diff options
author | J. Bruce Fields <bfields@citi.umich.edu> | 2007-07-17 07:04:51 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@woody.linux-foundation.org> | 2007-07-17 13:23:08 -0400 |
commit | 4796f45740bc6f2e3e6cc14e7ed481b38bd0bd39 (patch) | |
tree | 1f24645e86f87511350e149525245f2b215ba55a /net | |
parent | dcb488a3b7ac3987e21148f44f641c9b2e734232 (diff) |
knfsd: nfsd4: secinfo handling without secinfo= option
We could return some sort of error in the case where someone asks for secinfo
on an export without the secinfo= option set--that'd be no worse than what
we've been doing. But it's not really correct. So, hack up an approximate
secinfo response in that case--it may not be complete, but it'll tell the
client at least one acceptable security flavor.
Signed-off-by: "J. Bruce Fields" <bfields@citi.umich.edu>
Signed-off-by: Neil Brown <neilb@suse.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'net')
-rw-r--r-- | net/sunrpc/auth_gss/svcauth_gss.c | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/net/sunrpc/auth_gss/svcauth_gss.c b/net/sunrpc/auth_gss/svcauth_gss.c index e4b3de08b040..490697542fc2 100644 --- a/net/sunrpc/auth_gss/svcauth_gss.c +++ b/net/sunrpc/auth_gss/svcauth_gss.c | |||
@@ -743,6 +743,15 @@ find_gss_auth_domain(struct gss_ctx *ctx, u32 svc) | |||
743 | 743 | ||
744 | static struct auth_ops svcauthops_gss; | 744 | static struct auth_ops svcauthops_gss; |
745 | 745 | ||
746 | u32 svcauth_gss_flavor(struct auth_domain *dom) | ||
747 | { | ||
748 | struct gss_domain *gd = container_of(dom, struct gss_domain, h); | ||
749 | |||
750 | return gd->pseudoflavor; | ||
751 | } | ||
752 | |||
753 | EXPORT_SYMBOL(svcauth_gss_flavor); | ||
754 | |||
746 | int | 755 | int |
747 | svcauth_gss_register_pseudoflavor(u32 pseudoflavor, char * name) | 756 | svcauth_gss_register_pseudoflavor(u32 pseudoflavor, char * name) |
748 | { | 757 | { |