Blame view

fs/cifs/sess.c 39.4 KB
3979877e5   Steve French   [CIFS] Support fo...
1
2
3
4
5
  /*
   *   fs/cifs/sess.c
   *
   *   SMB/CIFS session setup handling routines
   *
d185cda77   Steve French   [CIFS] rename cif...
6
   *   Copyright (c) International Business Machines  Corp., 2006, 2009
3979877e5   Steve French   [CIFS] Support fo...
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
   *   Author(s): Steve French (sfrench@us.ibm.com)
   *
   *   This library is free software; you can redistribute it and/or modify
   *   it under the terms of the GNU Lesser General Public License as published
   *   by the Free Software Foundation; either version 2.1 of the License, or
   *   (at your option) any later version.
   *
   *   This library is distributed in the hope that it will be useful,
   *   but WITHOUT ANY WARRANTY; without even the implied warranty of
   *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
   *   the GNU Lesser General Public License for more details.
   *
   *   You should have received a copy of the GNU Lesser General Public License
   *   along with this library; if not, write to the Free Software
   *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
   */
  
  #include "cifspdu.h"
  #include "cifsglob.h"
  #include "cifsproto.h"
  #include "cifs_unicode.h"
  #include "cifs_debug.h"
  #include "ntlmssp.h"
  #include "nterr.h"
9c53588ec   Steve French   [CIFS] Missing in...
31
  #include <linux/utsname.h>
5a0e3ad6a   Tejun Heo   include cleanup: ...
32
  #include <linux/slab.h>
2442421b1   Steve French   [CIFS] Have CIFS_...
33
  #include "cifs_spnego.h"
3979877e5   Steve French   [CIFS] Support fo...
34

96daf2b09   Steve French   [CIFS] Rename thr...
35
  static __u32 cifs_ssetup_hdr(struct cifs_ses *ses, SESSION_SETUP_ANDX *pSMB)
3979877e5   Steve French   [CIFS] Support fo...
36
37
38
39
  {
  	__u32 capabilities = 0;
  
  	/* init fields common to all four types of SessSetup */
eca6acf91   Steve French   [CIFS] Fix multiu...
40
41
42
43
  	/* Note that offsets for first seven fields in req struct are same  */
  	/*	in CIFS Specs so does not matter which of 3 forms of struct */
  	/*	that we use in next few lines                               */
  	/* Note that header is initialized to zero in header_assemble */
3979877e5   Steve French   [CIFS] Support fo...
44
  	pSMB->req.AndXCommand = 0xFF;
c974befa4   Jeff Layton   cifs: untangle se...
45
46
47
  	pSMB->req.MaxBufferSize = cpu_to_le16(min_t(u32,
  					CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4,
  					USHRT_MAX));
3979877e5   Steve French   [CIFS] Support fo...
48
  	pSMB->req.MaxMpxCount = cpu_to_le16(ses->server->maxReq);
bc09d141e   Fabian Frederick   fs/cifs: remove o...
49
  	pSMB->req.VcNumber = cpu_to_le16(1);
3979877e5   Steve French   [CIFS] Support fo...
50
51
  
  	/* Now no need to set SMBFLG_CASELESS or obsolete CANONICAL PATH */
790fe579f   Steve French   [CIFS] more white...
52
  	/* BB verify whether signing required on neg or just on auth frame
3979877e5   Steve French   [CIFS] Support fo...
53
54
55
56
  	   (and NTLM case) */
  
  	capabilities = CAP_LARGE_FILES | CAP_NT_SMBS | CAP_LEVEL_II_OPLOCKS |
  			CAP_LARGE_WRITE_X | CAP_LARGE_READ_X;
38d77c50b   Jeff Layton   cifs: track the e...
57
  	if (ses->server->sign)
3979877e5   Steve French   [CIFS] Support fo...
58
59
60
61
62
63
64
65
66
67
68
69
70
71
  		pSMB->req.hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
  
  	if (ses->capabilities & CAP_UNICODE) {
  		pSMB->req.hdr.Flags2 |= SMBFLG2_UNICODE;
  		capabilities |= CAP_UNICODE;
  	}
  	if (ses->capabilities & CAP_STATUS32) {
  		pSMB->req.hdr.Flags2 |= SMBFLG2_ERR_STATUS;
  		capabilities |= CAP_STATUS32;
  	}
  	if (ses->capabilities & CAP_DFS) {
  		pSMB->req.hdr.Flags2 |= SMBFLG2_DFS;
  		capabilities |= CAP_DFS;
  	}
26f57364d   Steve French   [CIFS] formatting...
72
  	if (ses->capabilities & CAP_UNIX)
3979877e5   Steve French   [CIFS] Support fo...
73
  		capabilities |= CAP_UNIX;
3979877e5   Steve French   [CIFS] Support fo...
74

3979877e5   Steve French   [CIFS] Support fo...
75
76
  	return capabilities;
  }
0d3a01fad   Jeff Layton   [CIFS] Break up u...
77
78
79
80
81
82
83
  static void
  unicode_oslm_strings(char **pbcc_area, const struct nls_table *nls_cp)
  {
  	char *bcc_ptr = *pbcc_area;
  	int bytes_ret = 0;
  
  	/* Copy OS version */
acbbb76a2   Steve French   CIFS: Rename *UCS...
84
85
  	bytes_ret = cifs_strtoUTF16((__le16 *)bcc_ptr, "Linux version ", 32,
  				    nls_cp);
0d3a01fad   Jeff Layton   [CIFS] Break up u...
86
  	bcc_ptr += 2 * bytes_ret;
acbbb76a2   Steve French   CIFS: Rename *UCS...
87
88
  	bytes_ret = cifs_strtoUTF16((__le16 *) bcc_ptr, init_utsname()->release,
  				    32, nls_cp);
0d3a01fad   Jeff Layton   [CIFS] Break up u...
89
90
  	bcc_ptr += 2 * bytes_ret;
  	bcc_ptr += 2; /* trailing null */
acbbb76a2   Steve French   CIFS: Rename *UCS...
91
92
  	bytes_ret = cifs_strtoUTF16((__le16 *) bcc_ptr, CIFS_NETWORK_OPSYS,
  				    32, nls_cp);
0d3a01fad   Jeff Layton   [CIFS] Break up u...
93
94
95
96
97
  	bcc_ptr += 2 * bytes_ret;
  	bcc_ptr += 2; /* trailing null */
  
  	*pbcc_area = bcc_ptr;
  }
96daf2b09   Steve French   [CIFS] Rename thr...
98
  static void unicode_domain_string(char **pbcc_area, struct cifs_ses *ses,
0d3a01fad   Jeff Layton   [CIFS] Break up u...
99
100
101
102
103
104
105
106
107
108
109
110
111
  				   const struct nls_table *nls_cp)
  {
  	char *bcc_ptr = *pbcc_area;
  	int bytes_ret = 0;
  
  	/* copy domain */
  	if (ses->domainName == NULL) {
  		/* Sending null domain better than using a bogus domain name (as
  		we did briefly in 2.6.18) since server will use its default */
  		*bcc_ptr = 0;
  		*(bcc_ptr+1) = 0;
  		bytes_ret = 0;
  	} else
acbbb76a2   Steve French   CIFS: Rename *UCS...
112
  		bytes_ret = cifs_strtoUTF16((__le16 *) bcc_ptr, ses->domainName,
057d6332b   Chen Gang   cifs: extend the ...
113
  					    CIFS_MAX_DOMAINNAME_LEN, nls_cp);
0d3a01fad   Jeff Layton   [CIFS] Break up u...
114
115
116
117
118
  	bcc_ptr += 2 * bytes_ret;
  	bcc_ptr += 2;  /* account for null terminator */
  
  	*pbcc_area = bcc_ptr;
  }
96daf2b09   Steve French   [CIFS] Rename thr...
119
  static void unicode_ssetup_strings(char **pbcc_area, struct cifs_ses *ses,
790fe579f   Steve French   [CIFS] more white...
120
  				   const struct nls_table *nls_cp)
3979877e5   Steve French   [CIFS] Support fo...
121
  {
790fe579f   Steve French   [CIFS] more white...
122
  	char *bcc_ptr = *pbcc_area;
3979877e5   Steve French   [CIFS] Support fo...
123
124
125
126
  	int bytes_ret = 0;
  
  	/* BB FIXME add check that strings total less
  	than 335 or will need to send them as arrays */
0223cf0b1   Steve French   [CIFS] Fix alignm...
127
128
  	/* unicode strings, must be word aligned before the call */
  /*	if ((long) bcc_ptr % 2)	{
3979877e5   Steve French   [CIFS] Support fo...
129
130
  		*bcc_ptr = 0;
  		bcc_ptr++;
0223cf0b1   Steve French   [CIFS] Fix alignm...
131
  	} */
3979877e5   Steve French   [CIFS] Support fo...
132
  	/* copy user */
8727c8a85   Steve French   Allow user names ...
133
  	if (ses->user_name == NULL) {
6e659c639   Steve French   [CIFS] Fix mount...
134
135
136
  		/* null user mount */
  		*bcc_ptr = 0;
  		*(bcc_ptr+1) = 0;
301a6a317   Steve French   [CIFS] Maximum us...
137
  	} else {
acbbb76a2   Steve French   CIFS: Rename *UCS...
138
  		bytes_ret = cifs_strtoUTF16((__le16 *) bcc_ptr, ses->user_name,
8c3a2b4c4   Scott Lovenberg   cifs: Move string...
139
  					    CIFS_MAX_USERNAME_LEN, nls_cp);
3979877e5   Steve French   [CIFS] Support fo...
140
141
142
  	}
  	bcc_ptr += 2 * bytes_ret;
  	bcc_ptr += 2; /* account for null termination */
3979877e5   Steve French   [CIFS] Support fo...
143

