cifs: Support NTLM2 session security during NTLMSSP authentication [try #5]
authorShirish Pargaonkar <shirishpargaonkar@gmail.com>
Sat, 11 Dec 2010 20:19:22 +0000 (14:19 -0600)
committerSteve French <sfrench@us.ibm.com>
Thu, 6 Jan 2011 19:07:52 +0000 (19:07 +0000)
commitdf8fbc241aa3c451248b1f19fff3a3f604b107f9
tree750d602cb5762dda52cad4a6afff0f8fedc4ab37
parent262f86adcc0665872812a7458a5d03e19e0efe33
cifs: Support NTLM2 session security during NTLMSSP authentication [try #5]

Indicate to the server a capability of NTLM2 session security (NTLM2 Key)
during ntlmssp protocol exchange in one of the bits of the flags field.
If server supports this capability, send NTLM2 key even if signing is not
required on the server.

If the server requires signing, the session keys exchanged for NTLMv2
and NTLM2 session security in auth packet of the nlmssp exchange are same.

Send the same flags in authenticate message (type 3) that client sent in
negotiate message (type 1).

Remove function setup_ntlmssp_neg_req

Make sure ntlmssp negotiate and authenticate messages are zero'ed
before they are built.

Reported-and-Tested-by: Robbert Kouprie <robbert@exx.nl>
Signed-off-by: Shirish Pargaonkar <shirishpargaonkar@gmail.com>
Acked-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Steve French <sfrench@us.ibm.com>
fs/cifs/sess.c