diff options
author | YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org> | 2007-02-09 18:38:13 -0500 |
---|---|---|
committer | David S. Miller <davem@sunset.davemloft.net> | 2007-02-11 02:20:13 -0500 |
commit | cca5172a7ec10dfdb0b787cd8e9d5b0b8f179793 (patch) | |
tree | 1b9e86cf95ab5e1e2b3180ebe59be2a05ebbe1bf /net/sunrpc/auth_gss | |
parent | d808ad9ab8b1109239027c248c4652503b9d3029 (diff) |
[NET] SUNRPC: Fix whitespace errors.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/sunrpc/auth_gss')
-rw-r--r-- | net/sunrpc/auth_gss/auth_gss.c | 20 | ||||
-rw-r--r-- | net/sunrpc/auth_gss/gss_generic_token.c | 10 | ||||
-rw-r--r-- | net/sunrpc/auth_gss/gss_krb5_crypto.c | 4 | ||||
-rw-r--r-- | net/sunrpc/auth_gss/gss_krb5_seqnum.c | 4 | ||||
-rw-r--r-- | net/sunrpc/auth_gss/gss_mech_switch.c | 4 | ||||
-rw-r--r-- | net/sunrpc/auth_gss/gss_spkm3_token.c | 48 | ||||
-rw-r--r-- | net/sunrpc/auth_gss/gss_spkm3_unseal.c | 2 | ||||
-rw-r--r-- | net/sunrpc/auth_gss/svcauth_gss.c | 6 |
8 files changed, 49 insertions, 49 deletions
diff --git a/net/sunrpc/auth_gss/auth_gss.c b/net/sunrpc/auth_gss/auth_gss.c index e1a104abb782..718fb94ad0f7 100644 --- a/net/sunrpc/auth_gss/auth_gss.c +++ b/net/sunrpc/auth_gss/auth_gss.c | |||
@@ -2,7 +2,7 @@ | |||
2 | * linux/net/sunrpc/auth_gss/auth_gss.c | 2 | * linux/net/sunrpc/auth_gss/auth_gss.c |
3 | * | 3 | * |
4 | * RPCSEC_GSS client authentication. | 4 | * RPCSEC_GSS client authentication. |
5 | * | 5 | * |
6 | * Copyright (c) 2000 The Regents of the University of Michigan. | 6 | * Copyright (c) 2000 The Regents of the University of Michigan. |
7 | * All rights reserved. | 7 | * All rights reserved. |
8 | * | 8 | * |
@@ -74,7 +74,7 @@ static struct rpc_credops gss_credops; | |||
74 | * as it is passed to gssd to signal the use of | 74 | * as it is passed to gssd to signal the use of |
75 | * machine creds should be part of the shared rpc interface */ | 75 | * machine creds should be part of the shared rpc interface */ |
76 | 76 | ||
77 | #define CA_RUN_AS_MACHINE 0x00000200 | 77 | #define CA_RUN_AS_MACHINE 0x00000200 |
78 | 78 | ||
79 | /* dump the buffer in `emacs-hexl' style */ | 79 | /* dump the buffer in `emacs-hexl' style */ |
80 | #define isprint(c) ((c > 0x1f) && (c < 0x7f)) | 80 | #define isprint(c) ((c > 0x1f) && (c < 0x7f)) |
@@ -607,8 +607,8 @@ gss_pipe_destroy_msg(struct rpc_pipe_msg *msg) | |||
607 | } | 607 | } |
608 | } | 608 | } |
609 | 609 | ||
610 | /* | 610 | /* |
611 | * NOTE: we have the opportunity to use different | 611 | * NOTE: we have the opportunity to use different |
612 | * parameters based on the input flavor (which must be a pseudoflavor) | 612 | * parameters based on the input flavor (which must be a pseudoflavor) |
613 | */ | 613 | */ |
614 | static struct rpc_auth * | 614 | static struct rpc_auth * |
@@ -869,7 +869,7 @@ gss_validate(struct rpc_task *task, __be32 *p) | |||
869 | 869 | ||
870 | flav = ntohl(*p++); | 870 | flav = ntohl(*p++); |
871 | if ((len = ntohl(*p++)) > RPC_MAX_AUTH_SIZE) | 871 | if ((len = ntohl(*p++)) > RPC_MAX_AUTH_SIZE) |
872 | goto out_bad; | 872 | goto out_bad; |