0d3a01fad   Jeff Layton   [CIFS] Break up u...
144
145
  	unicode_domain_string(&bcc_ptr, ses, nls_cp);
  	unicode_oslm_strings(&bcc_ptr, nls_cp);
3979877e5   Steve French   [CIFS] Support fo...
146
147
148
  
  	*pbcc_area = bcc_ptr;
  }
96daf2b09   Steve French   [CIFS] Rename thr...
149
  static void ascii_ssetup_strings(char **pbcc_area, struct cifs_ses *ses,
790fe579f   Steve French   [CIFS] more white...
150
  				 const struct nls_table *nls_cp)
3979877e5   Steve French   [CIFS] Support fo...
151
  {
790fe579f   Steve French   [CIFS] more white...
152
  	char *bcc_ptr = *pbcc_area;
3979877e5   Steve French   [CIFS] Support fo...
153
154
155
  
  	/* copy user */
  	/* BB what about null user mounts - check that we do this BB */
790fe579f   Steve French   [CIFS] more white...
156
  	/* copy user */
de47a4176   Shirish Pargaonkar   cifs: Fix oops in...
157
  	if (ses->user_name != NULL) {
8c3a2b4c4   Scott Lovenberg   cifs: Move string...
158
159
  		strncpy(bcc_ptr, ses->user_name, CIFS_MAX_USERNAME_LEN);
  		bcc_ptr += strnlen(ses->user_name, CIFS_MAX_USERNAME_LEN);
de47a4176   Shirish Pargaonkar   cifs: Fix oops in...
160
  	}
8727c8a85   Steve French   Allow user names ...
161
  	/* else null user mount */
3979877e5   Steve French   [CIFS] Support fo...
162
  	*bcc_ptr = 0;
790fe579f   Steve French   [CIFS] more white...
163
  	bcc_ptr++; /* account for null termination */
3979877e5   Steve French   [CIFS] Support fo...
164

790fe579f   Steve French   [CIFS] more white...
165
  	/* copy domain */
790fe579f   Steve French   [CIFS] more white...
166
  	if (ses->domainName != NULL) {
057d6332b   Chen Gang   cifs: extend the ...
167
168
  		strncpy(bcc_ptr, ses->domainName, CIFS_MAX_DOMAINNAME_LEN);
  		bcc_ptr += strnlen(ses->domainName, CIFS_MAX_DOMAINNAME_LEN);
790fe579f   Steve French   [CIFS] more white...
169
  	} /* else we will send a null domain name
6e659c639   Steve French   [CIFS] Fix mount...
170
  	     so the server will default to its own domain */
3979877e5   Steve French   [CIFS] Support fo...
171
172
173
174
175
176
177
  	*bcc_ptr = 0;
  	bcc_ptr++;
  
  	/* BB check for overflow here */
  
  	strcpy(bcc_ptr, "Linux version ");
  	bcc_ptr += strlen("Linux version ");
96b644bde   Serge E. Hallyn   [PATCH] namespace...
178
179
  	strcpy(bcc_ptr, init_utsname()->release);
  	bcc_ptr += strlen(init_utsname()->release) + 1;
3979877e5   Steve French   [CIFS] Support fo...
180
181
182
  
  	strcpy(bcc_ptr, CIFS_NETWORK_OPSYS);
  	bcc_ptr += strlen(CIFS_NETWORK_OPSYS) + 1;
790fe579f   Steve French   [CIFS] more white...
183
  	*pbcc_area = bcc_ptr;
3979877e5   Steve French   [CIFS] Support fo...
184
  }
59140797c   Jeff Layton   cifs: fix session...
185
  static void
96daf2b09   Steve French   [CIFS] Rename thr...
186
  decode_unicode_ssetup(char **pbcc_area, int bleft, struct cifs_ses *ses,
59140797c   Jeff Layton   cifs: fix session...
187
  		      const struct nls_table *nls_cp)
3979877e5   Steve French   [CIFS] Support fo...
188
  {
59140797c   Jeff Layton   cifs: fix session...
189
  	int len;
790fe579f   Steve French   [CIFS] more white...
190
  	char *data = *pbcc_area;
3979877e5   Steve French   [CIFS] Support fo...
191

f96637be0   Joe Perches   [CIFS] cifs: Rena...
192
193
  	cifs_dbg(FYI, "bleft %d
  ", bleft);
3979877e5   Steve French   [CIFS] Support fo...
194

26f57364d   Steve French   [CIFS] formatting...
195
  	kfree(ses->serverOS);
acbbb76a2   Steve French   CIFS: Rename *UCS...
196
  	ses->serverOS = cifs_strndup_from_utf16(data, bleft, true, nls_cp);
f96637be0   Joe Perches   [CIFS] cifs: Rena...
197
198
  	cifs_dbg(FYI, "serverOS=%s
  ", ses->serverOS);
59140797c   Jeff Layton   cifs: fix session...
199
200
201
202
203
  	len = (UniStrnlen((wchar_t *) data, bleft / 2) * 2) + 2;
  	data += len;
  	bleft -= len;
  	if (bleft <= 0)
  		return;
3979877e5   Steve French   [CIFS] Support fo...
204

26f57364d   Steve French   [CIFS] formatting...
205
  	kfree(ses->serverNOS);
acbbb76a2   Steve French   CIFS: Rename *UCS...
206
  	ses->serverNOS = cifs_strndup_from_utf16(data, bleft, true, nls_cp);
f96637be0   Joe Perches   [CIFS] cifs: Rena...
207
208
  	cifs_dbg(FYI, "serverNOS=%s
  ", ses->serverNOS);
59140797c   Jeff Layton   cifs: fix session...
209
210
211
212
213
  	len = (UniStrnlen((wchar_t *) data, bleft / 2) * 2) + 2;
  	data += len;
  	bleft -= len;
  	if (bleft <= 0)
  		return;
790fe579f   Steve French   [CIFS] more white...
214

26f57364d   Steve French   [CIFS] formatting...
215
  	kfree(ses->serverDomain);
acbbb76a2   Steve French   CIFS: Rename *UCS...
216
  	ses->serverDomain = cifs_strndup_from_utf16(data, bleft, true, nls_cp);
f96637be0   Joe Perches   [CIFS] cifs: Rena...
217
218
  	cifs_dbg(FYI, "serverDomain=%s
  ", ses->serverDomain);
790fe579f   Steve French   [CIFS] more white...
219

59140797c   Jeff Layton   cifs: fix session...
220
  	return;
3979877e5   Steve French   [CIFS] Support fo...
221
  }
7d0664596   Jeff Layton   cifs: make decode...
222
223
224
  static void decode_ascii_ssetup(char **pbcc_area, __u16 bleft,
  				struct cifs_ses *ses,
  				const struct nls_table *nls_cp)
3979877e5   Steve French   [CIFS] Support fo...
225
  {
3979877e5   Steve French   [CIFS] Support fo...
226
  	int len;
790fe579f   Steve French   [CIFS] more white...
227
  	char *bcc_ptr = *pbcc_area;
3979877e5   Steve French   [CIFS] Support fo...
228

f96637be0   Joe Perches   [CIFS] cifs: Rena...
229
230
  	cifs_dbg(FYI, "decode sessetup ascii. bleft %d
  ", bleft);
50c2f7538   Steve French   [CIFS] whitespace...
231

3979877e5   Steve French   [CIFS] Support fo...
232
  	len = strnlen(bcc_ptr, bleft);
790fe579f   Steve French   [CIFS] more white...
233
  	if (len >= bleft)
7d0664596   Jeff Layton   cifs: make decode...
234
  		return;
50c2f7538   Steve French   [CIFS] whitespace...
235

26f57364d   Steve French   [CIFS] formatting...
236
  	kfree(ses->serverOS);
3979877e5   Steve French   [CIFS] Support fo...
237
238
  
  	ses->serverOS = kzalloc(len + 1, GFP_KERNEL);
27b7edcf1   Namjae Jeon   cifs: fix a possi...
239
  	if (ses->serverOS) {
3979877e5   Steve French   [CIFS] Support fo...
240
  		strncpy(ses->serverOS, bcc_ptr, len);
27b7edcf1   Namjae Jeon   cifs: fix a possi...
241
242
243
244
  		if (strncmp(ses->serverOS, "OS/2", 4) == 0)
  			cifs_dbg(FYI, "OS/2 server
  ");
  	}
3979877e5   Steve French   [CIFS] Support fo...
245
246
247
248
249
  
  	bcc_ptr += len + 1;
  	bleft -= len + 1;
  
  	len = strnlen(bcc_ptr, bleft);
790fe579f   Steve French   [CIFS] more white...
250
  	if (len >= bleft)
7d0664596   Jeff Layton   cifs: make decode...
251
  		return;
3979877e5   Steve French   [CIFS] Support fo...
252

26f57364d   Steve French   [CIFS] formatting...
253
  	kfree(ses->serverNOS);
3979877e5   Steve French   [CIFS] Support fo...
254
255
  
  	ses->serverNOS = kzalloc(len + 1, GFP_KERNEL);
790fe579f   Steve French   [CIFS] more white...
256
  	if (ses->serverNOS)
3979877e5   Steve French   [CIFS] Support fo...
257
258
259
260
  		strncpy(ses->serverNOS, bcc_ptr, len);
  
  	bcc_ptr += len + 1;
  	bleft -= len + 1;
790fe579f   Steve French   [CIFS] more white...
261
262
  	len = strnlen(bcc_ptr, bleft);
  	if (len > bleft)
7d0664596   Jeff Layton   cifs: make decode...
263
  		return;
3979877e5   Steve French   [CIFS] Support fo...
264

