In gss_verify_mic and gss_unwrap, initialize the qop_state parameter

if non-NULL.  We do this prior to calling the encryption-system specific
functions in case some day they set qop_state.

Doug Rabson <dfr@nlsystems.com> encountered this bug while working on
RPCSEC_GSS code from UMich's NFSv4 project.


git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@11015 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Jacques A. Vidrine
2002-05-20 15:14:00 +00:00
parent 1ef6cee723
commit 5d8e2e5a3c
4 changed files with 8 additions and 0 deletions

View File

@@ -388,6 +388,8 @@ OM_uint32 gss_unwrap
OM_uint32 ret;
krb5_keytype keytype;
if (qop_state != NULL)
*qop_state = GSS_C_QOP_DEFAULT;
ret = gss_krb5_get_remotekey(context_handle, &key);
if (ret) {
gssapi_krb5_set_error_string ();

View File

@@ -251,6 +251,8 @@ gss_verify_mic
OM_uint32 ret;
krb5_keytype keytype;
if (qop_state != NULL)
*qop_state = GSS_C_QOP_DEFAULT;
ret = gss_krb5_get_remotekey(context_handle, &key);
if (ret) {
gssapi_krb5_set_error_string ();

View File

@@ -388,6 +388,8 @@ OM_uint32 gss_unwrap
OM_uint32 ret;
krb5_keytype keytype;
if (qop_state != NULL)
*qop_state = GSS_C_QOP_DEFAULT;
ret = gss_krb5_get_remotekey(context_handle, &key);
if (ret) {
gssapi_krb5_set_error_string ();

View File

@@ -251,6 +251,8 @@ gss_verify_mic
OM_uint32 ret;
krb5_keytype keytype;
if (qop_state != NULL)
*qop_state = GSS_C_QOP_DEFAULT;
ret = gss_krb5_get_remotekey(context_handle, &key);
if (ret) {
gssapi_krb5_set_error_string ();