···415415 else /* if override flags set only sign/seal OR them with global auth */416416 secFlags = extended_security | ses->overrideSecFlg;417417418418+ cFYI(1,("secFlags 0x%x",secFlags));419419+418420 pSMB->hdr.Mid = GetNextMid(server);419421 pSMB->hdr.Flags2 |= SMBFLG2_UNICODE;420422 if((secFlags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5)···513511 cERROR(1,("Server requests plain text password"514512 " but client support disabled"));515513516516- if(secFlags & CIFSSEC_MUST_NTLMV2)514514+ if((secFlags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2)517515 server->secType = NTLMv2;518518- else516516+ else if(secFlags & CIFSSEC_MAY_NTLM)519517 server->secType = NTLM;520520- /* else krb5 ... */518518+ else if(secFlags & CIFSSEC_MAY_NTLMV2)519519+ server->secType = NTLMv2;520520+ /* else krb5 ... any others ... */521521522522 /* one byte, so no need to convert this or EncryptionKeyLen from523523 little endian */
+2-1
fs/cifs/sess.c
···323323 __u16 action;324324 int bytes_remaining;325325326326- cFYI(1,("new sess setup"));327326 if(ses == NULL)328327 return -EINVAL;329328330329 type = ses->server->secType;330330+331331+ cFYI(1,("sess setup type %d",type));331332 if(type == LANMAN) {332333#ifndef CONFIG_CIFS_WEAK_PW_HASH333334 /* LANMAN and plaintext are less secure and off by default.