9ac00b7d9   Steve French   [CIFS] Do not sen...
265
266
267
268
269
  	/* No domain field in LANMAN case. Domain is
  	   returned by old servers in the SMB negprot response */
  	/* BB For newer servers which do not support Unicode,
  	   but thus do return domain here we could add parsing
  	   for it later, but it is not very important */
f96637be0   Joe Perches   [CIFS] cifs: Rena...
270
271
  	cifs_dbg(FYI, "ascii: bytes left %d
  ", bleft);
3979877e5   Steve French   [CIFS] Support fo...
272
  }
5478f9ba9   Pavel Shilovsky   CIFS: Add session...
273
  int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
96daf2b09   Steve French   [CIFS] Rename thr...
274
  				    struct cifs_ses *ses)
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
275
  {
2b149f119   Shirish Pargaonkar   cifs NTLMv2/NTLMS...
276
277
  	unsigned int tioffset; /* challenge message target info area */
  	unsigned int tilen; /* challenge message target info area length  */
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
278
279
280
  	CHALLENGE_MESSAGE *pblob = (CHALLENGE_MESSAGE *)bcc_ptr;
  
  	if (blob_len < sizeof(CHALLENGE_MESSAGE)) {
f96637be0   Joe Perches   [CIFS] cifs: Rena...
281
282
  		cifs_dbg(VFS, "challenge blob len %d too small
  ", blob_len);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
283
284
285
286
  		return -EINVAL;
  	}
  
  	if (memcmp(pblob->Signature, "NTLMSSP", 8)) {
f96637be0   Joe Perches   [CIFS] cifs: Rena...
287
288
289
  		cifs_dbg(VFS, "blob signature incorrect %s
  ",
  			 pblob->Signature);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
290
291
292
  		return -EINVAL;
  	}
  	if (pblob->MessageType != NtLmChallenge) {
f96637be0   Joe Perches   [CIFS] cifs: Rena...
293
294
295
  		cifs_dbg(VFS, "Incorrect message type %d
  ",
  			 pblob->MessageType);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
296
297
  		return -EINVAL;
  	}
d3686d54c   Shirish Pargaonkar   cifs: Cleanup and...
298
  	memcpy(ses->ntlmssp->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
299
300
301
302
  	/* BB we could decode pblob->NegotiateFlags; some may be useful */
  	/* In particular we can examine sign flags */
  	/* BB spec says that if AvId field of MsvAvTimestamp is populated then
  		we must set the MIC field of the AUTHENTICATE_MESSAGE */
d3686d54c   Shirish Pargaonkar   cifs: Cleanup and...
303
  	ses->ntlmssp->server_flags = le32_to_cpu(pblob->NegotiateFlags);
5443d130a   Steve French   various endian fi...
304
305
  	tioffset = le32_to_cpu(pblob->TargetInfoArray.BufferOffset);
  	tilen = le16_to_cpu(pblob->TargetInfoArray.Length);
4991a5faa   Dan Carpenter   cifs: check offse...
306
  	if (tioffset > blob_len || tioffset + tilen > blob_len) {
f96637be0   Joe Perches   [CIFS] cifs: Rena...
307
308
  		cifs_dbg(VFS, "tioffset + tilen too high %u + %u",
  			tioffset, tilen);
4991a5faa   Dan Carpenter   cifs: check offse...
309
310
  		return -EINVAL;
  	}
d3686d54c   Shirish Pargaonkar   cifs: Cleanup and...
311
  	if (tilen) {
f7f7c1850   Silviu-Mihai Popescu   fs: cifs: use kme...
312
313
  		ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen,
  						 GFP_KERNEL);
d3686d54c   Shirish Pargaonkar   cifs: Cleanup and...
314
  		if (!ses->auth_key.response) {
f96637be0   Joe Perches   [CIFS] cifs: Rena...
315
  			cifs_dbg(VFS, "Challenge target info alloc failure");
2b149f119   Shirish Pargaonkar   cifs NTLMv2/NTLMS...
316
317
  			return -ENOMEM;
  		}
d3686d54c   Shirish Pargaonkar   cifs: Cleanup and...
318
  		ses->auth_key.len = tilen;
2b149f119   Shirish Pargaonkar   cifs NTLMv2/NTLMS...
319
  	}
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
320
321
  	return 0;
  }
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
322
323
324
325
  /* BB Move to ntlmssp.c eventually */
  
  /* We do not malloc the blob, it is passed in pbuffer, because
     it is fixed size, and small, making this approach cleaner */
5478f9ba9   Pavel Shilovsky   CIFS: Add session...
326
  void build_ntlmssp_negotiate_blob(unsigned char *pbuffer,
96daf2b09   Steve French   [CIFS] Rename thr...
327
  					 struct cifs_ses *ses)
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
328
329
330
  {
  	NEGOTIATE_MESSAGE *sec_blob = (NEGOTIATE_MESSAGE *)pbuffer;
  	__u32 flags;
df8fbc241   Shirish Pargaonkar   cifs: Support NTL...
331
  	memset(pbuffer, 0, sizeof(NEGOTIATE_MESSAGE));
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
332
333
334
335
336
337
  	memcpy(sec_blob->Signature, NTLMSSP_SIGNATURE, 8);
  	sec_blob->MessageType = NtLmNegotiate;
  
  	/* BB is NTLMV2 session security format easier to use here? */
  	flags = NTLMSSP_NEGOTIATE_56 |	NTLMSSP_REQUEST_TARGET |
  		NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_UNICODE |
df8fbc241   Shirish Pargaonkar   cifs: Support NTL...
338
  		NTLMSSP_NEGOTIATE_NTLM | NTLMSSP_NEGOTIATE_EXTENDED_SEC;
38d77c50b   Jeff Layton   cifs: track the e...
339
  	if (ses->server->sign) {
745e507a9   Steve French   Revert "missing c...
340
  		flags |= NTLMSSP_NEGOTIATE_SIGN;
5c234aa5e   Shirish Pargaonkar   cifs: Add a varia...
341
342
  		if (!ses->server->session_estab ||
  				ses->ntlmssp->sesskey_per_smbsess)
62411ab2f   Shirish Pargaonkar   cifs: Fix signing...
343
  			flags |= NTLMSSP_NEGOTIATE_KEY_XCH;
d2b915210   Shirish Pargaonkar   NTLM auth and sig...
344
  	}
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
345

df8fbc241   Shirish Pargaonkar   cifs: Support NTL...
346
  	sec_blob->NegotiateFlags = cpu_to_le32(flags);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
347
348
349
350
351
352
353
354
355
356
  
  	sec_blob->WorkstationName.BufferOffset = 0;
  	sec_blob->WorkstationName.Length = 0;
  	sec_blob->WorkstationName.MaximumLength = 0;
  
  	/* Domain name is sent on the Challenge not Negotiate NTLMSSP request */
  	sec_blob->DomainName.BufferOffset = 0;
  	sec_blob->DomainName.Length = 0;
  	sec_blob->DomainName.MaximumLength = 0;
  }
b8da344b7   Jerome Marchand   cifs: dynamic all...
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
  static int size_of_ntlmssp_blob(struct cifs_ses *ses)
  {
  	int sz = sizeof(AUTHENTICATE_MESSAGE) + ses->auth_key.len
  		- CIFS_SESS_KEY_SIZE + CIFS_CPHTXT_SIZE + 2;
  
  	if (ses->domainName)
  		sz += 2 * strnlen(ses->domainName, CIFS_MAX_DOMAINNAME_LEN);
  	else
  		sz += 2;
  
  	if (ses->user_name)
  		sz += 2 * strnlen(ses->user_name, CIFS_MAX_USERNAME_LEN);
  	else
  		sz += 2;
  
  	return sz;
  }
  
  int build_ntlmssp_auth_blob(unsigned char **pbuffer,
89f150f40   Shirish Pargaonkar   Clean up two decl...
376
  					u16 *buflen,
96daf2b09   Steve French   [CIFS] Rename thr...
377
  				   struct cifs_ses *ses,
2b149f119   Shirish Pargaonkar   cifs NTLMv2/NTLMS...
378
  				   const struct nls_table *nls_cp)
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
379
  {
2b149f119   Shirish Pargaonkar   cifs NTLMv2/NTLMS...
380
  	int rc;
b8da344b7   Jerome Marchand   cifs: dynamic all...
381
  	AUTHENTICATE_MESSAGE *sec_blob;
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
382
383
  	__u32 flags;
  	unsigned char *tmp;
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
384

b8da344b7   Jerome Marchand   cifs: dynamic all...
385
386
387
388
389
390
391
392
393
  	rc = setup_ntlmv2_rsp(ses, nls_cp);
  	if (rc) {
  		cifs_dbg(VFS, "Error %d during NTLMSSP authentication
  ", rc);
  		*buflen = 0;
  		goto setup_ntlmv2_ret;
  	}
  	*pbuffer = kmalloc(size_of_ntlmssp_blob(ses), GFP_KERNEL);
  	sec_blob = (AUTHENTICATE_MESSAGE *)*pbuffer;
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
394
395
396
397
398
399
  	memcpy(sec_blob->Signature, NTLMSSP_SIGNATURE, 8);
  	sec_blob->MessageType = NtLmAuthenticate;
  
  	flags = NTLMSSP_NEGOTIATE_56 |
  		NTLMSSP_REQUEST_TARGET | NTLMSSP_NEGOTIATE_TARGET_INFO |
  		NTLMSSP_NEGOTIATE_128 | NTLMSSP_NEGOTIATE_UNICODE |
df8fbc241   Shirish Pargaonkar   cifs: Support NTL...
400
  		NTLMSSP_NEGOTIATE_NTLM | NTLMSSP_NEGOTIATE_EXTENDED_SEC;
38d77c50b   Jeff Layton   cifs: track the e...
401
  	if (ses->server->sign) {
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
402
  		flags |= NTLMSSP_NEGOTIATE_SIGN;
5c234aa5e   Shirish Pargaonkar   cifs: Add a varia...
403
404
  		if (!ses->server->session_estab ||
  				ses->ntlmssp->sesskey_per_smbsess)
62411ab2f   Shirish Pargaonkar   cifs: Fix signing...
405
406
  			flags |= NTLMSSP_NEGOTIATE_KEY_XCH;
  	}
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
407