873 | if (flav != RPC_AUTH_GSS) | 873 | if (flav != RPC_AUTH_GSS) |
874 | goto out_bad; | 874 | goto out_bad; |
875 | seq = htonl(task->tk_rqstp->rq_seqno); | 875 | seq = htonl(task->tk_rqstp->rq_seqno); |
@@ -925,7 +925,7 @@ gss_wrap_req_integ(struct rpc_cred *cred, struct gss_cl_ctx *ctx, | |||
925 | *integ_len = htonl(integ_buf.len); | 925 | *integ_len = htonl(integ_buf.len); |
926 | 926 | ||
927 | /* guess whether we're in the head or the tail: */ | 927 | /* guess whether we're in the head or the tail: */ |
928 | if (snd_buf->page_len || snd_buf->tail[0].iov_len) | 928 | if (snd_buf->page_len || snd_buf->tail[0].iov_len) |
929 | iov = snd_buf->tail; | 929 | iov = snd_buf->tail; |
930 | else | 930 | else |
931 | iov = snd_buf->head; | 931 | iov = snd_buf->head; |
@@ -1030,7 +1030,7 @@ gss_wrap_req_priv(struct rpc_cred *cred, struct gss_cl_ctx *ctx, | |||
1030 | maj_stat = gss_wrap(ctx->gc_gss_ctx, offset, snd_buf, inpages); | 1030 | maj_stat = gss_wrap(ctx->gc_gss_ctx, offset, snd_buf, inpages); |
1031 | /* RPC_SLACK_SPACE should prevent this ever happening: */ | 1031 | /* RPC_SLACK_SPACE should prevent this ever happening: */ |
1032 | BUG_ON(snd_buf->len > snd_buf->buflen); | 1032 | BUG_ON(snd_buf->len > snd_buf->buflen); |
1033 | status = -EIO; | 1033 | status = -EIO; |
1034 | /* We're assuming that when GSS_S_CONTEXT_EXPIRED, the encryption was | 1034 | /* We're assuming that when GSS_S_CONTEXT_EXPIRED, the encryption was |
1035 | * done anyway, so it's safe to put the request on the wire: */ | 1035 | * done anyway, so it's safe to put the request on the wire: */ |
1036 | if (maj_stat == GSS_S_CONTEXT_EXPIRED) | 1036 | if (maj_stat == GSS_S_CONTEXT_EXPIRED) |
@@ -1079,7 +1079,7 @@ gss_wrap_req(struct rpc_task *task, | |||
1079 | status = gss_wrap_req_integ(cred, ctx, encode, | 1079 | status = gss_wrap_req_integ(cred, ctx, encode, |
1080 | rqstp, p, obj); | 1080 | rqstp, p, obj); |
1081 | break; | 1081 | break; |
1082 | case RPC_GSS_SVC_PRIVACY: | 1082 | case RPC_GSS_SVC_PRIVACY: |
1083 | status = gss_wrap_req_priv(cred, ctx, encode, | 1083 | status = gss_wrap_req_priv(cred, ctx, encode, |
1084 | rqstp, p, obj); | 1084 | rqstp, p, obj); |
1085 | break; | 1085 | break; |
@@ -1179,7 +1179,7 @@ gss_unwrap_resp(struct rpc_task *task, | |||
1179 | if (status) | 1179 | if (status) |
1180 | goto out; | 1180 | goto out; |
1181 | break; | 1181 | break; |
1182 | case RPC_GSS_SVC_PRIVACY: | 1182 | case RPC_GSS_SVC_PRIVACY: |
1183 | status = gss_unwrap_resp_priv(cred, ctx, rqstp, &p); | 1183 | status = gss_unwrap_resp_priv(cred, ctx, rqstp, &p); |
1184 | if (status) | 1184 | if (status) |
1185 | goto out; | 1185 | goto out; |
@@ -1196,7 +1196,7 @@ out: | |||
1196 | status); | 1196 | status); |
1197 | return status; | 1197 | return status; |
1198 | } | 1198 | } |
1199 | 1199 | ||
1200 | static struct rpc_authops authgss_ops = { | 1200 | static struct rpc_authops authgss_ops = { |
1201 | .owner = THIS_MODULE, | 1201 | .owner = THIS_MODULE, |
1202 | .au_flavor = RPC_AUTH_GSS, | 1202 | .au_flavor = RPC_AUTH_GSS, |
