sess.c 18.2 KB
Newer Older
1 2 3 4 5
/*
 *   fs/cifs/sess.c
 *
 *   SMB/CIFS session setup handling routines
 *
Steve French's avatar
Steve French committed
6
 *   Copyright (c) International Business Machines  Corp., 2006, 2007
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
 *   Author(s): Steve French (sfrench@us.ibm.com)
 *
 *   This library is free software; you can redistribute it and/or modify
 *   it under the terms of the GNU Lesser General Public License as published
 *   by the Free Software Foundation; either version 2.1 of the License, or
 *   (at your option) any later version.
 *
 *   This library is distributed in the hope that it will be useful,
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 *   the GNU Lesser General Public License for more details.
 *
 *   You should have received a copy of the GNU Lesser General Public License
 *   along with this library; if not, write to the Free Software
 *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 */

#include "cifspdu.h"
#include "cifsglob.h"
#include "cifsproto.h"
#include "cifs_unicode.h"
#include "cifs_debug.h"
#include "ntlmssp.h"
#include "nterr.h"
31
#include <linux/utsname.h>
32
#include "cifs_spnego.h"
33 34

extern void SMBNTencrypt(unsigned char *passwd, unsigned char *c8,
Steve French's avatar
Steve French committed
35
			 unsigned char *p24);
36 37 38 39 40 41 42 43 44 45 46 47 48

static __u32 cifs_ssetup_hdr(struct cifsSesInfo *ses, SESSION_SETUP_ANDX *pSMB)
{
	__u32 capabilities = 0;

	/* init fields common to all four types of SessSetup */
	/* note that header is initialized to zero in header_assemble */
	pSMB->req.AndXCommand = 0xFF;
	pSMB->req.MaxBufferSize = cpu_to_le16(ses->server->maxBuf);
	pSMB->req.MaxMpxCount = cpu_to_le16(ses->server->maxReq);

	/* Now no need to set SMBFLG_CASELESS or obsolete CANONICAL PATH */

Steve French's avatar
Steve French committed
49
	/* BB verify whether signing required on neg or just on auth frame
50 51 52 53 54
	   (and NTLM case) */

	capabilities = CAP_LARGE_FILES | CAP_NT_SMBS | CAP_LEVEL_II_OPLOCKS |
			CAP_LARGE_WRITE_X | CAP_LARGE_READ_X;

Steve French's avatar
Steve French committed
55 56
	if (ses->server->secMode &
	    (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
57 58 59 60 61 62 63 64 65 66 67 68 69 70
		pSMB->req.hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;

	if (ses->capabilities & CAP_UNICODE) {
		pSMB->req.hdr.Flags2 |= SMBFLG2_UNICODE;
		capabilities |= CAP_UNICODE;
	}
	if (ses->capabilities & CAP_STATUS32) {
		pSMB->req.hdr.Flags2 |= SMBFLG2_ERR_STATUS;
		capabilities |= CAP_STATUS32;
	}
	if (ses->capabilities & CAP_DFS) {
		pSMB->req.hdr.Flags2 |= SMBFLG2_DFS;
		capabilities |= CAP_DFS;
	}
71
	if (ses->capabilities & CAP_UNIX)
72 73 74 75 76 77
		capabilities |= CAP_UNIX;

	/* BB check whether to init vcnum BB */
	return capabilities;
}

78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123
static void
unicode_oslm_strings(char **pbcc_area, const struct nls_table *nls_cp)
{
	char *bcc_ptr = *pbcc_area;
	int bytes_ret = 0;

	/* Copy OS version */
	bytes_ret = cifs_strtoUCS((__le16 *)bcc_ptr, "Linux version ", 32,
				  nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, init_utsname()->release,
				  32, nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2; /* trailing null */

	bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, CIFS_NETWORK_OPSYS,
				  32, nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2; /* trailing null */

	*pbcc_area = bcc_ptr;
}

static void unicode_domain_string(char **pbcc_area, struct cifsSesInfo *ses,
				   const struct nls_table *nls_cp)
{
	char *bcc_ptr = *pbcc_area;
	int bytes_ret = 0;

