]> bbs.cooldavid.org Git - net-next-2.6.git/commitdiff
Revert "missing changes during ntlmv2/ntlmssp auth and sign"
authorSteve French <sfrench@us.ibm.com>
Wed, 8 Sep 2010 21:09:27 +0000 (21:09 +0000)
committerSteve French <sfrench@us.ibm.com>
Wed, 8 Sep 2010 21:09:27 +0000 (21:09 +0000)
This reverts commit 3ec6bbcdb4e85403f2c5958876ca9492afdf4031.

    The change to kernel crypto and fixes to ntlvm2 and ntlmssp
    series, introduced a regression.  Deferring this patch series
    to 2.6.37 after Shirish fixes it.

Signed-off-by: Steve French <sfrench@us.ibm.com>
Acked-by: Jeff Layton <jlayton@redhat.com>
CC: Shirish Pargaonkar <shirishp@us.ibm.com>
fs/cifs/cifsencrypt.c
fs/cifs/sess.c

index eef78c24e0cc715a6281e43dd1e43dbff7049263..051d00011ca3f3202f96d9273302c4a7a4a7b088 100644 (file)
@@ -553,8 +553,6 @@ calc_seckey(struct TCP_Server_Info *server)
                return 1;
        }
 
-       desc.tfm = tfm_arc4;
-
        crypto_blkcipher_setkey(tfm_arc4,
                server->session_key.data.ntlmv2.key, CIFS_CPHTXT_SIZE);
        sg_init_one(&sgin, sec_key, CIFS_CPHTXT_SIZE);
index 4788e16a02cc91a59cfe3b4721d19c867e97b96c..41fc5328120d61e66a8c95fb130359fec6ad3f35 100644 (file)
@@ -408,8 +408,6 @@ static int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
        /* BB spec says that if AvId field of MsvAvTimestamp is populated then
                we must set the MIC field of the AUTHENTICATE_MESSAGE */
 
-       ses->server->ntlmssp.server_flags = le32_to_cpu(pblob->NegotiateFlags);
-
        tioffset = cpu_to_le16(pblob->TargetInfoArray.BufferOffset);
        tilen = cpu_to_le16(pblob->TargetInfoArray.Length);
        ses->server->tilen = tilen;
@@ -442,13 +440,12 @@ static void build_ntlmssp_negotiate_blob(unsigned char *pbuffer,
        /* BB is NTLMV2 session security format easier to use here? */
        flags = NTLMSSP_NEGOTIATE_56 |  NTLMSSP_REQUEST_TARGET |
                NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_UNICODE |
-               NTLMSSP_NEGOTIATE_NTLM;
+               NTLMSSP_NEGOTIATE_NT_ONLY | NTLMSSP_NEGOTIATE_NTLM;
        if (ses->server->secMode &
-          (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED)) {
-               flags |= NTLMSSP_NEGOTIATE_SIGN |
-                       NTLMSSP_NEGOTIATE_KEY_XCH |
-                       NTLMSSP_NEGOTIATE_EXTENDED_SEC;
-       }
+          (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
+               flags |= NTLMSSP_NEGOTIATE_SIGN;
+       if (ses->server->secMode & SECMODE_SIGN_REQUIRED)
+               flags |= NTLMSSP_NEGOTIATE_ALWAYS_SIGN;
 
        sec_blob->NegotiateFlags |= cpu_to_le32(flags);