···415 else /* if override flags set only sign/seal OR them with global auth */416 secFlags = extended_security | ses->overrideSecFlg;41700418 pSMB->hdr.Mid = GetNextMid(server);419 pSMB->hdr.Flags2 |= SMBFLG2_UNICODE;420 if((secFlags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5)···513 cERROR(1,("Server requests plain text password"514 " but client support disabled"));515516- if(secFlags & CIFSSEC_MUST_NTLMV2)517 server->secType = NTLMv2;518- else519 server->secType = NTLM;520- /* else krb5 ... */00521522 /* one byte, so no need to convert this or EncryptionKeyLen from523 little endian */
···415 else /* if override flags set only sign/seal OR them with global auth */416 secFlags = extended_security | ses->overrideSecFlg;417418+ cFYI(1,("secFlags 0x%x",secFlags));419+420 pSMB->hdr.Mid = GetNextMid(server);421 pSMB->hdr.Flags2 |= SMBFLG2_UNICODE;422 if((secFlags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5)···511 cERROR(1,("Server requests plain text password"512 " but client support disabled"));513514+ if((secFlags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2)515 server->secType = NTLMv2;516+ else if(secFlags & CIFSSEC_MAY_NTLM)517 server->secType = NTLM;518+ else if(secFlags & CIFSSEC_MAY_NTLMV2)519+ server->secType = NTLMv2;520+ /* else krb5 ... any others ... */521522 /* one byte, so no need to convert this or EncryptionKeyLen from523 little endian */
+2-1
fs/cifs/sess.c
···323 __u16 action;324 int bytes_remaining;325326- cFYI(1,("new sess setup"));327 if(ses == NULL)328 return -EINVAL;329330 type = ses->server->secType;00331 if(type == LANMAN) {332#ifndef CONFIG_CIFS_WEAK_PW_HASH333 /* LANMAN and plaintext are less secure and off by default.
···323 __u16 action;324 int bytes_remaining;3250326 if(ses == NULL)327 return -EINVAL;328329 type = ses->server->secType;330+331+ cFYI(1,("sess setup type %d",type));332 if(type == LANMAN) {333#ifndef CONFIG_CIFS_WEAK_PW_HASH334 /* LANMAN and plaintext are less secure and off by default.