On Jul 20, 2011, at 1:07 AM, Greg Hudson wrote:
On Tue, 2011-07-19 at 16:21 -0400, Benjamin Coddington wrote:
gss_acquire_cred
gss_accept_sec_context
gss_export_lucid_sec_context
gss_delete_sec_context
I found that before we got to gss_delete_sec_context(), we had already
tried to clean up
On Jul 14, 2011, at 9:40 AM, Greg Hudson wrote:
On Wed, 2011-07-13 at 15:33 -0400, Benjamin Coddington wrote:
Anyway, calling gss_accept_sec_context this way allows svcgssd to
create a context for any requested service name -- but the problem we
found is that svcgssd opens the kerberos replay
I am working on a linux NFS cluster that requires a single svcgssd to establish
contexts under multiple service names.
In this scenario, svcgssd can be started with -n so that it acquires creds at
context creation.
The behavior with -n is to call gss_accept_sec_context() with a NULL