PRINTF(("gssapi_marshall: sending seq_num %d\n", seq_num));
- _log("%s:%d: in %s\n", SFILE, __LINE__, __func__);
if (auth_gssapi_seal_seq(AUTH_PRIVATE(auth)->context, seq_num,
&out_buf) == FALSE) {
PRINTF(("gssapi_marhshall: seal failed\n"));
}
- _log("%s:%d: in %s\n", SFILE, __LINE__, __func__);
-
+
auth->ah_verf.oa_base = out_buf.value;
auth->ah_verf.oa_length = out_buf.length;
in_buf.length = sizeof(rpc_u_int32);
in_buf.value = (char *) &nl_seq_num;
- _log("%s:%d: %s about to call gss_seal\n", SFILE, __LINE__,
- __func__);
gssstat = gss_seal(&minor_stat, context, 0, GSS_C_QOP_DEFAULT,
&in_buf, NULL, out_buf);
- _log("%s:%d: %s result %d/%d in_buf %d out_buf %d\n", __FILE__, __LINE__,
- __func__, gssstat, minor_stat, in_buf.length, out_buf->length);
if (gssstat != GSS_S_COMPLETE) {
PRINTF(("gssapi_seal_seq: failed\n"));
AUTH_GSSAPI_DISPLAY_STATUS(("sealing sequence number",
gssstat = gss_unseal(&minor_stat, context, in_buf, &out_buf,
NULL, NULL);
- _log("%s:%d: %s input len %d result %d/%d len %d\n",
- __FILE__, __LINE__, __func__, in_buf->length,
- gssstat, minor_stat, out_buf.length);
if (gssstat != GSS_S_COMPLETE) {
PRINTF(("gssapi_unseal_seq: failed\n"));
AUTH_GSSAPI_DISPLAY_STATUS(("unsealing sequence number",
return (0);
#endif /* def FD_SETSIZE */
-#define SFILE (strrchr(__FILE__,'/') ? 1+strrchr(__FILE__,'/') : __FILE__)
while (TRUE) {
readfds = mask;
tout = ct->ct_wait;
&tout)) {
case 0:
ct->ct_error.re_status = RPC_TIMEDOUT;
- _log("%s:%d: %s select says 0\n", SFILE, __LINE__, __func__);
- if (fork() == 0) abort();
return (-1);
case -1:
continue;
ct->ct_error.re_status = RPC_CANTRECV;
ct->ct_error.re_errno = errno;
- _log("%s:%d: %s select says error %d/%s\n", SFILE, __LINE__, __func__,
- errno, error_message(errno));
return (-1);
}
break;
switch (len = read(ct->ct_sock, buf, (size_t) len)) {
case 0:
- _log("%s:%d: %s %d bytes\n", SFILE, __LINE__, __func__, len);
/* premature eof */
ct->ct_error.re_errno = ECONNRESET;
ct->ct_error.re_status = RPC_CANTRECV;
break;
case -1:
- _log("%s:%d: %s %d bytes\n", SFILE, __LINE__, __func__, len);
ct->ct_error.re_errno = errno;
ct->ct_error.re_status = RPC_CANTRECV;
break;
- default:
- _log("%s:%d: %s %d bytes\n", SFILE, __LINE__, __func__, len);
}
return (len);
}
for (cnt = len; cnt > 0; cnt -= i, buf += i) {
if ((i = write(ct->ct_sock, buf, (size_t) cnt)) == -1) {
- _log("%s:%d: %s %d bytes\n", SFILE, __LINE__, __func__, len);
ct->ct_error.re_errno = errno;
ct->ct_error.re_status = RPC_CANTSEND;
return (-1);
}
- _log("%s:%d: %s %d bytes\n", SFILE, __LINE__, __func__, len);
}
return (len);
}
buf += RNDUP(oa->oa_length) / sizeof (rpc_int32);
}
oa = &cmsg->rm_call.cb_verf;
- _log("%s:%d: packing: oa->oa_flavor=%d oa_length=%d\n",
- __FILE__, __LINE__, oa->oa_flavor, oa->oa_length);
IXDR_PUT_ENUM(buf, oa->oa_flavor);
IXDR_PUT_LONG(buf, oa->oa_length);
if (oa->oa_length) {
oa->oa_flavor = IXDR_GET_ENUM(buf, enum_t);
oa->oa_length = IXDR_GET_LONG(buf);
}
- _log("%s:%d: unpacked: oa->oa_flavor=%d oa_length=%d\n",
- __FILE__, __LINE__, oa->oa_flavor, oa->oa_length);
if (oa->oa_length) {
if (oa->oa_length > MAX_AUTH_BYTES) {
return (FALSE);
no_dispatch = FALSE;
/* first authenticate the message */
- _log("%s:%d: msg.cb_verf.oa_length=%d, oa_flavor=%d\n",
- __FILE__, __LINE__, msg.rm_call.cb_verf.oa_length,
- msg.rm_call.cb_verf.oa_flavor);
why=_authenticate(&r, &msg, &no_dispatch);
if (why != AUTH_OK) {
svcerr_auth(xprt, why);
rqst->rq_xprt->xp_verf.oa_length = 0;
cred_flavor = rqst->rq_cred.oa_flavor;
*no_dispatch = FALSE;
- _log("%s:%d: dispatching authentication flavor %d\n",
- __FILE__, __LINE__, cred_flavor);
for (i = 0; i < svcauthnum; i++) {
if (cred_flavor == svcauthsw[i].flavor &&
svcauthsw[i].authenticator != NULL) {
rpc_u_int32 seq_num;
PRINTF(("svcauth_gssapi: starting\n"));
- _log("%s:%d: svcauth_gssapi starting\n", __FILE__, __LINE__);
/* clean up expired entries */
clean_client();
#ifdef DEBUG_GSSAPI
if (svc_debug_gssapi) {
if (creds.auth_msg && rqst->rq_proc == AUTH_GSSAPI_EXIT) {
- _log("%s:%d: %s AUTH_GSSAPI_EXIT\n", SFILE, __LINE__, __func__);
PRINTF(("svcauth_gssapi: GSSAPI_EXIT, cleaning up\n"));
svc_sendreply(rqst->rq_xprt, xdr_void, NULL);
gssrpc_xdr_free(xdr_authgssapi_creds, &creds);
PRINTF(("svcauth_gssapi: context established, isn %d\n",
client_data->seq_num));
- _log("%s:%d: in %s\n", SFILE, __LINE__, __func__);
if (auth_gssapi_seal_seq(client_data->context,
client_data->seq_num,
&call_res.signed_isn) ==
gss_release_buffer(&minor_stat, &output_token);
goto error;
}
- _log("%s:%d: in %s\n", SFILE, __LINE__, __func__);
}
PRINTF(("svcauth_gssapi: sending reply\n"));
/* prepare response verifier */
seq_num = client_data->seq_num + 1;
- _log("%s:%d: in %s\n", SFILE, __LINE__, __func__);
if (auth_gssapi_seal_seq(client_data->context, seq_num,
&out_buf) == FALSE) {
ret = AUTH_FAILED;
LOG_MISCERR("internal error sealing sequence number");
goto error;
}
- _log("%s:%d: in %s\n", SFILE, __LINE__, __func__);
client_data->seq_num++;
{
register size_t current;
-#define SFILE (strrchr(__FILE__,'/') ? 1+strrchr(__FILE__,'/') : __FILE__)
- _log("%s:%d: %s wants %d bytes\n", SFILE, __LINE__, __func__, len);
while (len > 0) {
current = (size_t)((long)rstrm->in_boundry -
(long)rstrm->in_finger);