	/* copy domain */
	if (ses->domainName == NULL) {
		/* Sending null domain better than using a bogus domain name (as
		we did briefly in 2.6.18) since server will use its default */
		*bcc_ptr = 0;
		*(bcc_ptr+1) = 0;
		bytes_ret = 0;
	} else
		bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, ses->domainName,
					  256, nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2;  /* account for null terminator */

	*pbcc_area = bcc_ptr;
}


Steve French's avatar
Steve French committed
124
static void unicode_ssetup_strings(char **pbcc_area, struct cifsSesInfo *ses,
Steve French's avatar
Steve French committed
125
				   const struct nls_table *nls_cp)
126
{
Steve French's avatar
Steve French committed
127
	char *bcc_ptr = *pbcc_area;
128 129 130 131 132
	int bytes_ret = 0;

	/* BB FIXME add check that strings total less
	than 335 or will need to send them as arrays */

133 134
	/* unicode strings, must be word aligned before the call */
/*	if ((long) bcc_ptr % 2)	{
135 136
		*bcc_ptr = 0;
		bcc_ptr++;
137
	} */
138
	/* copy user */
Steve French's avatar
Steve French committed
139
	if (ses->userName == NULL) {
140 141 142
		/* null user mount */
		*bcc_ptr = 0;
		*(bcc_ptr+1) = 0;
143 144 145 146 147 148 149
	} else { /* 300 should be long enough for any conceivable user name */
		bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, ses->userName,
					  300, nls_cp);
	}
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2; /* account for null termination */

150 151
	unicode_domain_string(&bcc_ptr, ses, nls_cp);
	unicode_oslm_strings(&bcc_ptr, nls_cp);
152 153 154 155

	*pbcc_area = bcc_ptr;
}

Steve French's avatar
Steve French committed
156
static void ascii_ssetup_strings(char **pbcc_area, struct cifsSesInfo *ses,
Steve French's avatar
Steve French committed
157
				 const struct nls_table *nls_cp)
158
{
Steve French's avatar
Steve French committed
159
	char *bcc_ptr = *pbcc_area;
160 161 162

	/* copy user */
	/* BB what about null user mounts - check that we do this BB */
Steve French's avatar
Steve French committed
163 164 165 166 167 168
	/* copy user */
	if (ses->userName == NULL) {
		/* BB what about null user mounts - check that we do this BB */
	} else { /* 300 should be long enough for any conceivable user name */
		strncpy(bcc_ptr, ses->userName, 300);
	}
169
	/* BB improve check for overflow */
Steve French's avatar
Steve French committed
170
	bcc_ptr += strnlen(ses->userName, 300);
171
	*bcc_ptr = 0;
Steve French's avatar
Steve French committed
172
	bcc_ptr++; /* account for null termination */
173

Steve French's avatar
Steve French committed
174 175 176 177
	/* copy domain */

	if (ses->domainName != NULL) {
		strncpy(bcc_ptr, ses->domainName, 256);
178
		bcc_ptr += strnlen(ses->domainName, 256);
Steve French's avatar
Steve French committed
179
	} /* else we will send a null domain name
180
	     so the server will default to its own domain */
181 182 183 184 185 186 187
	*bcc_ptr = 0;
	bcc_ptr++;

	/* BB check for overflow here */

	strcpy(bcc_ptr, "Linux version ");
	bcc_ptr += strlen("Linux version ");
188 189
	strcpy(bcc_ptr, init_utsname()->release);
	bcc_ptr += strlen(init_utsname()->release) + 1;
190 191 192 193

	strcpy(bcc_ptr, CIFS_NETWORK_OPSYS);
	bcc_ptr += strlen(CIFS_NETWORK_OPSYS) + 1;

Steve French's avatar
Steve French committed
194
	*pbcc_area = bcc_ptr;
195 196
}

Steve French's avatar
Steve French committed
197 198 199
static int decode_unicode_ssetup(char **pbcc_area, int bleft,
				 struct cifsSesInfo *ses,
				 const struct nls_table *nls_cp)
200 201 202
{
	int rc = 0;
	int words_left, len;
Steve French's avatar
Steve French committed
203
	char *data = *pbcc_area;
204 205 206



Steve French's avatar
Steve French committed
207
	cFYI(1, ("bleft %d", bleft));
208 209


