDBG_FACILITY RPCDBG_AUTH
|
|
#endif
|
|
#endif
|
|
|
|
|
|
|
|
+spinlock_t krb5_seq_lock = SPIN_LOCK_UNLOCKED;
|
|
|
|
+
|
|
u32
|
|
u32
|
|
gss_get_mic_kerberos(struct gss_ctx *gss_ctx, struct xdr_buf *text,
|
|
gss_get_mic_kerberos(struct gss_ctx *gss_ctx, struct xdr_buf *text,
|
|
struct xdr_netobj *token)
|
|
struct xdr_netobj *token)
|
|
@@ -80,6 +82,7 @@ gss_get_mic_kerberos(struct gss_ctx *gss_ctx, struct xdr_buf *text,
|
|
struct xdr_netobj md5cksum = {.len = 0, .data = cksumdata};
|
|
struct xdr_netobj md5cksum = {.len = 0, .data = cksumdata};
|
|
unsigned char *ptr, *krb5_hdr, *msg_start;
|
|
unsigned char *ptr, *krb5_hdr, *msg_start;
|
|
s32 now;
|
|
s32 now;
|
|
|
|
+ u32 seq_send;
|
|
|
|
|
|
dprintk("RPC: gss_krb5_seal\n");
|
|
dprintk("RPC: gss_krb5_seal\n");
|
|
|
|
|
|
@@ -134,12 +137,14 @@ gss_get_mic_kerberos(struct gss_ctx *gss_ctx, struct xdr_buf *text,
|
|
BUG();
|
|
BUG();
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+ spin_lock(&krb5_seq_lock);
|
|
|
|
+ seq_send = ctx->seq_send++;
|
|
|
|
+ spin_unlock(&krb5_seq_lock);
|
|
|
|
+
|
|
if ((krb5_make_seq_num(ctx->seq, ctx->initiate ? 0 : 0xff,
|
|
if ((krb5_make_seq_num(ctx->seq, ctx->initiate ? 0 : 0xff,
|
|
- ctx->seq_send, krb5_hdr + 16, krb5_hdr + 8)))
|
|
|
|
|
|
+ seq_send, krb5_hdr + 16, krb5_hdr + 8)))
|
|
goto out_err;
|
|
goto out_err;
|
|
|
|
|
|
- ctx->seq_send++;
|
|
|
|
-
|
|
|
|
return ((ctx->endtime < now) ? GSS_S_CONTEXT_EXPIRED : GSS_S_COMPLETE);
|
|
return ((ctx->endtime < now) ? GSS_S_CONTEXT_EXPIRED : GSS_S_COMPLETE);
|
|
out_err:
|
|
out_err:
|
|
return GSS_S_FAILURE;
|
|
return GSS_S_FAILURE;
|