b8da344b7   Jerome Marchand   cifs: dynamic all...
408
  	tmp = *pbuffer + sizeof(AUTHENTICATE_MESSAGE);
df8fbc241   Shirish Pargaonkar   cifs: Support NTL...
409
  	sec_blob->NegotiateFlags = cpu_to_le32(flags);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
410
411
412
413
414
  
  	sec_blob->LmChallengeResponse.BufferOffset =
  				cpu_to_le32(sizeof(AUTHENTICATE_MESSAGE));
  	sec_blob->LmChallengeResponse.Length = 0;
  	sec_blob->LmChallengeResponse.MaximumLength = 0;
b8da344b7   Jerome Marchand   cifs: dynamic all...
415
416
  	sec_blob->NtChallengeResponse.BufferOffset =
  				cpu_to_le32(tmp - *pbuffer);
cfda35d98   Stefan Metzmacher   fs/cifs: correctl...
417
  	if (ses->user_name != NULL) {
cfda35d98   Stefan Metzmacher   fs/cifs: correctl...
418
419
420
421
422
423
424
425
426
427
428
429
430
431
  		memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
  				ses->auth_key.len - CIFS_SESS_KEY_SIZE);
  		tmp += ses->auth_key.len - CIFS_SESS_KEY_SIZE;
  
  		sec_blob->NtChallengeResponse.Length =
  				cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE);
  		sec_blob->NtChallengeResponse.MaximumLength =
  				cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE);
  	} else {
  		/*
  		 * don't send an NT Response for anonymous access
  		 */
  		sec_blob->NtChallengeResponse.Length = 0;
  		sec_blob->NtChallengeResponse.MaximumLength = 0;
2b149f119   Shirish Pargaonkar   cifs NTLMv2/NTLMS...
432
  	}
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
433
434
  
  	if (ses->domainName == NULL) {
b8da344b7   Jerome Marchand   cifs: dynamic all...
435
  		sec_blob->DomainName.BufferOffset = cpu_to_le32(tmp - *pbuffer);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
436
437
438
439
440
  		sec_blob->DomainName.Length = 0;
  		sec_blob->DomainName.MaximumLength = 0;
  		tmp += 2;
  	} else {
  		int len;
acbbb76a2   Steve French   CIFS: Rename *UCS...
441
  		len = cifs_strtoUTF16((__le16 *)tmp, ses->domainName,
202d772ba   Jerome Marchand   cifs: use CIFS_MA...
442
  				      CIFS_MAX_DOMAINNAME_LEN, nls_cp);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
443
  		len *= 2; /* unicode is 2 bytes each */
b8da344b7   Jerome Marchand   cifs: dynamic all...
444
  		sec_blob->DomainName.BufferOffset = cpu_to_le32(tmp - *pbuffer);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
445
446
447
448
  		sec_blob->DomainName.Length = cpu_to_le16(len);
  		sec_blob->DomainName.MaximumLength = cpu_to_le16(len);
  		tmp += len;
  	}
8727c8a85   Steve French   Allow user names ...
449
  	if (ses->user_name == NULL) {
b8da344b7   Jerome Marchand   cifs: dynamic all...
450
  		sec_blob->UserName.BufferOffset = cpu_to_le32(tmp - *pbuffer);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
451
452
453
454
455
  		sec_blob->UserName.Length = 0;
  		sec_blob->UserName.MaximumLength = 0;
  		tmp += 2;
  	} else {
  		int len;
acbbb76a2   Steve French   CIFS: Rename *UCS...
456
  		len = cifs_strtoUTF16((__le16 *)tmp, ses->user_name,
8c3a2b4c4   Scott Lovenberg   cifs: Move string...
457
  				      CIFS_MAX_USERNAME_LEN, nls_cp);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
458
  		len *= 2; /* unicode is 2 bytes each */
b8da344b7   Jerome Marchand   cifs: dynamic all...
459
  		sec_blob->UserName.BufferOffset = cpu_to_le32(tmp - *pbuffer);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
460
461
462
463
  		sec_blob->UserName.Length = cpu_to_le16(len);
  		sec_blob->UserName.MaximumLength = cpu_to_le16(len);
  		tmp += len;
  	}
b8da344b7   Jerome Marchand   cifs: dynamic all...
464
  	sec_blob->WorkstationName.BufferOffset = cpu_to_le32(tmp - *pbuffer);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
465
466
467
  	sec_blob->WorkstationName.Length = 0;
  	sec_blob->WorkstationName.MaximumLength = 0;
  	tmp += 2;
df8fbc241   Shirish Pargaonkar   cifs: Support NTL...
468
469
470
  	if (((ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) ||
  		(ses->ntlmssp->server_flags & NTLMSSP_NEGOTIATE_EXTENDED_SEC))
  			&& !calc_seckey(ses)) {
d3686d54c   Shirish Pargaonkar   cifs: Cleanup and...
471
  		memcpy(tmp, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE);
b8da344b7   Jerome Marchand   cifs: dynamic all...
472
  		sec_blob->SessionKey.BufferOffset = cpu_to_le32(tmp - *pbuffer);
d2b915210   Shirish Pargaonkar   NTLM auth and sig...
473
474
475
476
477
  		sec_blob->SessionKey.Length = cpu_to_le16(CIFS_CPHTXT_SIZE);
  		sec_blob->SessionKey.MaximumLength =
  				cpu_to_le16(CIFS_CPHTXT_SIZE);
  		tmp += CIFS_CPHTXT_SIZE;
  	} else {
b8da344b7   Jerome Marchand   cifs: dynamic all...
478
  		sec_blob->SessionKey.BufferOffset = cpu_to_le32(tmp - *pbuffer);
d2b915210   Shirish Pargaonkar   NTLM auth and sig...
479
480
481
  		sec_blob->SessionKey.Length = 0;
  		sec_blob->SessionKey.MaximumLength = 0;
  	}
2b149f119   Shirish Pargaonkar   cifs NTLMv2/NTLMS...
482

b8da344b7   Jerome Marchand   cifs: dynamic all...
483
  	*buflen = tmp - *pbuffer;
2b149f119   Shirish Pargaonkar   cifs NTLMv2/NTLMS...
484
  setup_ntlmv2_ret:
89f150f40   Shirish Pargaonkar   Clean up two decl...
485
  	return rc;
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
486
  }
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
487

3f618223d   Jeff Layton   move sectype to t...
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
  enum securityEnum
  select_sectype(struct TCP_Server_Info *server, enum securityEnum requested)
  {
  	switch (server->negflavor) {
  	case CIFS_NEGFLAVOR_EXTENDED:
  		switch (requested) {
  		case Kerberos:
  		case RawNTLMSSP:
  			return requested;
  		case Unspecified:
  			if (server->sec_ntlmssp &&
  			    (global_secflags & CIFSSEC_MAY_NTLMSSP))
  				return RawNTLMSSP;
  			if ((server->sec_kerberos || server->sec_mskerberos) &&
  			    (global_secflags & CIFSSEC_MAY_KRB5))
  				return Kerberos;
  			/* Fallthrough */
  		default:
  			return Unspecified;
  		}
  	case CIFS_NEGFLAVOR_UNENCAP:
  		switch (requested) {
  		case NTLM:
  		case NTLMv2:
  			return requested;
  		case Unspecified:
  			if (global_secflags & CIFSSEC_MAY_NTLMV2)
  				return NTLMv2;
  			if (global_secflags & CIFSSEC_MAY_NTLM)
  				return NTLM;
3f618223d   Jeff Layton   move sectype to t...
518
  		default:
dde2356c8   Sachin Prabhu   cifs: Allow LANMA...
519
520
  			/* Fallthrough to attempt LANMAN authentication next */
  			break;
3f618223d   Jeff Layton   move sectype to t...
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
  		}
  	case CIFS_NEGFLAVOR_LANMAN:
  		switch (requested) {
  		case LANMAN:
  			return requested;
  		case Unspecified:
  			if (global_secflags & CIFSSEC_MAY_LANMAN)
  				return LANMAN;
  			/* Fallthrough */
  		default:
  			return Unspecified;
  		}
  	default:
  		return Unspecified;
  	}
  }
80a0e6375   Sachin Prabhu   cifs: Split lanma...
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
  struct sess_data {
  	unsigned int xid;
  	struct cifs_ses *ses;
  	struct nls_table *nls_cp;
  	void (*func)(struct sess_data *);
  	int result;
  
  	/* we will send the SMB in three pieces:
  	 * a fixed length beginning part, an optional
  	 * SPNEGO blob (which can be zero length), and a
  	 * last part which will include the strings
  	 * and rest of bcc area. This allows us to avoid
  	 * a large buffer 17K allocation
  	 */
  	int buf0_type;
  	struct kvec iov[3];
  };
  
  static int
  sess_alloc_buffer(struct sess_data *sess_data, int wct)
  {
  	int rc;
  	struct cifs_ses *ses = sess_data->ses;
  	struct smb_hdr *smb_buf;
  
  	rc = small_smb_init_no_tc(SMB_COM_SESSION_SETUP_ANDX, wct, ses,
  				  (void **)&smb_buf);
  
  	if (rc)
  		return rc;
  
  	sess_data->iov[0].iov_base = (char *)smb_buf;
  	sess_data->iov[0].iov_len = be32_to_cpu(smb_buf->smb_buf_length) + 4;
  	/*
  	 * This variable will be used to clear the buffer
  	 * allocated above in case of any error in the calling function.
  	 */
  	sess_data->buf0_type = CIFS_SMALL_BUFFER;
  
