NTLM auth and sign - Use appropriate server challenge
authorShirish Pargaonkar <shirishpargaonkar@gmail.com>
Wed, 27 Oct 2010 20:20:36 +0000 (15:20 -0500)
committerSteve French <sfrench@us.ibm.com>
Fri, 29 Oct 2010 01:47:30 +0000 (01:47 +0000)
commitd3ba50b17aa7a391bb5b3dcd8d6ba7a02c4f031c
tree452ddaeb1d52387a852d0c3cf46c4253347d0a27
parent6b03590412c977ae8fa1635c9b80854ab19a5b78
NTLM auth and sign - Use appropriate server challenge

Need to have cryptkey or server challenge in smb connection
(struct TCP_Server_Info) for ntlm and ntlmv2 auth types for which
cryptkey (Encryption Key) is supplied just once in Negotiate Protocol
response during an smb connection setup for all the smb sessions over
that smb connection.

For ntlmssp, cryptkey or server challenge is provided for every
smb session in type 2 packet of ntlmssp negotiation, the cryptkey
provided during Negotiation Protocol response before smb connection
does not count.

Rename cryptKey to cryptkey and related changes.

Signed-off-by: Shirish Pargaonkar <shirishpargaonkar@gmail.com>
Signed-off-by: Steve French <sfrench@us.ibm.com>
fs/cifs/cifsencrypt.c
fs/cifs/cifsglob.h
fs/cifs/cifssmb.c
fs/cifs/connect.c
fs/cifs/sess.c