210 211 212 213 214 215 216
	/* SMB header is unaligned, so cifs servers word align start of
	   Unicode strings */
	data++;
	bleft--; /* Windows servers do not always double null terminate
		    their final Unicode string - in which case we
		    now will not attempt to decode the byte of junk
		    which follows it */
217

218 219 220 221 222 223 224 225
	words_left = bleft / 2;

	/* save off server operating system */
	len = UniStrnlen((wchar_t *) data, words_left);

/* We look for obvious messed up bcc or strings in response so we do not go off
   the end since (at least) WIN2K and Windows XP have a major bug in not null
   terminating last Unicode string in response  */
Steve French's avatar
Steve French committed
226
	if (len >= words_left)
227 228
		return rc;

229
	kfree(ses->serverOS);
230
	/* UTF-8 string will not grow more than four times as big as UCS-16 */
231
	ses->serverOS = kzalloc((4 * len) + 2 /* trailing null */, GFP_KERNEL);
232 233
	if (ses->serverOS != NULL)
		cifs_strfromUCS_le(ses->serverOS, (__le16 *)data, len, nls_cp);
234 235 236 237 238 239
	data += 2 * (len + 1);
	words_left -= len + 1;

	/* save off server network operating system */
	len = UniStrnlen((wchar_t *) data, words_left);

Steve French's avatar
Steve French committed
240
	if (len >= words_left)
241 242
		return rc;

243
	kfree(ses->serverNOS);
244
	ses->serverNOS = kzalloc((4 * len) + 2 /* trailing null */, GFP_KERNEL);
Steve French's avatar
Steve French committed
245
	if (ses->serverNOS != NULL) {
246 247
		cifs_strfromUCS_le(ses->serverNOS, (__le16 *)data, len,
				   nls_cp);
Steve French's avatar
Steve French committed
248 249
		if (strncmp(ses->serverNOS, "NT LAN Manager 4", 16) == 0) {
			cFYI(1, ("NT4 server"));
250 251 252 253 254 255
			ses->flags |= CIFS_SES_NT4;
		}
	}
	data += 2 * (len + 1);
	words_left -= len + 1;

Steve French's avatar
Steve French committed
256 257 258 259 260 261
	/* save off server domain */
	len = UniStrnlen((wchar_t *) data, words_left);

	if (len > words_left)
		return rc;

262
	kfree(ses->serverDomain);
Steve French's avatar
Steve French committed
263 264 265 266 267 268 269 270 271 272 273
	ses->serverDomain = kzalloc(2 * (len + 1), GFP_KERNEL); /* BB FIXME wrong length */
	if (ses->serverDomain != NULL) {
		cifs_strfromUCS_le(ses->serverDomain, (__le16 *)data, len,
				   nls_cp);
		ses->serverDomain[2*len] = 0;
		ses->serverDomain[(2*len) + 1] = 0;
	}
	data += 2 * (len + 1);
	words_left -= len + 1;

	cFYI(1, ("words left: %d", words_left));
274 275 276 277

	return rc;
}

Steve French's avatar
Steve French committed
278 279 280
static int decode_ascii_ssetup(char **pbcc_area, int bleft,
			       struct cifsSesInfo *ses,
			       const struct nls_table *nls_cp)
281 282 283
{
	int rc = 0;
	int len;
Steve French's avatar
Steve French committed
284
	char *bcc_ptr = *pbcc_area;
285

Steve French's avatar
Steve French committed
286
	cFYI(1, ("decode sessetup ascii. bleft %d", bleft));
287

288
	len = strnlen(bcc_ptr, bleft);
Steve French's avatar
Steve French committed
289
	if (len >= bleft)
290
		return rc;
291

292
	kfree(ses->serverOS);
293 294

	ses->serverOS = kzalloc(len + 1, GFP_KERNEL);
Steve French's avatar
Steve French committed
295
	if (ses->serverOS)
296
		strncpy(ses->serverOS, bcc_ptr, len);
Steve French's avatar
Steve French committed
297 298
	if (strncmp(ses->serverOS, "OS/2", 4) == 0) {
			cFYI(1, ("OS/2 server"));
299 300
			ses->flags |= CIFS_SES_OS2;
	}
301 302 303 304 305

	bcc_ptr += len + 1;
	bleft -= len + 1;

	len = strnlen(bcc_ptr, bleft);
Steve French's avatar
Steve French committed
306
	if (len >= bleft)
307 308
		return rc;

