summaryrefslogtreecommitdiffstats
path: root/utils
diff options
context:
space:
mode:
authorneilbrown <neilbrown>2006-03-28 00:51:14 +0000
committerneilbrown <neilbrown>2006-03-28 00:51:14 +0000
commit7c0658702830ca9f4d019bbdca0d94fa657a0f17 (patch)
tree68cfd34a04d02096f9eb95b681c8faa1f4581dad /utils
parent05424b57b5ccfefcfee415f97d5c4063d2ab314e (diff)
downloadnfs-utils-7c0658702830ca9f4d019bbdca0d94fa657a0f17.tar.gz
nfs-utils-7c0658702830ca9f4d019bbdca0d94fa657a0f17.tar.xz
nfs-utils-7c0658702830ca9f4d019bbdca0d94fa657a0f17.zip
Add debugging to better detect negotiation of enctype not supported by kernel
Print debugging message indicating the type of encryption keys being sent down to the kernel. This should make it easier to detect cases where unsupported encryption types are being negotiated. (really this time)
Diffstat (limited to 'utils')
-rw-r--r--utils/gssd/context_mit.c10
1 files changed, 10 insertions, 0 deletions
diff --git a/utils/gssd/context_mit.c b/utils/gssd/context_mit.c
index c804f3a..868eaa9 100644
--- a/utils/gssd/context_mit.c
+++ b/utils/gssd/context_mit.c
@@ -185,6 +185,11 @@ prepare_krb5_rfc1964_buffer(gss_krb5_lucid_context_v1_t *lctx,
if (WRITE_BYTES(&p, end, word_send_seq)) goto out_err;
if (write_buffer(&p, end, (gss_buffer_desc*)&krb5oid)) goto out_err;
+ printerr(2, "prepare_krb5_rfc1964_buffer: serializing keys with "
+ "enctype %d and length %d\n",
+ lctx->rfc1964_kd.ctx_key.type,
+ lctx->rfc1964_kd.ctx_key.length);
+
/* derive the encryption key and copy it into buffer */
enc_key.type = lctx->rfc1964_kd.ctx_key.type;
enc_key.length = lctx->rfc1964_kd.ctx_key.length;
@@ -339,6 +344,11 @@ serialize_krb5_ctx(gss_ctx_id_t ctx, gss_buffer_desc *buf)
word_seq_send = kctx->seq_send;
if (WRITE_BYTES(&p, end, word_seq_send)) goto out_err;
if (write_buffer(&p, end, kctx->mech_used)) goto out_err;
+
+ printerr(2, "serialize_krb5_ctx: serializing keys with "
+ "enctype %d and length %d\n",
+ kctx->enc->enctype, kctx->enc->length);
+
if (write_keyblock(&p, end, kctx->enc)) goto out_err;
if (write_keyblock(&p, end, kctx->seq)) goto out_err;