  	/* 2000 big enough to fit max user, domain, NOS name etc. */
  	sess_data->iov[2].iov_base = kmalloc(2000, GFP_KERNEL);
  	if (!sess_data->iov[2].iov_base) {
  		rc = -ENOMEM;
  		goto out_free_smb_buf;
  	}
  
  	return 0;
  
  out_free_smb_buf:
  	kfree(smb_buf);
  	sess_data->iov[0].iov_base = NULL;
  	sess_data->iov[0].iov_len = 0;
  	sess_data->buf0_type = CIFS_NO_BUFFER;
  	return rc;
  }
  
  static void
  sess_free_buffer(struct sess_data *sess_data)
  {
  
  	free_rsp_buf(sess_data->buf0_type, sess_data->iov[0].iov_base);
  	sess_data->buf0_type = CIFS_NO_BUFFER;
  	kfree(sess_data->iov[2].iov_base);
  }
  
  static int
  sess_establish_session(struct sess_data *sess_data)
  {
  	struct cifs_ses *ses = sess_data->ses;
  
  	mutex_lock(&ses->server->srv_mutex);
  	if (!ses->server->session_estab) {
  		if (ses->server->sign) {
  			ses->server->session_key.response =
  				kmemdup(ses->auth_key.response,
  				ses->auth_key.len, GFP_KERNEL);
  			if (!ses->server->session_key.response) {
  				mutex_unlock(&ses->server->srv_mutex);
  				return -ENOMEM;
  			}
  			ses->server->session_key.len =
  						ses->auth_key.len;
  		}
  		ses->server->sequence_number = 0x2;
  		ses->server->session_estab = true;
  	}
  	mutex_unlock(&ses->server->srv_mutex);
  
  	cifs_dbg(FYI, "CIFS session established successfully
  ");
  	spin_lock(&GlobalMid_Lock);
  	ses->status = CifsGood;
  	ses->need_reconnect = false;
  	spin_unlock(&GlobalMid_Lock);
  
  	return 0;
  }
  
  static int
  sess_sendreceive(struct sess_data *sess_data)
  {
  	int rc;
  	struct smb_hdr *smb_buf = (struct smb_hdr *) sess_data->iov[0].iov_base;
  	__u16 count;
  
  	count = sess_data->iov[1].iov_len + sess_data->iov[2].iov_len;
  	smb_buf->smb_buf_length =
  		cpu_to_be32(be32_to_cpu(smb_buf->smb_buf_length) + count);
  	put_bcc(count, smb_buf);
  
  	rc = SendReceive2(sess_data->xid, sess_data->ses,
  			  sess_data->iov, 3 /* num_iovecs */,
  			  &sess_data->buf0_type,
  			  CIFS_LOG_ERROR);
  
  	return rc;
  }
  
  /*
   * LANMAN and plaintext are less secure and off by default.
   * So we make this explicitly be turned on in kconfig (in the
   * build) and turned on at runtime (changed from the default)
   * in proc/fs/cifs or via mount parm.  Unfortunately this is
   * needed for old Win (e.g. Win95), some obscure NAS and OS/2
   */
  #ifdef CONFIG_CIFS_WEAK_PW_HASH
  static void
  sess_auth_lanman(struct sess_data *sess_data)
  {
  	int rc = 0;
  	struct smb_hdr *smb_buf;
  	SESSION_SETUP_ANDX *pSMB;
  	char *bcc_ptr;
  	struct cifs_ses *ses = sess_data->ses;
  	char lnm_session_key[CIFS_AUTH_RESP_SIZE];
  	__u32 capabilities;
  	__u16 bytes_remaining;
  
  	/* lanman 2 style sessionsetup */
  	/* wct = 10 */
  	rc = sess_alloc_buffer(sess_data, 10);
  	if (rc)
  		goto out;
  
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	bcc_ptr = sess_data->iov[2].iov_base;
  	capabilities = cifs_ssetup_hdr(ses, pSMB);
  
  	pSMB->req.hdr.Flags2 &= ~SMBFLG2_UNICODE;
fa8f3a354   Stefan Metzmacher   fs/cifs: correctl...
686
687
688
  	if (ses->user_name != NULL) {
  		/* no capabilities flags in old lanman negotiation */
  		pSMB->old_req.PasswordLength = cpu_to_le16(CIFS_AUTH_RESP_SIZE);
80a0e6375   Sachin Prabhu   cifs: Split lanma...
689

fa8f3a354   Stefan Metzmacher   fs/cifs: correctl...
690
691
692
693
694
695
696
697
  		/* Calculate hash with password and copy into bcc_ptr.
  		 * Encryption Key (stored as in cryptkey) gets used if the
  		 * security mode bit in Negottiate Protocol response states
  		 * to use challenge/response method (i.e. Password bit is 1).
  		 */
  		rc = calc_lanman_hash(ses->password, ses->server->cryptkey,
  				      ses->server->sec_mode & SECMODE_PW_ENCRYPT ?
  				      true : false, lnm_session_key);
a6b6befbb   Luis de Bethencourt   cifs: check hash ...
698
699
  		if (rc)
  			goto out;
80a0e6375   Sachin Prabhu   cifs: Split lanma...
700

fa8f3a354   Stefan Metzmacher   fs/cifs: correctl...
701
702
703
704
705
  		memcpy(bcc_ptr, (char *)lnm_session_key, CIFS_AUTH_RESP_SIZE);
  		bcc_ptr += CIFS_AUTH_RESP_SIZE;
  	} else {
  		pSMB->old_req.PasswordLength = 0;
  	}
80a0e6375   Sachin Prabhu   cifs: Split lanma...
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
  
  	/*
  	 * can not sign if LANMAN negotiated so no need
  	 * to calculate signing key? but what if server
  	 * changed to do higher than lanman dialect and
  	 * we reconnected would we ever calc signing_key?
  	 */
  
  	cifs_dbg(FYI, "Negotiating LANMAN setting up strings
  ");
  	/* Unicode not allowed for LANMAN dialects */
  	ascii_ssetup_strings(&bcc_ptr, ses, sess_data->nls_cp);
  
  	sess_data->iov[2].iov_len = (long) bcc_ptr -
  			(long) sess_data->iov[2].iov_base;
  
  	rc = sess_sendreceive(sess_data);
  	if (rc)
  		goto out;
  
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	smb_buf = (struct smb_hdr *)sess_data->iov[0].iov_base;
  
  	/* lanman response has a word count of 3 */
  	if (smb_buf->WordCount != 3) {
  		rc = -EIO;
  		cifs_dbg(VFS, "bad word count %d
  ", smb_buf->WordCount);
  		goto out;
  	}
  
  	if (le16_to_cpu(pSMB->resp.Action) & GUEST_LOGIN)
  		cifs_dbg(FYI, "Guest login
  "); /* BB mark SesInfo struct? */
  
  	ses->Suid = smb_buf->Uid;   /* UID left in wire format (le) */
  	cifs_dbg(FYI, "UID = %llu
  ", ses->Suid);
  
  	bytes_remaining = get_bcc(smb_buf);
  	bcc_ptr = pByteArea(smb_buf);
  
  	/* BB check if Unicode and decode strings */
  	if (bytes_remaining == 0) {
  		/* no string area to decode, do nothing */
  	} else if (smb_buf->Flags2 & SMBFLG2_UNICODE) {
  		/* unicode string area must be word-aligned */
  		if (((unsigned long) bcc_ptr - (unsigned long) smb_buf) % 2) {
  			++bcc_ptr;
  			--bytes_remaining;
  		}
  		decode_unicode_ssetup(&bcc_ptr, bytes_remaining, ses,
  				      sess_data->nls_cp);
  	} else {
  		decode_ascii_ssetup(&bcc_ptr, bytes_remaining, ses,
  				    sess_data->nls_cp);
  	}
  
  	rc = sess_establish_session(sess_data);
  out:
  	sess_data->result = rc;
  	sess_data->func = NULL;
  	sess_free_buffer(sess_data);
  }
80a0e6375   Sachin Prabhu   cifs: Split lanma...
770
  #endif
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
  static void
  sess_auth_ntlm(struct sess_data *sess_data)
  {
  	int rc = 0;
  	struct smb_hdr *smb_buf;
  	SESSION_SETUP_ANDX *pSMB;
  	char *bcc_ptr;
  	struct cifs_ses *ses = sess_data->ses;
  	__u32 capabilities;
  	__u16 bytes_remaining;
  
  	/* old style NTLM sessionsetup */
  	/* wct = 13 */
  	rc = sess_alloc_buffer(sess_data, 13);
  	if (rc)
  		goto out;
  
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	bcc_ptr = sess_data->iov[2].iov_base;
  	capabilities = cifs_ssetup_hdr(ses, pSMB);
  
  	pSMB->req_no_secext.Capabilities = cpu_to_le32(capabilities);
777f69b8d   Stefan Metzmacher   fs/cifs: correctl...
793
794
795
796
797
798
799
800
801
802
803
804
805
806
  	if (ses->user_name != NULL) {
  		pSMB->req_no_secext.CaseInsensitivePasswordLength =
  				cpu_to_le16(CIFS_AUTH_RESP_SIZE);
  		pSMB->req_no_secext.CaseSensitivePasswordLength =
  				cpu_to_le16(CIFS_AUTH_RESP_SIZE);
  
  		/* calculate ntlm response and session key */
  		rc = setup_ntlm_response(ses, sess_data->nls_cp);
  		if (rc) {
  			cifs_dbg(VFS, "Error %d during NTLM authentication
  ",
  					 rc);
  			goto out;
  		}
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
807

777f69b8d   Stefan Metzmacher   fs/cifs: correctl...
808
809
810
811
812
813
814
815
816
817
818
  		/* copy ntlm response */
  		memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
  				CIFS_AUTH_RESP_SIZE);
  		bcc_ptr += CIFS_AUTH_RESP_SIZE;
  		memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
  				CIFS_AUTH_RESP_SIZE);
  		bcc_ptr += CIFS_AUTH_RESP_SIZE;
  	} else {
  		pSMB->req_no_secext.CaseInsensitivePasswordLength = 0;
  		pSMB->req_no_secext.CaseSensitivePasswordLength = 0;
  	}
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
  
  	if (ses->capabilities & CAP_UNICODE) {
  		/* unicode strings must be word aligned */
  		if (sess_data->iov[0].iov_len % 2) {
  			*bcc_ptr = 0;
  			bcc_ptr++;
  		}
  		unicode_ssetup_strings(&bcc_ptr, ses, sess_data->nls_cp);
  	} else {
  		ascii_ssetup_strings(&bcc_ptr, ses, sess_data->nls_cp);
  	}
  
  
  	sess_data->iov[2].iov_len = (long) bcc_ptr -
  			(long) sess_data->iov[2].iov_base;
  
  	rc = sess_sendreceive(sess_data);
  	if (rc)
  		goto out;
  
