summaryrefslogtreecommitdiffstats
path: root/utils/gssd/gssd_proc.c
Commit message (Collapse)AuthorAgeFilesLines
* 2006-04-10 NeilBrown <neilb@suse.de>neilbrown2006-04-101-4/+4
| | | | | | | | | | | | | Various paranoia checks: gssd_proc.c: pass max_field sizes to sscanf to avoid buffer overflow svcgssd_proc.c: range_check name.length, to ensure name.length+1 doesn't wrap idmapd.c(nfsdcb): make sure at least one byte is read before zeroing the last byte that was read, otherwise memory corruption is possible. Found by SuSE security audit.
* 2006-04-10 kwc@citi.umich.eduneilbrown2006-04-091-33/+47
| | | | | | | Fix memory leak of the AUTH structure on context negotiations Free AUTH structure after completing context negotiation and sending context information to the kernel.
* Don't close and reopen all pipes on every DNOTIFY signal.neilbrown2006-03-281-36/+87
| | | | | | | | | | From: Vince Busam <vbusam@google.com> Signed-off-by: Kevin Coffman <kwc@citi.umich.edu> Don't unnecessarily close and re-open all pipes after every DNOTIFY signal. These unnecessary closes were triggering a kernel Oops. Original patch modified to correct segfault when unmounting last NFSv4 mount.
* Update krb5 code to use glue routine lucid context functionsneilbrown2006-03-281-2/+2
| | | | | | | | | | | The gssd code should not know about the glue layer's context structure. A previous patch added gss_export_lucid_sec_context() and gss_free_lucid_sec_context() functions to the gssapi glue layer. Use these functions rather than calling directly to the Kerberos gssapi code (which requires the Kerberos context handle rather than the glue's context handle). (really this time)
* utils/gssd/gssd_proc.c(create_auth_rpc_client): Use serviceneilbrown2005-12-191-2/+17
| | | | portion of clp->servicename rather than hard-coding "nfs".
* Updates from Kevin Coffman at UMichneilbrown2005-12-161-9/+87
|
* *** empty log message ***neilbrown2004-11-221-0/+4
|
* *** empty log message ***neilbrown2004-11-221-12/+17
|
* Add gss support from citi @ umichneilbrown2004-10-191-0/+661