309
	kfree(ses->serverNOS);
310 311

	ses->serverNOS = kzalloc(len + 1, GFP_KERNEL);
Steve French's avatar
Steve French committed
312
	if (ses->serverNOS)
313 314 315 316 317
		strncpy(ses->serverNOS, bcc_ptr, len);

	bcc_ptr += len + 1;
	bleft -= len + 1;

Steve French's avatar
Steve French committed
318 319 320
	len = strnlen(bcc_ptr, bleft);
	if (len > bleft)
		return rc;
321

322 323 324 325 326
	/* No domain field in LANMAN case. Domain is
	   returned by old servers in the SMB negprot response */
	/* BB For newer servers which do not support Unicode,
	   but thus do return domain here we could add parsing
	   for it later, but it is not very important */
Steve French's avatar
Steve French committed
327
	cFYI(1, ("ascii: bytes left %d", bleft));
328 329 330 331

	return rc;
}

Steve French's avatar
Steve French committed
332
int
333 334 335 336 337 338 339
CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
		const struct nls_table *nls_cp)
{
	int rc = 0;
	int wct;
	struct smb_hdr *smb_buf;
	char *bcc_ptr;
340
	char *str_area;
341 342 343
	SESSION_SETUP_ANDX *pSMB;
	__u32 capabilities;
	int count;
344 345
	int resp_buf_type;
	struct kvec iov[3];
346 347 348
	enum securityEnum type;
	__u16 action;
	int bytes_remaining;
349
	struct key *spnego_key = NULL;
350

Steve French's avatar
Steve French committed
351
	if (ses == NULL)
352 353 354
		return -EINVAL;

	type = ses->server->secType;
355

Steve French's avatar
Steve French committed
356 357
	cFYI(1, ("sess setup type %d", type));
	if (type == LANMAN) {
358 359 360 361 362 363 364 365 366
#ifndef CONFIG_CIFS_WEAK_PW_HASH
		/* LANMAN and plaintext are less secure and off by default.
		So we make this explicitly be turned on in kconfig (in the
		build) and turned on at runtime (changed from the default)
		in proc/fs/cifs or via mount parm.  Unfortunately this is
		needed for old Win (e.g. Win95), some obscure NAS and OS/2 */
		return -EOPNOTSUPP;
#endif
		wct = 10; /* lanman 2 style sessionsetup */
Steve French's avatar
Steve French committed
367
	} else if ((type == NTLM) || (type == NTLMv2)) {
368
		/* For NTLMv2 failures eventually may need to retry NTLM */
369
		wct = 13; /* old style NTLM sessionsetup */
Steve French's avatar
Steve French committed
370
	} else /* same size: negotiate or auth, NTLMSSP or extended security */
371 372 373 374
		wct = 12;

	rc = small_smb_init_no_tc(SMB_COM_SESSION_SETUP_ANDX, wct, ses,
			    (void **)&smb_buf);
Steve French's avatar
Steve French committed
375
	if (rc)
376 377 378 379 380
		return rc;

	pSMB = (SESSION_SETUP_ANDX *)smb_buf;

	capabilities = cifs_ssetup_hdr(ses, pSMB);
381

382 383 384 385 386 387
	/* we will send the SMB in three pieces:
	a fixed length beginning part, an optional
	SPNEGO blob (which can be zero length), and a
	last part which will include the strings
	and rest of bcc area. This allows us to avoid
	a large buffer 17K allocation */
Steve French's avatar
Steve French committed
388 389
	iov[0].iov_base = (char *)pSMB;
	iov[0].iov_len = smb_buf->smb_buf_length + 4;
390

391 392 393 394
	/* setting this here allows the code at the end of the function
	   to free the request buffer if there's an error */
	resp_buf_type = CIFS_SMALL_BUFFER;

395 396
	/* 2000 big enough to fit max user, domain, NOS name etc. */
	str_area = kmalloc(2000, GFP_KERNEL);
397
	if (str_area == NULL) {
398 399
		rc = -ENOMEM;
		goto ssetup_exit;
400
	}
401
	bcc_ptr = str_area;
402

