Loading fs/cifs/cifssmb.c +18 −14 Original line number Diff line number Diff line Loading @@ -621,10 +621,11 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses) if ((pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC) && (server->capabilities & CAP_EXTENDED_SECURITY)) { count = pSMBr->ByteCount; if (count < 16) if (count < 16) { rc = -EIO; else if (count == 16) { server->secType = RawNTLMSSP; goto neg_err_exit; } if (server->socketUseCount.counter > 1) { if (memcmp(server->server_GUID, pSMBr->u.extended_response. Loading @@ -637,6 +638,9 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses) } else memcpy(server->server_GUID, pSMBr->u.extended_response.GUID, 16); if (count == 16) { server->secType = RawNTLMSSP; } else { rc = decode_negTokenInit(pSMBr->u.extended_response. SecurityBlob, Loading Loading
fs/cifs/cifssmb.c +18 −14 Original line number Diff line number Diff line Loading @@ -621,10 +621,11 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses) if ((pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC) && (server->capabilities & CAP_EXTENDED_SECURITY)) { count = pSMBr->ByteCount; if (count < 16) if (count < 16) { rc = -EIO; else if (count == 16) { server->secType = RawNTLMSSP; goto neg_err_exit; } if (server->socketUseCount.counter > 1) { if (memcmp(server->server_GUID, pSMBr->u.extended_response. Loading @@ -637,6 +638,9 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses) } else memcpy(server->server_GUID, pSMBr->u.extended_response.GUID, 16); if (count == 16) { server->secType = RawNTLMSSP; } else { rc = decode_negTokenInit(pSMBr->u.extended_response. SecurityBlob, Loading