diff --git a/net/sunrpc/auth_gss/gss_generic_token.c b/net/sunrpc/auth_gss/gss_generic_token.c index 826df44e7fca..ea8c92ecdae5 100644 --- a/net/sunrpc/auth_gss/gss_generic_token.c +++ b/net/sunrpc/auth_gss/gss_generic_token.c | |||
@@ -11,7 +11,7 @@ | |||
11 | 11 | ||
12 | /* | 12 | /* |
13 | * Copyright 1993 by OpenVision Technologies, Inc. | 13 | * Copyright 1993 by OpenVision Technologies, Inc. |
14 | * | 14 | * |
15 | * Permission to use, copy, modify, distribute, and sell this software | 15 | * Permission to use, copy, modify, distribute, and sell this software |
16 | * and its documentation for any purpose is hereby granted without fee, | 16 | * and its documentation for any purpose is hereby granted without fee, |
17 | * provided that the above copyright notice appears in all copies and | 17 | * provided that the above copyright notice appears in all copies and |
@@ -21,7 +21,7 @@ | |||
21 | * without specific, written prior permission. OpenVision makes no | 21 | * without specific, written prior permission. OpenVision makes no |
22 | * representations about the suitability of this software for any | 22 | * representations about the suitability of this software for any |
23 | * purpose. It is provided "as is" without express or implied warranty. | 23 | * purpose. It is provided "as is" without express or implied warranty. |
24 | * | 24 | * |
25 | * OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, | 25 | * OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, |
26 | * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO | 26 | * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO |
27 | * EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR | 27 | * EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR |
@@ -201,7 +201,7 @@ g_verify_token_header(struct xdr_netobj *mech, int *body_size, | |||
201 | return(G_BAD_TOK_HEADER); | 201 | return(G_BAD_TOK_HEADER); |
202 | if (*buf++ != 0x06) | 202 | if (*buf++ != 0x06) |
203 | return(G_BAD_TOK_HEADER); | 203 | return(G_BAD_TOK_HEADER); |
204 | 204 | ||
205 | if ((toksize-=1) < 0) | 205 | if ((toksize-=1) < 0) |
206 | return(G_BAD_TOK_HEADER); | 206 | return(G_BAD_TOK_HEADER); |
207 | toid.len = *buf++; | 207 | toid.len = *buf++; |
@@ -211,9 +211,9 @@ g_verify_token_header(struct xdr_netobj *mech, int *body_size, | |||
211 | toid.data = buf; | 211 | toid.data = buf; |
212 | buf+=toid.len; | 212 | buf+=toid.len; |
213 | 213 | ||
214 | if (! g_OID_equal(&toid, mech)) | 214 | if (! g_OID_equal(&toid, mech)) |
215 | ret = G_WRONG_MECH; | 215 | ret = G_WRONG_MECH; |
216 | 216 | ||
217 | /* G_WRONG_MECH is not returned immediately because it's more important | 217 | /* G_WRONG_MECH is not returned immediately because it's more important |
218 | to return G_BAD_TOK_HEADER if the token header is in fact bad */ | 218 | to return G_BAD_TOK_HEADER if the token header is in fact bad */ |
219 | 219 | ||
diff --git a/net/sunrpc/auth_gss/gss_krb5_crypto.c b/net/sunrpc/auth_gss/gss_krb5_crypto.c index d926cda88623..0a9948de0992 100644 --- a/net/sunrpc/auth_gss/gss_krb5_crypto.c +++ b/net/sunrpc/auth_gss/gss_krb5_crypto.c | |||
@@ -58,7 +58,7 @@ krb5_encrypt( | |||
58 | int length) | 58 | int length) |
