diff options
Diffstat (limited to 'net/sunrpc/auth_gss/gss_krb5_wrap.c')
| -rw-r--r-- | net/sunrpc/auth_gss/gss_krb5_wrap.c | 16 | 
1 files changed, 8 insertions, 8 deletions
diff --git a/net/sunrpc/auth_gss/gss_krb5_wrap.c b/net/sunrpc/auth_gss/gss_krb5_wrap.c index 14a0aff0cd84..6c1920eed771 100644 --- a/net/sunrpc/auth_gss/gss_krb5_wrap.c +++ b/net/sunrpc/auth_gss/gss_krb5_wrap.c @@ -163,7 +163,7 @@ gss_wrap_kerberos_v1(struct krb5_ctx *kctx, int offset,  					    .data = cksumdata};  	int			blocksize = 0, plainlen;  	unsigned char		*ptr, *msg_start; -	s32			now; +	time64_t		now;  	int			headlen;  	struct page		**tmp_pages;  	u32			seq_send; @@ -172,7 +172,7 @@ gss_wrap_kerberos_v1(struct krb5_ctx *kctx, int offset,  	dprintk("RPC:       %s\n", __func__); -	now = get_seconds(); +	now = ktime_get_real_seconds();  	blocksize = crypto_sync_skcipher_blocksize(kctx->enc);  	gss_krb5_add_padding(buf, offset, blocksize); @@ -268,7 +268,7 @@ gss_unwrap_kerberos_v1(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)  	char			cksumdata[GSS_KRB5_MAX_CKSUM_LEN];  	struct xdr_netobj	md5cksum = {.len = sizeof(cksumdata),  					    .data = cksumdata}; -	s32			now; +	time64_t		now;  	int			direction;  	s32			seqnum;  	unsigned char		*ptr; @@ -359,7 +359,7 @@ gss_unwrap_kerberos_v1(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)  	/* it got through unscathed.  Make sure the context is unexpired */ -	now = get_seconds(); +	now = ktime_get_real_seconds();  	if (now > kctx->endtime)  		return GSS_S_CONTEXT_EXPIRED; @@ -439,7 +439,7 @@ gss_wrap_kerberos_v2(struct krb5_ctx *kctx, u32 offset,  		     struct xdr_buf *buf, struct page **pages)  {  	u8		*ptr, *plainhdr; -	s32		now; +	time64_t	now;  	u8		flags = 0x00;  	__be16		*be16ptr;  	__be64		*be64ptr; @@ -481,14 +481,14 @@ gss_wrap_kerberos_v2(struct krb5_ctx *kctx, u32 offset,  	if (err)  		return err; -	now = get_seconds(); +	now = ktime_get_real_seconds();  	return (kctx->endtime < now) ? GSS_S_CONTEXT_EXPIRED : GSS_S_COMPLETE;  }  static u32  gss_unwrap_kerberos_v2(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)  { -	s32		now; +	time64_t	now;  	u8		*ptr;  	u8		flags = 0x00;  	u16		ec, rrc; @@ -557,7 +557,7 @@ gss_unwrap_kerberos_v2(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)  	/* do sequencing checks */  	/* it got through unscathed.  Make sure the context is unexpired */ -	now = get_seconds(); +	now = ktime_get_real_seconds();  	if (now > kctx->endtime)  		return GSS_S_CONTEXT_EXPIRED;  |