403 404
	ses->flags &= ~CIFS_SES_LANMAN;

405 406 407
	iov[1].iov_base = NULL;
	iov[1].iov_len = 0;

Steve French's avatar
Steve French committed
408
	if (type == LANMAN) {
409
#ifdef CONFIG_CIFS_WEAK_PW_HASH
410
		char lnm_session_key[CIFS_SESS_KEY_SIZE];
411

412 413
		pSMB->req.hdr.Flags2 &= ~SMBFLG2_UNICODE;

414 415
		/* no capabilities flags in old lanman negotiation */

Steve French's avatar
Steve French committed
416
		pSMB->old_req.PasswordLength = cpu_to_le16(CIFS_SESS_KEY_SIZE);
417 418 419
		/* BB calculate hash with password */
		/* and copy into bcc */

420 421 422 423
		calc_lanman_hash(ses->password, ses->server->cryptKey,
				 ses->server->secMode & SECMODE_PW_ENCRYPT ?
					true : false, lnm_session_key);

Steve French's avatar
Steve French committed
424
		ses->flags |= CIFS_SES_LANMAN;
425 426
		memcpy(bcc_ptr, (char *)lnm_session_key, CIFS_SESS_KEY_SIZE);
		bcc_ptr += CIFS_SESS_KEY_SIZE;
427 428 429 430 431 432

		/* can not sign if LANMAN negotiated so no need
		to calculate signing key? but what if server
		changed to do higher than lanman dialect and
		we reconnected would we ever calc signing_key? */

Steve French's avatar
Steve French committed
433
		cFYI(1, ("Negotiating LANMAN setting up strings"));
434 435
		/* Unicode not allowed for LANMAN dialects */
		ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
Steve French's avatar
Steve French committed
436
#endif
437
	} else if (type == NTLM) {
438
		char ntlm_session_key[CIFS_SESS_KEY_SIZE];
439 440 441

		pSMB->req_no_secext.Capabilities = cpu_to_le32(capabilities);
		pSMB->req_no_secext.CaseInsensitivePasswordLength =
442
			cpu_to_le16(CIFS_SESS_KEY_SIZE);
443
		pSMB->req_no_secext.CaseSensitivePasswordLength =
444
			cpu_to_le16(CIFS_SESS_KEY_SIZE);
445

446 447 448 449
		/* calculate session key */
		SMBNTencrypt(ses->password, ses->server->cryptKey,
			     ntlm_session_key);

Steve French's avatar
Steve French committed
450
		if (first_time) /* should this be moved into common code
451
				  with similar ntlmv2 path? */
452
			cifs_calculate_mac_key(&ses->server->mac_signing_key,
453 454 455
				ntlm_session_key, ses->password);
		/* copy session key */

Steve French's avatar
Steve French committed
456
		memcpy(bcc_ptr, (char *)ntlm_session_key, CIFS_SESS_KEY_SIZE);
457
		bcc_ptr += CIFS_SESS_KEY_SIZE;
Steve French's avatar
Steve French committed
458
		memcpy(bcc_ptr, (char *)ntlm_session_key, CIFS_SESS_KEY_SIZE);
459
		bcc_ptr += CIFS_SESS_KEY_SIZE;
Steve French's avatar
Steve French committed
460
		if (ses->capabilities & CAP_UNICODE) {
461 462 463
			/* unicode strings must be word aligned */
			if (iov[0].iov_len % 2) {
				*bcc_ptr = 0;
Steve French's avatar
Steve French committed
464 465
				bcc_ptr++;
			}
466
			unicode_ssetup_strings(&bcc_ptr, ses, nls_cp);
467
		} else
468 469
			ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
	} else if (type == NTLMv2) {
Steve French's avatar
Steve French committed
470
		char *v2_sess_key =
Steve French's avatar
Steve French committed
471
			kmalloc(sizeof(struct ntlmv2_resp), GFP_KERNEL);
Steve French's avatar
Steve French committed
472 473 474

