In gss_verify_mic and gss_unwrap, initialize the qop_state parameter
if non-NULL. We do this prior to calling the encryption-system specific functions in case some day they set qop_state. Doug Rabson <dfr@nlsystems.com> encountered this bug while working on RPCSEC_GSS code from UMich's NFSv4 project. git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@11015 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -388,6 +388,8 @@ OM_uint32 gss_unwrap
|
||||
OM_uint32 ret;
|
||||
krb5_keytype keytype;
|
||||
|
||||
if (qop_state != NULL)
|
||||
*qop_state = GSS_C_QOP_DEFAULT;
|
||||
ret = gss_krb5_get_remotekey(context_handle, &key);
|
||||
if (ret) {
|
||||
gssapi_krb5_set_error_string ();
|
||||
|
@@ -251,6 +251,8 @@ gss_verify_mic
|
||||
OM_uint32 ret;
|
||||
krb5_keytype keytype;
|
||||
|
||||
if (qop_state != NULL)
|
||||
*qop_state = GSS_C_QOP_DEFAULT;
|
||||
ret = gss_krb5_get_remotekey(context_handle, &key);
|
||||
if (ret) {
|
||||
gssapi_krb5_set_error_string ();
|
||||
|
@@ -388,6 +388,8 @@ OM_uint32 gss_unwrap
|
||||
OM_uint32 ret;
|
||||
krb5_keytype keytype;
|
||||
|
||||
if (qop_state != NULL)
|
||||
*qop_state = GSS_C_QOP_DEFAULT;
|
||||
ret = gss_krb5_get_remotekey(context_handle, &key);
|
||||
if (ret) {
|
||||
gssapi_krb5_set_error_string ();
|
||||
|
@@ -251,6 +251,8 @@ gss_verify_mic
|
||||
OM_uint32 ret;
|
||||
krb5_keytype keytype;
|
||||
|
||||
if (qop_state != NULL)
|
||||
*qop_state = GSS_C_QOP_DEFAULT;
|
||||
ret = gss_krb5_get_remotekey(context_handle, &key);
|
||||
if (ret) {
|
||||
gssapi_krb5_set_error_string ();
|
||||
|
Reference in New Issue
Block a user