Index: nfs-utils-1.1.0/utils/gssd/context_lucid.c =================================================================== --- nfs-utils-1.1.0.orig/utils/gssd/context_lucid.c +++ nfs-utils-1.1.0/utils/gssd/context_lucid.c @@ -48,8 +48,10 @@ #include "context.h" #ifndef OM_uint64 +#ifndef GSSAPI_GSSAPI_H_ typedef uint64_t OM_uint64; #endif +#endif static int write_lucid_keyblock(char **p, char *end, gss_krb5_lucid_key_t *key) @@ -171,10 +173,10 @@ serialize_krb5_ctx(gss_ctx_id_t ctx, gss int retcode = 0; printerr(2, "DEBUG: %s: lucid version!\n", __FUNCTION__); - maj_stat = gss_export_lucid_sec_context(&min_stat, &ctx, + maj_stat = gss_krb5_export_lucid_sec_context(&min_stat, &ctx, 1, &return_ctx); if (maj_stat != GSS_S_COMPLETE) { - pgsserr("gss_export_lucid_sec_context", + pgsserr("gss_krb5_export_lucid_sec_context", maj_stat, min_stat, &krb5oid); goto out_err; } @@ -198,9 +200,9 @@ serialize_krb5_ctx(gss_ctx_id_t ctx, gss else retcode = prepare_krb5_rfc_cfx_buffer(lctx, buf); - maj_stat = gss_free_lucid_sec_context(&min_stat, ctx, return_ctx); + maj_stat = gss_krb5_free_lucid_sec_context(&min_stat, return_ctx); if (maj_stat != GSS_S_COMPLETE) { - pgsserr("gss_export_lucid_sec_context", + pgsserr("gss_krb5_free_lucid_sec_context", maj_stat, min_stat, &krb5oid); printerr(0, "WARN: failed to free lucid sec context\n"); } Index: nfs-utils-1.1.0/utils/gssd/krb5_util.c =================================================================== --- nfs-utils-1.1.0.orig/utils/gssd/krb5_util.c +++ nfs-utils-1.1.0/utils/gssd/krb5_util.c @@ -1317,13 +1317,13 @@ limit_krb5_enctypes(struct rpc_gss_sec * * list of supported enctypes, use local default here. */ if (krb5_enctypes == NULL) - maj_stat = gss_set_allowable_enctypes(&min_stat, credh, - &krb5oid, num_enctypes, enctypes); + maj_stat = gss_krb5_set_allowable_enctypes(&min_stat, credh, + num_enctypes, enctypes); else - maj_stat = gss_set_allowable_enctypes(&min_stat, credh, - &krb5oid, num_krb5_enctypes, krb5_enctypes); + maj_stat = gss_krb5_set_allowable_enctypes(&min_stat, credh, + num_krb5_enctypes, krb5_enctypes); if (maj_stat != GSS_S_COMPLETE) { - pgsserr("gss_set_allowable_enctypes", + pgsserr("gss_krb5_set_allowable_enctypes", maj_stat, min_stat, &krb5oid); gss_release_cred(&min_stat, &credh); return -1;