		/* BB FIXME change all users of v2_sess_key to
		   struct ntlmv2_resp */
475

Steve French's avatar
Steve French committed
476
		if (v2_sess_key == NULL) {
477 478
			rc = -ENOMEM;
			goto ssetup_exit;
479 480 481 482 483 484 485 486 487
		}

		pSMB->req_no_secext.Capabilities = cpu_to_le32(capabilities);

		/* LM2 password would be here if we supported it */
		pSMB->req_no_secext.CaseInsensitivePasswordLength = 0;
		/*	cpu_to_le16(LM2_SESS_KEY_SIZE); */

		pSMB->req_no_secext.CaseSensitivePasswordLength =
Steve French's avatar
Steve French committed
488
			cpu_to_le16(sizeof(struct ntlmv2_resp));
489 490

		/* calculate session key */
Steve French's avatar
Steve French committed
491
		setup_ntlmv2_rsp(ses, v2_sess_key, nls_cp);
Steve French's avatar
Steve French committed
492 493
		if (first_time) /* should this be moved into common code
				   with similar ntlmv2 path? */
494 495 496 497 498 499 500
		/*   cifs_calculate_ntlmv2_mac_key(ses->server->mac_signing_key,
				response BB FIXME, v2_sess_key); */

		/* copy session key */

	/*	memcpy(bcc_ptr, (char *)ntlm_session_key,LM2_SESS_KEY_SIZE);
		bcc_ptr += LM2_SESS_KEY_SIZE; */
Steve French's avatar
Steve French committed
501 502
		memcpy(bcc_ptr, (char *)v2_sess_key,
		       sizeof(struct ntlmv2_resp));
Steve French's avatar
Steve French committed
503 504
		bcc_ptr += sizeof(struct ntlmv2_resp);
		kfree(v2_sess_key);
Steve French's avatar
Steve French committed
505 506
		if (ses->capabilities & CAP_UNICODE) {
			if (iov[0].iov_len % 2) {
507
				*bcc_ptr = 0;
508 509
				bcc_ptr++;
			}
510
			unicode_ssetup_strings(&bcc_ptr, ses, nls_cp);
511
		} else
512
			ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
513
	} else if (type == Kerberos || type == MSKerberos) {
514 515 516 517 518 519 520 521 522 523
#ifdef CONFIG_CIFS_UPCALL
		struct cifs_spnego_msg *msg;
		spnego_key = cifs_get_spnego_key(ses);
		if (IS_ERR(spnego_key)) {
			rc = PTR_ERR(spnego_key);
			spnego_key = NULL;
			goto ssetup_exit;
		}

		msg = spnego_key->payload.data;
524 525 526 527 528 529 530 531 532
		/* check version field to make sure that cifs.upcall is
		   sending us a response in an expected form */
		if (msg->version != CIFS_SPNEGO_UPCALL_VERSION) {
			cERROR(1, ("incorrect version of cifs.upcall (expected"
				   " %d but got %d)",
				   CIFS_SPNEGO_UPCALL_VERSION, msg->version));
			rc = -EKEYREJECTED;
			goto ssetup_exit;
		}
533 534 535 536 537 538 539 540
		/* bail out if key is too long */
		if (msg->sesskey_len >
		    sizeof(ses->server->mac_signing_key.data.krb5)) {
			cERROR(1, ("Kerberos signing key too long (%u bytes)",
				msg->sesskey_len));
			rc = -EOVERFLOW;
			goto ssetup_exit;
		}
541 542 543 544 545
		if (first_time) {
			ses->server->mac_signing_key.len = msg->sesskey_len;
			memcpy(ses->server->mac_signing_key.data.krb5,
				msg->data, msg->sesskey_len);
		}
546 547 548
		pSMB->req.hdr.Flags2 |= SMBFLG2_EXT_SEC;
		capabilities |= CAP_EXTENDED_SECURITY;
		pSMB->req.Capabilities = cpu_to_le32(capabilities);
549 550 551 552 553 554
		iov[1].iov_base = msg->data + msg->sesskey_len;
		iov[1].iov_len = msg->secblob_len;
		pSMB->req.SecurityBlobLength = cpu_to_le16(iov[1].iov_len);

