diff options
author | Steve French <sfrench@us.ibm.com> | 2010-09-08 17:09:27 -0400 |
---|---|---|
committer | Steve French <sfrench@us.ibm.com> | 2010-09-08 17:09:27 -0400 |
commit | 745e507a9c79c6e1385d3414d5e56f3d4621a375 (patch) | |
tree | 14dff030b56724604256c9cfedd04804a586bbc0 /fs/cifs | |
parent | 56234e2767496c125a858f880f1b3a62e04a3406 (diff) |
Revert "missing changes during ntlmv2/ntlmssp auth and sign"
This reverts commit 3ec6bbcdb4e85403f2c5958876ca9492afdf4031.
The change to kernel crypto and fixes to ntlvm2 and ntlmssp
series, introduced a regression. Deferring this patch series
to 2.6.37 after Shirish fixes it.
Signed-off-by: Steve French <sfrench@us.ibm.com>
Acked-by: Jeff Layton <jlayton@redhat.com>
CC: Shirish Pargaonkar <shirishp@us.ibm.com>
Diffstat (limited to 'fs/cifs')
-rw-r--r-- | fs/cifs/cifsencrypt.c | 2 | ||||
-rw-r--r-- | fs/cifs/sess.c | 13 |
2 files changed, 5 insertions, 10 deletions
diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c index eef78c24e0cc..051d00011ca3 100644 --- a/fs/cifs/cifsencrypt.c +++ b/fs/cifs/cifsencrypt.c | |||
@@ -553,8 +553,6 @@ calc_seckey(struct TCP_Server_Info *server) | |||
553 | return 1; | 553 | return 1; |
554 | } | 554 | } |
555 | 555 | ||
556 | desc.tfm = tfm_arc4; | ||
557 | |||
558 | crypto_blkcipher_setkey(tfm_arc4, | 556 | crypto_blkcipher_setkey(tfm_arc4, |
559 | server->session_key.data.ntlmv2.key, CIFS_CPHTXT_SIZE); | 557 | server->session_key.data.ntlmv2.key, CIFS_CPHTXT_SIZE); |
560 | sg_init_one(&sgin, sec_key, CIFS_CPHTXT_SIZE); | 558 | sg_init_one(&sgin, sec_key, CIFS_CPHTXT_SIZE); |
diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c index 4788e16a02cc..41fc5328120d 100644 --- a/fs/cifs/sess.c +++ b/fs/cifs/sess.c | |||
@@ -408,8 +408,6 @@ static int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, | |||
408 | /* BB spec says that if AvId field of MsvAvTimestamp is populated then | 408 | /* BB spec says that if AvId field of MsvAvTimestamp is populated then |
409 | we must set the MIC field of the AUTHENTICATE_MESSAGE */ | 409 | we must set the MIC field of the AUTHENTICATE_MESSAGE */ |
410 | 410 | ||
411 | ses->server->ntlmssp.server_flags = le32_to_cpu(pblob->NegotiateFlags); | ||
412 | |||
413 | tioffset = cpu_to_le16(pblob->TargetInfoArray.BufferOffset); | 411 | tioffset = cpu_to_le16(pblob->TargetInfoArray.BufferOffset); |
414 | tilen = cpu_to_le16(pblob->TargetInfoArray.Length); | 412 | tilen = cpu_to_le16(pblob->TargetInfoArray.Length); |
415 | ses->server->tilen = tilen; | 413 | ses->server->tilen = tilen; |
@@ -442,13 +440,12 @@ static void build_ntlmssp_negotiate_blob(unsigned char *pbuffer, | |||
442 | /* BB is NTLMV2 session security format easier to use here? */ | 440 | /* BB is NTLMV2 session security format easier to use here? */ |
443 | flags = NTLMSSP_NEGOTIATE_56 | NTLMSSP_REQUEST_TARGET | | 441 | flags = NTLMSSP_NEGOTIATE_56 | NTLMSSP_REQUEST_TARGET | |
444 | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_UNICODE | | 442 | NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_UNICODE | |
445 | NTLMSSP_NEGOTIATE_NTLM; | 443 | NTLMSSP_NEGOTIATE_NT_ONLY | NTLMSSP_NEGOTIATE_NTLM; |
446 | if (ses->server->secMode & | 444 | if (ses->server->secMode & |
447 | (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) { | 445 | (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) |
448 | flags |= NTLMSSP_NEGOTIATE_SIGN | | 446 | flags |= NTLMSSP_NEGOTIATE_SIGN; |
449 | NTLMSSP_NEGOTIATE_KEY_XCH | | 447 | if (ses->server->secMode & SECMODE_SIGN_REQUIRED) |
450 | NTLMSSP_NEGOTIATE_EXTENDED_SEC; | 448 | flags |= NTLMSSP_NEGOTIATE_ALWAYS_SIGN; |
451 | } | ||
452 | 449 | ||
453 | sec_blob->NegotiateFlags |= cpu_to_le32(flags); | 450 | sec_blob->NegotiateFlags |= cpu_to_le32(flags); |
454 | 451 | ||