59 | { | 59 | { |
60 | u32 ret = -EINVAL; | 60 | u32 ret = -EINVAL; |
61 | struct scatterlist sg[1]; | 61 | struct scatterlist sg[1]; |
62 | u8 local_iv[16] = {0}; | 62 | u8 local_iv[16] = {0}; |
63 | struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv }; | 63 | struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv }; |
64 | 64 | ||
@@ -67,7 +67,7 @@ krb5_encrypt( | |||
67 | 67 | ||
68 | if (crypto_blkcipher_ivsize(tfm) > 16) { | 68 | if (crypto_blkcipher_ivsize(tfm) > 16) { |
69 | dprintk("RPC: gss_k5encrypt: tfm iv size to large %d\n", | 69 | dprintk("RPC: gss_k5encrypt: tfm iv size to large %d\n", |
70 | crypto_blkcipher_ivsize(tfm)); | 70 | crypto_blkcipher_ivsize(tfm)); |
71 | goto out; | 71 | goto out; |
72 | } | 72 | } |
73 | 73 | ||
diff --git a/net/sunrpc/auth_gss/gss_krb5_seqnum.c b/net/sunrpc/auth_gss/gss_krb5_seqnum.c index c604baf3a5f6..3e315a68efaa 100644 --- a/net/sunrpc/auth_gss/gss_krb5_seqnum.c +++ b/net/sunrpc/auth_gss/gss_krb5_seqnum.c | |||
@@ -11,7 +11,7 @@ | |||
11 | 11 | ||
12 | /* | 12 | /* |
13 | * Copyright 1993 by OpenVision Technologies, Inc. | 13 | * Copyright 1993 by OpenVision Technologies, Inc. |
14 | * | 14 | * |
15 | * Permission to use, copy, modify, distribute, and sell this software | 15 | * Permission to use, copy, modify, distribute, and sell this software |
16 | * and its documentation for any purpose is hereby granted without fee, | 16 | * and its documentation for any purpose is hereby granted without fee, |
17 | * provided that the above copyright notice appears in all copies and | 17 | * provided that the above copyright notice appears in all copies and |
@@ -21,7 +21,7 @@ | |||
21 | * without specific, written prior permission. OpenVision makes no | 21 | * without specific, written prior permission. OpenVision makes no |
22 | * representations about the suitability of this software for any | 22 | * representations about the suitability of this software for any |
23 | * purpose. It is provided "as is" without express or implied warranty. | 23 | * purpose. It is provided "as is" without express or implied warranty. |
24 | * | 24 | * |
25 | * OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, | 25 | * OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, |
26 | * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO | 26 | * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO |
27 | * EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR | 27 | * EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR |
diff --git a/net/sunrpc/auth_gss/gss_mech_switch.c b/net/sunrpc/auth_gss/gss_mech_switch.c index 3db745379d06..3423890e4a30 100644 --- a/net/sunrpc/auth_gss/gss_mech_switch.c +++ b/net/sunrpc/auth_gss/gss_mech_switch.c | |||
@@ -6,14 +6,14 @@ | |||
6 | * | 6 | * |
7 | * J. Bruce Fields <bfields@umich.edu> | 7 | * J. Bruce Fields <bfields@umich.edu> |
8 | * | 8 | * |
9 | * Redistribution and use in source and binary forms, with or without | 9 | * Redistribution and use in source and binary forms, with or without |
10 | * modification, are permitted provided that the following conditions | 10 | * modification, are permitted provided that the following conditions |