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	smb_buf = (struct smb_hdr *)sess_data->iov[0].iov_base;
  
  	if (smb_buf->WordCount != 3) {
  		rc = -EIO;
  		cifs_dbg(VFS, "bad word count %d
  ", smb_buf->WordCount);
  		goto out;
  	}
  
  	if (le16_to_cpu(pSMB->resp.Action) & GUEST_LOGIN)
  		cifs_dbg(FYI, "Guest login
  "); /* BB mark SesInfo struct? */
  
  	ses->Suid = smb_buf->Uid;   /* UID left in wire format (le) */
  	cifs_dbg(FYI, "UID = %llu
  ", ses->Suid);
  
  	bytes_remaining = get_bcc(smb_buf);
  	bcc_ptr = pByteArea(smb_buf);
  
  	/* BB check if Unicode and decode strings */
  	if (bytes_remaining == 0) {
  		/* no string area to decode, do nothing */
  	} else if (smb_buf->Flags2 & SMBFLG2_UNICODE) {
  		/* unicode string area must be word-aligned */
  		if (((unsigned long) bcc_ptr - (unsigned long) smb_buf) % 2) {
  			++bcc_ptr;
  			--bytes_remaining;
  		}
  		decode_unicode_ssetup(&bcc_ptr, bytes_remaining, ses,
  				      sess_data->nls_cp);
  	} else {
  		decode_ascii_ssetup(&bcc_ptr, bytes_remaining, ses,
  				    sess_data->nls_cp);
  	}
  
  	rc = sess_establish_session(sess_data);
  out:
  	sess_data->result = rc;
  	sess_data->func = NULL;
  	sess_free_buffer(sess_data);
  	kfree(ses->auth_key.response);
  	ses->auth_key.response = NULL;
  }
  
  static void
  sess_auth_ntlmv2(struct sess_data *sess_data)
  {
  	int rc = 0;
  	struct smb_hdr *smb_buf;
  	SESSION_SETUP_ANDX *pSMB;
  	char *bcc_ptr;
  	struct cifs_ses *ses = sess_data->ses;
  	__u32 capabilities;
  	__u16 bytes_remaining;
  
  	/* old style NTLM sessionsetup */
  	/* wct = 13 */
  	rc = sess_alloc_buffer(sess_data, 13);
  	if (rc)
  		goto out;
  
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	bcc_ptr = sess_data->iov[2].iov_base;
  	capabilities = cifs_ssetup_hdr(ses, pSMB);
  
  	pSMB->req_no_secext.Capabilities = cpu_to_le32(capabilities);
  
  	/* LM2 password would be here if we supported it */
  	pSMB->req_no_secext.CaseInsensitivePasswordLength = 0;
1a967d6c9   Stefan Metzmacher   fs/cifs: correctl...
910
911
912
913
914
915
916
917
  	if (ses->user_name != NULL) {
  		/* calculate nlmv2 response and session key */
  		rc = setup_ntlmv2_rsp(ses, sess_data->nls_cp);
  		if (rc) {
  			cifs_dbg(VFS, "Error %d during NTLMv2 authentication
  ", rc);
  			goto out;
  		}
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
918

1a967d6c9   Stefan Metzmacher   fs/cifs: correctl...
919
920
921
  		memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
  				ses->auth_key.len - CIFS_SESS_KEY_SIZE);
  		bcc_ptr += ses->auth_key.len - CIFS_SESS_KEY_SIZE;
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
922

1a967d6c9   Stefan Metzmacher   fs/cifs: correctl...
923
924
925
926
927
928
929
930
  		/* set case sensitive password length after tilen may get
  		 * assigned, tilen is 0 otherwise.
  		 */
  		pSMB->req_no_secext.CaseSensitivePasswordLength =
  			cpu_to_le16(ses->auth_key.len - CIFS_SESS_KEY_SIZE);
  	} else {
  		pSMB->req_no_secext.CaseSensitivePasswordLength = 0;
  	}
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
  
  	if (ses->capabilities & CAP_UNICODE) {
  		if (sess_data->iov[0].iov_len % 2) {
  			*bcc_ptr = 0;
  			bcc_ptr++;
  		}
  		unicode_ssetup_strings(&bcc_ptr, ses, sess_data->nls_cp);
  	} else {
  		ascii_ssetup_strings(&bcc_ptr, ses, sess_data->nls_cp);
  	}
  
  
  	sess_data->iov[2].iov_len = (long) bcc_ptr -
  			(long) sess_data->iov[2].iov_base;
  
  	rc = sess_sendreceive(sess_data);
  	if (rc)
  		goto out;
  
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	smb_buf = (struct smb_hdr *)sess_data->iov[0].iov_base;
  
  	if (smb_buf->WordCount != 3) {
  		rc = -EIO;
  		cifs_dbg(VFS, "bad word count %d
  ", smb_buf->WordCount);
  		goto out;
  	}
  
  	if (le16_to_cpu(pSMB->resp.Action) & GUEST_LOGIN)
  		cifs_dbg(FYI, "Guest login
  "); /* BB mark SesInfo struct? */
  
  	ses->Suid = smb_buf->Uid;   /* UID left in wire format (le) */
  	cifs_dbg(FYI, "UID = %llu
  ", ses->Suid);
  
  	bytes_remaining = get_bcc(smb_buf);
  	bcc_ptr = pByteArea(smb_buf);
  
  	/* BB check if Unicode and decode strings */
  	if (bytes_remaining == 0) {
  		/* no string area to decode, do nothing */
  	} else if (smb_buf->Flags2 & SMBFLG2_UNICODE) {
  		/* unicode string area must be word-aligned */
  		if (((unsigned long) bcc_ptr - (unsigned long) smb_buf) % 2) {
  			++bcc_ptr;
  			--bytes_remaining;
  		}
  		decode_unicode_ssetup(&bcc_ptr, bytes_remaining, ses,
  				      sess_data->nls_cp);
  	} else {
  		decode_ascii_ssetup(&bcc_ptr, bytes_remaining, ses,
  				    sess_data->nls_cp);
  	}
  
  	rc = sess_establish_session(sess_data);
  out:
  	sess_data->result = rc;
  	sess_data->func = NULL;
  	sess_free_buffer(sess_data);
  	kfree(ses->auth_key.response);
  	ses->auth_key.response = NULL;
  }
ee03c646d   Sachin Prabhu   cifs: Split Kerbe...
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
  #ifdef CONFIG_CIFS_UPCALL
  static void
  sess_auth_kerberos(struct sess_data *sess_data)
  {
  	int rc = 0;
  	struct smb_hdr *smb_buf;
  	SESSION_SETUP_ANDX *pSMB;
  	char *bcc_ptr;
  	struct cifs_ses *ses = sess_data->ses;
  	__u32 capabilities;
  	__u16 bytes_remaining;
  	struct key *spnego_key = NULL;
  	struct cifs_spnego_msg *msg;
  	u16 blob_len;
  
  	/* extended security */
  	/* wct = 12 */
  	rc = sess_alloc_buffer(sess_data, 12);
  	if (rc)
  		goto out;
  
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	bcc_ptr = sess_data->iov[2].iov_base;
  	capabilities = cifs_ssetup_hdr(ses, pSMB);
  
  	spnego_key = cifs_get_spnego_key(ses);
  	if (IS_ERR(spnego_key)) {
  		rc = PTR_ERR(spnego_key);
  		spnego_key = NULL;
  		goto out;
  	}
146aa8b14   David Howells   KEYS: Merge the t...
1026
  	msg = spnego_key->payload.data[0];
ee03c646d   Sachin Prabhu   cifs: Split Kerbe...
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
  	/*
  	 * check version field to make sure that cifs.upcall is
  	 * sending us a response in an expected form
  	 */
  	if (msg->version != CIFS_SPNEGO_UPCALL_VERSION) {
  		cifs_dbg(VFS,
  		  "incorrect version of cifs.upcall (expected %d but got %d)",
  			      CIFS_SPNEGO_UPCALL_VERSION, msg->version);
  		rc = -EKEYREJECTED;
  		goto out_put_spnego_key;
  	}
  
  	ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len,
  					 GFP_KERNEL);
  	if (!ses->auth_key.response) {
  		cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory",
  				msg->sesskey_len);
  		rc = -ENOMEM;
  		goto out_put_spnego_key;
  	}
  	ses->auth_key.len = msg->sesskey_len;
  
  	pSMB->req.hdr.Flags2 |= SMBFLG2_EXT_SEC;
  	capabilities |= CAP_EXTENDED_SECURITY;
  	pSMB->req.Capabilities = cpu_to_le32(capabilities);
  	sess_data->iov[1].iov_base = msg->data + msg->sesskey_len;
  	sess_data->iov[1].iov_len = msg->secblob_len;
  	pSMB->req.SecurityBlobLength = cpu_to_le16(sess_data->iov[1].iov_len);
  
  	if (ses->capabilities & CAP_UNICODE) {
  		/* unicode strings must be word aligned */
  		if ((sess_data->iov[0].iov_len
  			+ sess_data->iov[1].iov_len) % 2) {
  			*bcc_ptr = 0;
  			bcc_ptr++;
  		}
  		unicode_oslm_strings(&bcc_ptr, sess_data->nls_cp);
  		unicode_domain_string(&bcc_ptr, ses, sess_data->nls_cp);
  	} else {
  		/* BB: is this right? */
  		ascii_ssetup_strings(&bcc_ptr, ses, sess_data->nls_cp);
  	}
  
  	sess_data->iov[2].iov_len = (long) bcc_ptr -
  			(long) sess_data->iov[2].iov_base;
  
  	rc = sess_sendreceive(sess_data);
  	if (rc)
  		goto out_put_spnego_key;
  
