Instead of using an incementing value for the confounder, use
get_random_bytes() which gives us the desired unpredictable value.

Signed-off-by: Kevin Coffman <[EMAIL PROTECTED]>
---

 net/sunrpc/auth_gss/gss_krb5_wrap.c |   15 +--------------
 1 files changed, 1 insertions(+), 14 deletions(-)

diff --git a/net/sunrpc/auth_gss/gss_krb5_wrap.c 
b/net/sunrpc/auth_gss/gss_krb5_wrap.c
index a2c92f1..7a0002f 100644
--- a/net/sunrpc/auth_gss/gss_krb5_wrap.c
+++ b/net/sunrpc/auth_gss/gss_krb5_wrap.c
@@ -90,20 +90,7 @@ out:
 static inline void
 make_confounder(char *p, int blocksize)
 {
-       static u64 i = 0;
-       u64 *q = (u64 *)p;
-
-       /* rfc1964 claims this should be "random".  But all that's really
-        * necessary is that it be unique.  And not even that is necessary in
-        * our case since our "gssapi" implementation exists only to support
-        * rpcsec_gss, so we know that the only buffers we will ever encrypt
-        * already begin with a unique sequence number.  Just to hedge my bets
-        * I'll make a half-hearted attempt at something unique, but ensuring
-        * uniqueness would mean worrying about atomicity and rollover, and I
-        * don't care enough. */
-
-       BUG_ON(blocksize != 8);
-       *q = i++;
+       get_random_bytes(p, blocksize);
 }
 
 /* Assumptions: the head and tail of inbuf are ours to play with.

-
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to