11 | * are met: | 11 | * are met: |
12 | * | 12 | * |
13 | * 1. Redistributions of source code must retain the above copyright | 13 | * 1. Redistributions of source code must retain the above copyright |
14 | * notice, this list of conditions and the following disclaimer. | 14 | * notice, this list of conditions and the following disclaimer. |
15 | * 2. Redistributions in binary form must reproduce the above copyright | 15 | * 2. Redistributions in binary form must reproduce the above copyright |
16 | * notice, this list of conditions and the following disclaimer in the | 16 | * notice, this list of conditions and the following disclaimer in the |
17 | * documentation and/or other materials provided with the distribution. | 17 | * documentation and/or other materials provided with the distribution. |
18 | * 3. Neither the name of the University nor the names of its | 18 | * 3. Neither the name of the University nor the names of its |
19 | * contributors may be used to endorse or promote products derived | 19 | * contributors may be used to endorse or promote products derived |
diff --git a/net/sunrpc/auth_gss/gss_spkm3_token.c b/net/sunrpc/auth_gss/gss_spkm3_token.c index 35188b6ea8f7..8400b621971e 100644 --- a/net/sunrpc/auth_gss/gss_spkm3_token.c +++ b/net/sunrpc/auth_gss/gss_spkm3_token.c | |||
@@ -59,7 +59,7 @@ asn1_bitstring_len(struct xdr_netobj *in, int *enclen, int *zerobits) | |||
59 | 59 | ||
60 | /* count trailing 0's */ | 60 | /* count trailing 0's */ |
61 | for(i = in->len; i > 0; i--) { | 61 | for(i = in->len; i > 0; i--) { |
62 | if (*ptr == 0) { | 62 | if (*ptr == 0) { |
63 | ptr--; | 63 | ptr--; |
64 | elen--; | 64 | elen--; |
65 | } else | 65 | } else |
@@ -82,7 +82,7 @@ asn1_bitstring_len(struct xdr_netobj *in, int *enclen, int *zerobits) | |||
82 | 82 | ||
83 | /* | 83 | /* |
84 | * decode_asn1_bitstring() | 84 | * decode_asn1_bitstring() |
85 | * | 85 | * |
86 | * decode a bitstring into a buffer of the expected length. | 86 | * decode a bitstring into a buffer of the expected length. |
87 | * enclen = bit string length | 87 | * enclen = bit string length |
88 | * explen = expected length (define in rfc) | 88 | * explen = expected length (define in rfc) |
@@ -97,9 +97,9 @@ decode_asn1_bitstring(struct xdr_netobj *out, char *in, int enclen, int explen) | |||
97 | return 1; | 97 | return 1; |
98 | } | 98 | } |
99 | 99 | ||
100 | /* | 100 | /* |
101 | * SPKMInnerContextToken choice SPKM_MIC asn1 token layout | 101 | * SPKMInnerContextToken choice SPKM_MIC asn1 token layout |
102 | * | 102 | * |
103 | * contextid is always 16 bytes plain data. max asn1 bitstring len = 17. | 103 | * contextid is always 16 bytes plain data. max asn1 bitstring len = 17. |
104 | * | 104 | * |
105 | * tokenlen = pos[0] to end of token (max pos[45] with MD5 cksum) | 105 | * tokenlen = pos[0] to end of token (max pos[45] with MD5 cksum) |
@@ -107,21 +107,21 @@ decode_asn1_bitstring(struct xdr_netobj *out, char *in, int enclen, int explen) | |||
107 | * pos value | 107 | * pos value |
108 | * ---------- | 108 | * ---------- |