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	smb_buf = (struct smb_hdr *)sess_data->iov[0].iov_base;
  
  	if (smb_buf->WordCount != 4) {
  		rc = -EIO;
  		cifs_dbg(VFS, "bad word count %d
  ", smb_buf->WordCount);
  		goto out_put_spnego_key;
  	}
  
  	if (le16_to_cpu(pSMB->resp.Action) & GUEST_LOGIN)
  		cifs_dbg(FYI, "Guest login
  "); /* BB mark SesInfo struct? */
  
  	ses->Suid = smb_buf->Uid;   /* UID left in wire format (le) */
  	cifs_dbg(FYI, "UID = %llu
  ", ses->Suid);
  
  	bytes_remaining = get_bcc(smb_buf);
  	bcc_ptr = pByteArea(smb_buf);
  
  	blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);
  	if (blob_len > bytes_remaining) {
  		cifs_dbg(VFS, "bad security blob length %d
  ",
  				blob_len);
  		rc = -EINVAL;
  		goto out_put_spnego_key;
  	}
  	bcc_ptr += blob_len;
  	bytes_remaining -= blob_len;
  
  	/* BB check if Unicode and decode strings */
  	if (bytes_remaining == 0) {
  		/* no string area to decode, do nothing */
  	} else if (smb_buf->Flags2 & SMBFLG2_UNICODE) {
  		/* unicode string area must be word-aligned */
  		if (((unsigned long) bcc_ptr - (unsigned long) smb_buf) % 2) {
  			++bcc_ptr;
  			--bytes_remaining;
  		}
  		decode_unicode_ssetup(&bcc_ptr, bytes_remaining, ses,
  				      sess_data->nls_cp);
  	} else {
  		decode_ascii_ssetup(&bcc_ptr, bytes_remaining, ses,
  				    sess_data->nls_cp);
  	}
  
  	rc = sess_establish_session(sess_data);
  out_put_spnego_key:
  	key_invalidate(spnego_key);
  	key_put(spnego_key);
  out:
  	sess_data->result = rc;
  	sess_data->func = NULL;
  	sess_free_buffer(sess_data);
  	kfree(ses->auth_key.response);
  	ses->auth_key.response = NULL;
  }
ee03c646d   Sachin Prabhu   cifs: Split Kerbe...
1136
  #endif /* ! CONFIG_CIFS_UPCALL */
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
1137

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1138
1139
1140
1141
1142
1143
  /*
   * The required kvec buffers have to be allocated before calling this
   * function.
   */
  static int
  _sess_auth_rawntlmssp_assemble_req(struct sess_data *sess_data)
3979877e5   Steve French   [CIFS] Support fo...
1144
  {
3979877e5   Steve French   [CIFS] Support fo...
1145
  	struct smb_hdr *smb_buf;
3979877e5   Steve French   [CIFS] Support fo...
1146
  	SESSION_SETUP_ANDX *pSMB;
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1147
  	struct cifs_ses *ses = sess_data->ses;
3979877e5   Steve French   [CIFS] Support fo...
1148
  	__u32 capabilities;
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1149
  	char *bcc_ptr;
254e55ed0   Steve French   CIFS] Support for...
1150

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1151
1152
1153
1154
1155
1156
1157
1158
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	smb_buf = (struct smb_hdr *)pSMB;
  
  	capabilities = cifs_ssetup_hdr(ses, pSMB);
  	if ((pSMB->req.hdr.Flags2 & SMBFLG2_UNICODE) == 0) {
  		cifs_dbg(VFS, "NTLMSSP requires Unicode support
  ");
  		return -ENOSYS;
3534b8508   Jeff Layton   cifs: throw a war...
1159
  	}
3979877e5   Steve French   [CIFS] Support fo...
1160

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1161
1162
1163
  	pSMB->req.hdr.Flags2 |= SMBFLG2_EXT_SEC;
  	capabilities |= CAP_EXTENDED_SECURITY;
  	pSMB->req.Capabilities |= cpu_to_le32(capabilities);
80a0e6375   Sachin Prabhu   cifs: Split lanma...
1164

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1165
1166
1167
1168
1169
  	bcc_ptr = sess_data->iov[2].iov_base;
  	/* unicode strings must be word aligned */
  	if ((sess_data->iov[0].iov_len + sess_data->iov[1].iov_len) % 2) {
  		*bcc_ptr = 0;
  		bcc_ptr++;
3f618223d   Jeff Layton   move sectype to t...
1170
  	}
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1171
  	unicode_oslm_strings(&bcc_ptr, sess_data->nls_cp);
3f618223d   Jeff Layton   move sectype to t...
1172

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1173
1174
  	sess_data->iov[2].iov_len = (long) bcc_ptr -
  					(long) sess_data->iov[2].iov_base;
80a0e6375   Sachin Prabhu   cifs: Split lanma...
1175

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
  	return 0;
  }
  
  static void
  sess_auth_rawntlmssp_authenticate(struct sess_data *sess_data);
  
  static void
  sess_auth_rawntlmssp_negotiate(struct sess_data *sess_data)
  {
  	int rc;
  	struct smb_hdr *smb_buf;
  	SESSION_SETUP_ANDX *pSMB;
  	struct cifs_ses *ses = sess_data->ses;
  	__u16 bytes_remaining;
  	char *bcc_ptr;
  	u16 blob_len;
  
  	cifs_dbg(FYI, "rawntlmssp session setup negotiate phase
  ");
5c234aa5e   Shirish Pargaonkar   cifs: Add a varia...
1195

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1196
1197
1198
1199
1200
1201
1202
1203
  	/*
  	 * if memory allocation is successful, caller of this function
  	 * frees it.
  	 */
  	ses->ntlmssp = kmalloc(sizeof(struct ntlmssp_auth), GFP_KERNEL);
  	if (!ses->ntlmssp) {
  		rc = -ENOMEM;
  		goto out;
d3686d54c   Shirish Pargaonkar   cifs: Cleanup and...
1204
  	}
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1205
  	ses->ntlmssp->sesskey_per_smbsess = false;
d3686d54c   Shirish Pargaonkar   cifs: Cleanup and...
1206

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1207
1208
1209
1210
  	/* wct = 12 */
  	rc = sess_alloc_buffer(sess_data, 12);
  	if (rc)
  		goto out;
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
1211

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1212
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
3979877e5   Steve French   [CIFS] Support fo...
1213

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1214
1215
1216
1217
1218
1219
1220
  	/* Build security blob before we assemble the request */
  	build_ntlmssp_negotiate_blob(pSMB->req.SecurityBlob, ses);
  	sess_data->iov[1].iov_len = sizeof(NEGOTIATE_MESSAGE);
  	sess_data->iov[1].iov_base = pSMB->req.SecurityBlob;
  	pSMB->req.SecurityBlobLength = cpu_to_le16(sizeof(NEGOTIATE_MESSAGE));
  
  	rc = _sess_auth_rawntlmssp_assemble_req(sess_data);
790fe579f   Steve French   [CIFS] more white...
1221
  	if (rc)
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1222
  		goto out;
3979877e5   Steve French   [CIFS] Support fo...
1223

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1224
  	rc = sess_sendreceive(sess_data);
3979877e5   Steve French   [CIFS] Support fo...
1225

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1226
1227
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	smb_buf = (struct smb_hdr *)sess_data->iov[0].iov_base;
750d1151a   Steve French   [CIFS] Fix alloca...
1228

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1229
1230
1231
1232
1233
  	/* If true, rc here is expected and not an error */
  	if (sess_data->buf0_type != CIFS_NO_BUFFER &&
  	    smb_buf->Status.CifsError ==
  			cpu_to_le32(NT_STATUS_MORE_PROCESSING_REQUIRED))
  		rc = 0;
2442421b1   Steve French   [CIFS] Have CIFS_...
1234

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
  	if (rc)
  		goto out;
  
  	cifs_dbg(FYI, "rawntlmssp session setup challenge phase
  ");
  
  	if (smb_buf->WordCount != 4) {
  		rc = -EIO;
  		cifs_dbg(VFS, "bad word count %d
  ", smb_buf->WordCount);
  		goto out;
5e6e62327   Cyrill Gorcunov   [CIFS] Check retu...
1246
  	}
3979877e5   Steve French   [CIFS] Support fo...
1247

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1248
1249
1250
  	ses->Suid = smb_buf->Uid;   /* UID left in wire format (le) */
  	cifs_dbg(FYI, "UID = %llu
  ", ses->Suid);
2442421b1   Steve French   [CIFS] Have CIFS_...
1251

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1252
1253
  	bytes_remaining = get_bcc(smb_buf);
  	bcc_ptr = pByteArea(smb_buf);
b4d6fcf13   Jeff Layton   cifs: move "ntlms...
1254

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1255
1256
1257
1258
1259
1260
1261
1262
  	blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);
  	if (blob_len > bytes_remaining) {
  		cifs_dbg(VFS, "bad security blob length %d
  ",
  				blob_len);
  		rc = -EINVAL;
  		goto out;
  	}
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
1263

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1264
1265
1266
1267
1268
1269
1270
  	rc = decode_ntlmssp_challenge(bcc_ptr, blob_len, ses);
  out:
  	sess_free_buffer(sess_data);
  
  	if (!rc) {
  		sess_data->func = sess_auth_rawntlmssp_authenticate;
  		return;
3979877e5   Steve French   [CIFS] Support fo...
1271
  	}
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1272
1273
1274
1275
1276
  	/* Else error. Cleanup */
  	kfree(ses->auth_key.response);
  	ses->auth_key.response = NULL;
  	kfree(ses->ntlmssp);
  	ses->ntlmssp = NULL;
2442421b1   Steve French   [CIFS] Have CIFS_...
1277