		if (ses->capabilities & CAP_UNICODE) {
			/* unicode strings must be word aligned */
555
			if ((iov[0].iov_len + iov[1].iov_len) % 2) {
556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572
				*bcc_ptr = 0;
				bcc_ptr++;
			}
			unicode_oslm_strings(&bcc_ptr, nls_cp);
			unicode_domain_string(&bcc_ptr, ses, nls_cp);
		} else
		/* BB: is this right? */
			ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
#else /* ! CONFIG_CIFS_UPCALL */
		cERROR(1, ("Kerberos negotiated but upcall support disabled!"));
		rc = -ENOSYS;
		goto ssetup_exit;
#endif /* CONFIG_CIFS_UPCALL */
	} else {
		cERROR(1, ("secType %d not supported!", type));
		rc = -ENOSYS;
		goto ssetup_exit;
573 574
	}

575 576 577 578
	iov[2].iov_base = str_area;
	iov[2].iov_len = (long) bcc_ptr - (long) str_area;

	count = iov[1].iov_len + iov[2].iov_len;
579 580 581 582
	smb_buf->smb_buf_length += count;

	BCC_LE(smb_buf) = cpu_to_le16(count);

583
	rc = SendReceive2(xid, ses, iov, 3 /* num_iovecs */, &resp_buf_type,
584
			  CIFS_STD_OP /* not long */ | CIFS_LOG_ERROR);
585 586
	/* SMB request buf freed in SendReceive2 */

Steve French's avatar
Steve French committed
587 588
	cFYI(1, ("ssetup rc from sendrecv2 is %d", rc));
	if (rc)
589 590 591 592 593
		goto ssetup_exit;

	pSMB = (SESSION_SETUP_ANDX *)iov[0].iov_base;
	smb_buf = (struct smb_hdr *)iov[0].iov_base;

Steve French's avatar
Steve French committed
594
	if ((smb_buf->WordCount != 3) && (smb_buf->WordCount != 4)) {
595
		rc = -EIO;
Steve French's avatar
Steve French committed
596
		cERROR(1, ("bad word count %d", smb_buf->WordCount));
597 598 599 600
		goto ssetup_exit;
	}
	action = le16_to_cpu(pSMB->resp.Action);
	if (action & GUEST_LOGIN)
601
		cFYI(1, ("Guest login")); /* BB mark SesInfo struct? */
602 603 604 605 606 607 608
	ses->Suid = smb_buf->Uid;   /* UID left in wire format (le) */
	cFYI(1, ("UID = %d ", ses->Suid));
	/* response can have either 3 or 4 word count - Samba sends 3 */
	/* and lanman response is 3 */
	bytes_remaining = BCC(smb_buf);
	bcc_ptr = pByteArea(smb_buf);

Steve French's avatar
Steve French committed
609
	if (smb_buf->WordCount == 4) {
610 611 612
		__u16 blob_len;
		blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);
		bcc_ptr += blob_len;
Steve French's avatar
Steve French committed
613 614
		if (blob_len > bytes_remaining) {
			cERROR(1, ("bad security blob length %d", blob_len));
615 616 617 618
			rc = -EINVAL;
			goto ssetup_exit;
		}
		bytes_remaining -= blob_len;
Steve French's avatar
Steve French committed
619
	}
620 621

	/* BB check if Unicode and decode strings */
Steve French's avatar
Steve French committed
622
	if (smb_buf->Flags2 & SMBFLG2_UNICODE)
623 624 625
		rc = decode_unicode_ssetup(&bcc_ptr, bytes_remaining,
						   ses, nls_cp);
	else
626 627
		rc = decode_ascii_ssetup(&bcc_ptr, bytes_remaining,
					 ses, nls_cp);
628

629
ssetup_exit:
630 631
	if (spnego_key) {
		key_revoke(spnego_key);
632
		key_put(spnego_key);
633
	}
634
	kfree(str_area);
Steve French's avatar
Steve French committed
635 636
	if (resp_buf_type == CIFS_SMALL_BUFFER) {
		cFYI(1, ("ssetup freeing small buf %p", iov[0].iov_base));
637
		cifs_small_buf_release(iov[0].iov_base);
Steve French's avatar
Steve French committed
638
	} else if (resp_buf_type == CIFS_LARGE_BUFFER)
639 640 641 642
		cifs_buf_release(iov[0].iov_base);

	return rc;
}