if (iter != authorizers.end())
return iter->second;
+ dout(0) << "get_authorize_handler protocol " << protocol << " not supported" << dendl;
+
return NULL;
}
if (encode_encrypt(reply, ticket_info.session_key, reply_bl) < 0)
return false;
- dout(10) << "verify_authorizer ok reply_bl.length()=" << reply_bl.length() << dendl;
+ dout(10) << "verify_authorizer ok nonce " << hex << auth_msg.nonce << dec
+ << " reply_bl.length()=" << reply_bl.length() << dendl;
return true;
}
bool MDS::ms_verify_authorizer(Connection *con, int peer_type,
int protocol, bufferlist& authorizer_data, bufferlist& authorizer_reply,
- bool& isvalid)
+ bool& is_valid)
{
- bool is_valid;
-
AuthAuthorizeHandler *authorize_handler = get_authorize_handler(protocol);
if (!authorize_handler) {
is_valid = false;
lockdep = 1
debug ms = 1
debug mds = 20
+ debug auth = 20
debug monc = 20
mds log max segments = 2'
fi