109 | * [0] a4 SPKM-MIC tag | 109 | * [0] a4 SPKM-MIC tag |
110 | * [1] ?? innertoken length (max 44) | 110 | * [1] ?? innertoken length (max 44) |
111 | * | 111 | * |
112 | * | 112 | * |
113 | * tok_hdr piece of checksum data starts here | 113 | * tok_hdr piece of checksum data starts here |
114 | * | 114 | * |
115 | * the maximum mic-header len = 9 + 17 = 26 | 115 | * the maximum mic-header len = 9 + 17 = 26 |
116 | * mic-header | 116 | * mic-header |
117 | * ---------- | 117 | * ---------- |
118 | * [2] 30 SEQUENCE tag | 118 | * [2] 30 SEQUENCE tag |
119 | * [3] ?? mic-header length: (max 23) = TokenID + ContextID | 119 | * [3] ?? mic-header length: (max 23) = TokenID + ContextID |
120 | * | 120 | * |
121 | * TokenID - all fields constant and can be hardcoded | 121 | * TokenID - all fields constant and can be hardcoded |
122 | * ------- | 122 | * ------- |
123 | * [4] 02 Type 2 | 123 | * [4] 02 Type 2 |
124 | * [5] 02 Length 2 | 124 | * [5] 02 Length 2 |
125 | * [6][7] 01 01 TokenID (SPKM_MIC_TOK) | 125 | * [6][7] 01 01 TokenID (SPKM_MIC_TOK) |
126 | * | 126 | * |
127 | * ContextID - encoded length not constant, calculated | 127 | * ContextID - encoded length not constant, calculated |
@@ -131,17 +131,17 @@ decode_asn1_bitstring(struct xdr_netobj *out, char *in, int enclen, int explen) | |||
131 | * [10] ?? ctxzbit | 131 | * [10] ?? ctxzbit |
132 | * [11] contextid | 132 | * [11] contextid |
133 | * | 133 | * |
134 | * mic_header piece of checksum data ends here. | 134 | * mic_header piece of checksum data ends here. |
135 | * | 135 | * |
136 | * int-cksum - encoded length not constant, calculated | 136 | * int-cksum - encoded length not constant, calculated |
137 | * --------- | 137 | * --------- |
138 | * [??] 03 Type 3 | 138 | * [??] 03 Type 3 |
139 | * [??] ?? encoded length | 139 | * [??] ?? encoded length |
140 | * [??] ?? md5zbit | 140 | * [??] ?? md5zbit |
141 | * [??] int-cksum (NID_md5 = 16) | 141 | * [??] int-cksum (NID_md5 = 16) |
142 | * | 142 | * |
143 | * maximum SPKM-MIC innercontext token length = | 143 | * maximum SPKM-MIC innercontext token length = |
144 | * 10 + encoded contextid_size(17 max) + 2 + encoded | 144 | * 10 + encoded contextid_size(17 max) + 2 + encoded |
145 | * cksum_size (17 maxfor NID_md5) = 46 | 145 | * cksum_size (17 maxfor NID_md5) = 46 |
146 | */ | 146 | */ |
147 | 147 | ||
@@ -178,8 +178,8 @@ spkm3_mic_header(unsigned char **hdrbuf, unsigned int *hdrlen, unsigned char *ct | |||
178 | /* | 178 | /* |
179 | * spkm3_mic_innercontext_token() | 179 | * spkm3_mic_innercontext_token() |
180 | * | 180 | * |
181 | * *tokp points to the beginning of the SPKM_MIC token described | 181 | * *tokp points to the beginning of the SPKM_MIC token described |
182 | * in rfc 2025, section 3.2.1: | 182 | * in rfc 2025, section 3.2.1: |
183 | * | 183 | * |
184 | * toklen is the inner token length | 184 | * toklen is the inner token length |
185 | */ | 185 | */ |
@@ -209,7 +209,7 @@ spkm3_verify_mic_token(unsigned char **tokp, int *mic_hdrlen, unsigned char **ck | |||
209 | 209 | ||
210 | /* spkm3 innercontext token preamble */ | 210 | /* spkm3 innercontext token preamble */ |
