sk_free_cred(skc);
cred->lc_mech_cred = NULL;
free(cred->lc_mech_token.value);
- return;
}
/**
uint32_t flags;
int rc;
- rc = sk_gen_params(skc, true);
+ rc = sk_gen_params(skc, 0);
if (rc)
return rc;
bufs[SK_INIT_P] = skc->sc_p;
bufs[SK_INIT_TARGET] = skc->sc_tgt;
bufs[SK_INIT_NODEMAP] = skc->sc_nodemap_hash;
- flags = htobe64(skc->sc_flags);
+ flags = htobe32(skc->sc_flags);
bufs[SK_INIT_FLAGS].value = &flags;
bufs[SK_INIT_FLAGS].length = sizeof(flags);
}
rc = sk_compute_dh_key(skc, &bufs[SK_RESP_PUB_KEY]);
- if (rc == GSS_S_DEFECTIVE_TOKEN) {
+ if (rc == GSS_S_BAD_QOP) {
/* Defective token for short key means we need to retry
* because there is a chance that the parameters generated
* resulted in a key that is 1 byte short */