aboutsummaryrefslogtreecommitdiffstats
path: root/fs/cifs/cifssmb.c
diff options
context:
space:
mode:
authorSteve French <sfrench@us.ibm.com>2006-06-01 15:20:10 -0400
committerSteve French <sfrench@us.ibm.com>2006-06-01 15:20:10 -0400
commit7c7b25bc8e392aea781324efa771bc191377b876 (patch)
treeddad1a91f948746dbef140994c615253a7f42e65 /fs/cifs/cifssmb.c
parent9c53588ec96d85f82e9bf3fb1af7cca31056e940 (diff)
[CIFS] Support for setting up SMB sessions to legacy lanman servers part 2
Diffstat (limited to 'fs/cifs/cifssmb.c')
-rw-r--r--fs/cifs/cifssmb.c27
1 files changed, 22 insertions, 5 deletions
diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c
index da3154fa9c8a..6b5be6d59f07 100644
--- a/fs/cifs/cifssmb.c
+++ b/fs/cifs/cifssmb.c
@@ -438,12 +438,19 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses)
438 goto neg_err_exit; 438 goto neg_err_exit;
439 } else if((pSMBr->hdr.WordCount == 13) && 439 } else if((pSMBr->hdr.WordCount == 13) &&
440 (pSMBr->DialectIndex == LANMAN_PROT)) { 440 (pSMBr->DialectIndex == LANMAN_PROT)) {
441#ifdef CONFIG_CIFS_WEAK_PW_HASH
441 struct lanman_neg_rsp * rsp = 442 struct lanman_neg_rsp * rsp =
442 (struct lanman_neg_rsp *)pSMBr; 443 (struct lanman_neg_rsp *)pSMBr;
443 444
444 445 if((extended_security & CIFSSEC_MAY_LANMAN) ||
445 /* BB Mark ses struct as negotiated lanman level BB */ 446 (extended_security & CIFSSEC_MAY_PLNTXT))
446 server->secType = LANMAN; 447 server->secType = LANMAN;
448 else {
449 cERROR(1, ("mount failed weak security disabled"
450 " in /proc/fs/cifs/SecurityFlags"));
451 rc = -EOPNOTSUPP;
452 goto neg_err_exit;
453 }
447 server->secMode = (__u8)le16_to_cpu(rsp->SecurityMode); 454 server->secMode = (__u8)le16_to_cpu(rsp->SecurityMode);
448 server->maxReq = le16_to_cpu(rsp->MaxMpxCount); 455 server->maxReq = le16_to_cpu(rsp->MaxMpxCount);
449 server->maxBuf = min((__u32)le16_to_cpu(rsp->MaxBufSize), 456 server->maxBuf = min((__u32)le16_to_cpu(rsp->MaxBufSize),
@@ -469,6 +476,11 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses)
469 } 476 }
470 477
471 cFYI(1,("LANMAN negotiated")); /* BB removeme BB */ 478 cFYI(1,("LANMAN negotiated")); /* BB removeme BB */
479#else /* weak security disabled */
480 cERROR(1,("mount failed, cifs module not built with "
481 "CIFS_WEAK_PW_HASH support"));
482 rc = -EOPNOTSUPP;
483#endif /* WEAK_PW_HASH */
472 goto neg_err_exit; 484 goto neg_err_exit;
473 } else if(pSMBr->hdr.WordCount != 17) { 485 } else if(pSMBr->hdr.WordCount != 17) {
474 /* unknown wct */ 486 /* unknown wct */
@@ -479,8 +491,13 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses)
479 server->secMode = pSMBr->SecurityMode; 491 server->secMode = pSMBr->SecurityMode;
480 if((server->secMode & SECMODE_USER) == 0) 492 if((server->secMode & SECMODE_USER) == 0)
481 cFYI(1,("share mode security")); 493 cFYI(1,("share mode security"));
482 server->secType = NTLM; /* BB override default for 494
483 NTLMv2 or kerberos v5 */ 495 if(extended_security & CIFSSEC_MUST_NTLMV2)
496 server->secType = NTLMv2;
497 else
498 server->secType = NTLM;
499 /* else krb5 ... */
500
484 /* one byte - no need to convert this or EncryptionKeyLen 501 /* one byte - no need to convert this or EncryptionKeyLen
485 from little endian */ 502 from little endian */
486 server->maxReq = le16_to_cpu(pSMBr->MaxMpxCount); 503 server->maxReq = le16_to_cpu(pSMBr->MaxMpxCount);