211 | if ((ptr[0] != 0xa4) || (ptr[2] != 0x30)) { | 211 | if ((ptr[0] != 0xa4) || (ptr[2] != 0x30)) { |
212 | dprintk("RPC: BAD SPKM ictoken preamble\n"); | 212 | dprintk("RPC: BAD SPKM ictoken preamble\n"); |
213 | goto out; | 213 | goto out; |
214 | } | 214 | } |
215 | 215 | ||
@@ -245,9 +245,9 @@ spkm3_verify_mic_token(unsigned char **tokp, int *mic_hdrlen, unsigned char **ck | |||
245 | goto out; | 245 | goto out; |
246 | 246 | ||
247 | /* | 247 | /* |
248 | * in the current implementation: the optional int-alg is not present | 248 | * in the current implementation: the optional int-alg is not present |
249 | * so the default int-alg (md5) is used the optional snd-seq field is | 249 | * so the default int-alg (md5) is used the optional snd-seq field is |
250 | * also not present | 250 | * also not present |
251 | */ | 251 | */ |
252 | 252 | ||
253 | if (*mic_hdrlen != 6 + ctxelen) { | 253 | if (*mic_hdrlen != 6 + ctxelen) { |
@@ -255,7 +255,7 @@ spkm3_verify_mic_token(unsigned char **tokp, int *mic_hdrlen, unsigned char **ck | |||
255 | goto out; | 255 | goto out; |
256 | } | 256 | } |
257 | /* checksum */ | 257 | /* checksum */ |
258 | *cksum = (&ptr[10] + ctxelen); /* ctxelen includes ptr[10] */ | 258 | *cksum = (&ptr[10] + ctxelen); /* ctxelen includes ptr[10] */ |
259 | 259 | ||
260 | ret = GSS_S_COMPLETE; | 260 | ret = GSS_S_COMPLETE; |
261 | out: | 261 | out: |
diff --git a/net/sunrpc/auth_gss/gss_spkm3_unseal.c b/net/sunrpc/auth_gss/gss_spkm3_unseal.c index e54581ca7570..35a1b34c4a1d 100644 --- a/net/sunrpc/auth_gss/gss_spkm3_unseal.c +++ b/net/sunrpc/auth_gss/gss_spkm3_unseal.c | |||
@@ -45,7 +45,7 @@ | |||
45 | 45 | ||
46 | /* | 46 | /* |
47 | * spkm3_read_token() | 47 | * spkm3_read_token() |
48 | * | 48 | * |
49 | * only SPKM_MIC_TOK with md5 intg-alg is supported | 49 | * only SPKM_MIC_TOK with md5 intg-alg is supported |
50 | */ | 50 | */ |
51 | u32 | 51 | u32 |
diff --git a/net/sunrpc/auth_gss/svcauth_gss.c b/net/sunrpc/auth_gss/svcauth_gss.c index 066c64a97fd8..8fde38ecaf21 100644 --- a/net/sunrpc/auth_gss/svcauth_gss.c +++ b/net/sunrpc/auth_gss/svcauth_gss.c | |||
@@ -172,8 +172,8 @@ static struct cache_head *rsi_alloc(void) | |||
172 | } | 172 | } |
173 | 173 | ||
174 | static void rsi_request(struct cache_detail *cd, | 174 | static void rsi_request(struct cache_detail *cd, |
175 | struct cache_head *h, | 175 | struct cache_head *h, |
176 | char **bpp, int *blen) | 176 | char **bpp, int *blen) |
177 | { | 177 | { |
178 | struct rsi *rsii = container_of(h, struct rsi, h); | 178 | struct rsi *rsii = container_of(h, struct rsi, h); |
179 | 179 | ||
@@ -184,7 +184,7 @@ static void rsi_request(struct cache_detail *cd, | |||
184 | 184 | ||
185 | 185 | ||
186 | static int rsi_parse(struct cache_detail *cd, | 186 | static int rsi_parse(struct cache_detail *cd, |
187 | char *mesg, int mlen) | 187 | char *mesg, int mlen) |
188 | { | 188 | { |
189 | /* context token expiry major minor context token */ | 189 | /* context token expiry major minor context token */ |
190 | char *buf = mesg; | 190 | char *buf = mesg; |