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1278
1279
1280
  	sess_data->func = NULL;
  	sess_data->result = rc;
  }
3979877e5   Steve French   [CIFS] Support fo...
1281

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1282
1283
1284
1285
1286
1287
1288
1289
1290
  static void
  sess_auth_rawntlmssp_authenticate(struct sess_data *sess_data)
  {
  	int rc;
  	struct smb_hdr *smb_buf;
  	SESSION_SETUP_ANDX *pSMB;
  	struct cifs_ses *ses = sess_data->ses;
  	__u16 bytes_remaining;
  	char *bcc_ptr;
b8da344b7   Jerome Marchand   cifs: dynamic all...
1291
  	unsigned char *ntlmsspblob = NULL;
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1292
  	u16 blob_len;
3979877e5   Steve French   [CIFS] Support fo...
1293

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1294
1295
  	cifs_dbg(FYI, "rawntlmssp session setup authenticate phase
  ");
3979877e5   Steve French   [CIFS] Support fo...
1296

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1297
1298
1299
1300
  	/* wct = 12 */
  	rc = sess_alloc_buffer(sess_data, 12);
  	if (rc)
  		goto out;
3979877e5   Steve French   [CIFS] Support fo...
1301

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1302
1303
1304
  	/* Build security blob before we assemble the request */
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	smb_buf = (struct smb_hdr *)pSMB;
b8da344b7   Jerome Marchand   cifs: dynamic all...
1305
  	rc = build_ntlmssp_auth_blob(&ntlmsspblob,
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
  					&blob_len, ses, sess_data->nls_cp);
  	if (rc)
  		goto out_free_ntlmsspblob;
  	sess_data->iov[1].iov_len = blob_len;
  	sess_data->iov[1].iov_base = ntlmsspblob;
  	pSMB->req.SecurityBlobLength = cpu_to_le16(blob_len);
  	/*
  	 * Make sure that we tell the server that we are using
  	 * the uid that it just gave us back on the response
  	 * (challenge)
  	 */
  	smb_buf->Uid = ses->Suid;
  
  	rc = _sess_auth_rawntlmssp_assemble_req(sess_data);
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
1320
  	if (rc)
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1321
  		goto out_free_ntlmsspblob;
0b3cc8580   Steve French   [CIFS] NTLMSSP re...
1322

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1323
1324
1325
1326
1327
1328
  	rc = sess_sendreceive(sess_data);
  	if (rc)
  		goto out_free_ntlmsspblob;
  
  	pSMB = (SESSION_SETUP_ANDX *)sess_data->iov[0].iov_base;
  	smb_buf = (struct smb_hdr *)sess_data->iov[0].iov_base;
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
1329
  	if (smb_buf->WordCount != 4) {
3979877e5   Steve French   [CIFS] Support fo...
1330
  		rc = -EIO;
f96637be0   Joe Perches   [CIFS] cifs: Rena...
1331
1332
  		cifs_dbg(VFS, "bad word count %d
  ", smb_buf->WordCount);
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1333
  		goto out_free_ntlmsspblob;
3979877e5   Steve French   [CIFS] Support fo...
1334
  	}
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1335
1336
  
  	if (le16_to_cpu(pSMB->resp.Action) & GUEST_LOGIN)
f96637be0   Joe Perches   [CIFS] cifs: Rena...
1337
1338
  		cifs_dbg(FYI, "Guest login
  "); /* BB mark SesInfo struct? */
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1339

ee9bbf465   Sachin Prabhu   Set UID in sess_a...
1340
1341
1342
1343
1344
  	if (ses->Suid != smb_buf->Uid) {
  		ses->Suid = smb_buf->Uid;
  		cifs_dbg(FYI, "UID changed! new UID = %llu
  ", ses->Suid);
  	}
690c522fa   Jeff Layton   cifs: use get/put...
1345
  	bytes_remaining = get_bcc(smb_buf);
3979877e5   Steve French   [CIFS] Support fo...
1346
  	bcc_ptr = pByteArea(smb_buf);
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
1347
1348
1349
1350
  	blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);
  	if (blob_len > bytes_remaining) {
  		cifs_dbg(VFS, "bad security blob length %d
  ",
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1351
  				blob_len);
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
1352
  		rc = -EINVAL;
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1353
  		goto out_free_ntlmsspblob;
790fe579f   Steve French   [CIFS] more white...
1354
  	}
583cf7afc   Sachin Prabhu   cifs: Split ntlm ...
1355
1356
  	bcc_ptr += blob_len;
  	bytes_remaining -= blob_len;
3979877e5   Steve French   [CIFS] Support fo...
1357

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1358

3979877e5   Steve French   [CIFS] Support fo...
1359
  	/* BB check if Unicode and decode strings */
fcda7f457   Jeff Layton   cifs: check for b...
1360
1361
1362
  	if (bytes_remaining == 0) {
  		/* no string area to decode, do nothing */
  	} else if (smb_buf->Flags2 & SMBFLG2_UNICODE) {
27b87fe52   Jeff Layton   cifs: fix unicode...
1363
1364
1365
1366
1367
  		/* unicode string area must be word-aligned */
  		if (((unsigned long) bcc_ptr - (unsigned long) smb_buf) % 2) {
  			++bcc_ptr;
  			--bytes_remaining;
  		}
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1368
1369
  		decode_unicode_ssetup(&bcc_ptr, bytes_remaining, ses,
  				      sess_data->nls_cp);
27b87fe52   Jeff Layton   cifs: fix unicode...
1370
  	} else {
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1371
1372
  		decode_ascii_ssetup(&bcc_ptr, bytes_remaining, ses,
  				    sess_data->nls_cp);
27b87fe52   Jeff Layton   cifs: fix unicode...
1373
  	}
50c2f7538   Steve French   [CIFS] whitespace...
1374

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1375
  out_free_ntlmsspblob:
2b149f119   Shirish Pargaonkar   cifs NTLMv2/NTLMS...
1376
  	kfree(ntlmsspblob);
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1377
1378
  out:
  	sess_free_buffer(sess_data);
d4e63bd6e   Shirish Pargaonkar   cifs: Process pos...
1379

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1380
1381
  	 if (!rc)
  		rc = sess_establish_session(sess_data);
d4e63bd6e   Shirish Pargaonkar   cifs: Process pos...
1382

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1383
  	/* Cleanup */
d4e63bd6e   Shirish Pargaonkar   cifs: Process pos...
1384
1385
1386
  	kfree(ses->auth_key.response);
  	ses->auth_key.response = NULL;
  	kfree(ses->ntlmssp);
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1387
  	ses->ntlmssp = NULL;
d4e63bd6e   Shirish Pargaonkar   cifs: Process pos...
1388

cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1389
1390
1391
  	sess_data->func = NULL;
  	sess_data->result = rc;
  }
80a0e6375   Sachin Prabhu   cifs: Split lanma...
1392

27924075b   Steve French   Remove sparse bui...
1393
  static int select_sec(struct cifs_ses *ses, struct sess_data *sess_data)
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
  {
  	int type;
  
  	type = select_sectype(ses->server, ses->sectype);
  	cifs_dbg(FYI, "sess setup type %d
  ", type);
  	if (type == Unspecified) {
  		cifs_dbg(VFS,
  			"Unable to select appropriate authentication method!");
  		return -EINVAL;
  	}
  
  	switch (type) {
  	case LANMAN:
  		/* LANMAN and plaintext are less secure and off by default.
  		 * So we make this explicitly be turned on in kconfig (in the
  		 * build) and turned on at runtime (changed from the default)
  		 * in proc/fs/cifs or via mount parm.  Unfortunately this is
  		 * needed for old Win (e.g. Win95), some obscure NAS and OS/2 */
  #ifdef CONFIG_CIFS_WEAK_PW_HASH
  		sess_data->func = sess_auth_lanman;
  		break;
  #else
  		return -EOPNOTSUPP;
  #endif
  	case NTLM:
  		sess_data->func = sess_auth_ntlm;
  		break;
  	case NTLMv2:
  		sess_data->func = sess_auth_ntlmv2;
  		break;
  	case Kerberos:
  #ifdef CONFIG_CIFS_UPCALL
  		sess_data->func = sess_auth_kerberos;
  		break;
  #else
  		cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!
  ");
  		return -ENOSYS;
  		break;
  #endif /* CONFIG_CIFS_UPCALL */
  	case RawNTLMSSP:
  		sess_data->func = sess_auth_rawntlmssp_negotiate;
  		break;
  	default:
  		cifs_dbg(VFS, "secType %d not supported!
  ", type);
  		return -ENOSYS;
  	}
  
  	return 0;
  }
  
  int CIFS_SessSetup(const unsigned int xid, struct cifs_ses *ses,
  		    const struct nls_table *nls_cp)
  {
  	int rc = 0;
  	struct sess_data *sess_data;
  
  	if (ses == NULL) {
  		WARN(1, "%s: ses == NULL!", __func__);
  		return -EINVAL;
  	}
  
  	sess_data = kzalloc(sizeof(struct sess_data), GFP_KERNEL);
  	if (!sess_data)
  		return -ENOMEM;
  
  	rc = select_sec(ses, sess_data);
  	if (rc)
  		goto out;
  
  	sess_data->xid = xid;
  	sess_data->ses = ses;
  	sess_data->buf0_type = CIFS_NO_BUFFER;
  	sess_data->nls_cp = (struct nls_table *) nls_cp;
  
  	while (sess_data->func)
  		sess_data->func(sess_data);
  
  	/* Store result before we free sess_data */
80a0e6375   Sachin Prabhu   cifs: Split lanma...
1475
  	rc = sess_data->result;
cc87c47d9   Sachin Prabhu   cifs: Separate ra...
1476
1477
  
  out:
80a0e6375   Sachin Prabhu   cifs: Split lanma...
1478
1479
  	kfree(sess_data);
  	return rc;
3979877e5   Steve French   [CIFS] Support fo...
1480
  }