sess.c 16.1 KB
Newer Older
1 2 3 4 5
/*
 *   fs/cifs/sess.c
 *
 *   SMB/CIFS session setup handling routines
 *
S
Steve French 已提交
6
 *   Copyright (c) International Business Machines  Corp., 2006, 2007
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
 *   Author(s): Steve French (sfrench@us.ibm.com)
 *
 *   This library is free software; you can redistribute it and/or modify
 *   it under the terms of the GNU Lesser General Public License as published
 *   by the Free Software Foundation; either version 2.1 of the License, or
 *   (at your option) any later version.
 *
 *   This library is distributed in the hope that it will be useful,
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 *   the GNU Lesser General Public License for more details.
 *
 *   You should have received a copy of the GNU Lesser General Public License
 *   along with this library; if not, write to the Free Software
 *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 */

#include "cifspdu.h"
#include "cifsglob.h"
#include "cifsproto.h"
#include "cifs_unicode.h"
#include "cifs_debug.h"
#include "ntlmssp.h"
#include "nterr.h"
31
#include <linux/utsname.h>
32 33

extern void SMBNTencrypt(unsigned char *passwd, unsigned char *c8,
S
Steve French 已提交
34
			 unsigned char *p24);
35 36 37 38 39 40 41 42 43 44 45 46 47

static __u32 cifs_ssetup_hdr(struct cifsSesInfo *ses, SESSION_SETUP_ANDX *pSMB)
{
	__u32 capabilities = 0;

	/* init fields common to all four types of SessSetup */
	/* note that header is initialized to zero in header_assemble */
	pSMB->req.AndXCommand = 0xFF;
	pSMB->req.MaxBufferSize = cpu_to_le16(ses->server->maxBuf);
	pSMB->req.MaxMpxCount = cpu_to_le16(ses->server->maxReq);

	/* Now no need to set SMBFLG_CASELESS or obsolete CANONICAL PATH */

S
Steve French 已提交
48
	/* BB verify whether signing required on neg or just on auth frame
49 50 51 52 53
	   (and NTLM case) */

	capabilities = CAP_LARGE_FILES | CAP_NT_SMBS | CAP_LEVEL_II_OPLOCKS |
			CAP_LARGE_WRITE_X | CAP_LARGE_READ_X;

S
Steve French 已提交
54 55
	if (ses->server->secMode &
	    (SECMODE_SIGN_REQUIRED | SECMODE_SIGN_ENABLED))
56 57 58 59 60 61 62 63 64 65 66 67 68 69
		pSMB->req.hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE;

	if (ses->capabilities & CAP_UNICODE) {
		pSMB->req.hdr.Flags2 |= SMBFLG2_UNICODE;
		capabilities |= CAP_UNICODE;
	}
	if (ses->capabilities & CAP_STATUS32) {
		pSMB->req.hdr.Flags2 |= SMBFLG2_ERR_STATUS;
		capabilities |= CAP_STATUS32;
	}
	if (ses->capabilities & CAP_DFS) {
		pSMB->req.hdr.Flags2 |= SMBFLG2_DFS;
		capabilities |= CAP_DFS;
	}
70
	if (ses->capabilities & CAP_UNIX)
71 72 73 74 75 76
		capabilities |= CAP_UNIX;

	/* BB check whether to init vcnum BB */
	return capabilities;
}

77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122
static void
unicode_oslm_strings(char **pbcc_area, const struct nls_table *nls_cp)
{
	char *bcc_ptr = *pbcc_area;
	int bytes_ret = 0;

	/* Copy OS version */
	bytes_ret = cifs_strtoUCS((__le16 *)bcc_ptr, "Linux version ", 32,
				  nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, init_utsname()->release,
				  32, nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2; /* trailing null */

	bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, CIFS_NETWORK_OPSYS,
				  32, nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2; /* trailing null */

	*pbcc_area = bcc_ptr;
}

static void unicode_domain_string(char **pbcc_area, struct cifsSesInfo *ses,
				   const struct nls_table *nls_cp)
{
	char *bcc_ptr = *pbcc_area;
	int bytes_ret = 0;

	/* copy domain */
	if (ses->domainName == NULL) {
		/* Sending null domain better than using a bogus domain name (as
		we did briefly in 2.6.18) since server will use its default */
		*bcc_ptr = 0;
		*(bcc_ptr+1) = 0;
		bytes_ret = 0;
	} else
		bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, ses->domainName,
					  256, nls_cp);
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2;  /* account for null terminator */

	*pbcc_area = bcc_ptr;
}


S
Steve French 已提交
123
static void unicode_ssetup_strings(char **pbcc_area, struct cifsSesInfo *ses,
S
Steve French 已提交
124
				   const struct nls_table *nls_cp)
125
{
S
Steve French 已提交
126
	char *bcc_ptr = *pbcc_area;
127 128 129 130 131
	int bytes_ret = 0;

	/* BB FIXME add check that strings total less
	than 335 or will need to send them as arrays */

132 133
	/* unicode strings, must be word aligned before the call */
/*	if ((long) bcc_ptr % 2)	{
134 135
		*bcc_ptr = 0;
		bcc_ptr++;
136
	} */
137
	/* copy user */
S
Steve French 已提交
138
	if (ses->userName == NULL) {
139 140 141
		/* null user mount */
		*bcc_ptr = 0;
		*(bcc_ptr+1) = 0;
142 143 144 145 146 147 148
	} else { /* 300 should be long enough for any conceivable user name */
		bytes_ret = cifs_strtoUCS((__le16 *) bcc_ptr, ses->userName,
					  300, nls_cp);
	}
	bcc_ptr += 2 * bytes_ret;
	bcc_ptr += 2; /* account for null termination */

149 150
	unicode_domain_string(&bcc_ptr, ses, nls_cp);
	unicode_oslm_strings(&bcc_ptr, nls_cp);
151 152 153 154

	*pbcc_area = bcc_ptr;
}

S
Steve French 已提交
155
static void ascii_ssetup_strings(char **pbcc_area, struct cifsSesInfo *ses,
S
Steve French 已提交
156
				 const struct nls_table *nls_cp)
157
{
S
Steve French 已提交
158
	char *bcc_ptr = *pbcc_area;
159 160 161

	/* copy user */
	/* BB what about null user mounts - check that we do this BB */
S
Steve French 已提交
162 163 164 165 166 167
	/* copy user */
	if (ses->userName == NULL) {
		/* BB what about null user mounts - check that we do this BB */
	} else { /* 300 should be long enough for any conceivable user name */
		strncpy(bcc_ptr, ses->userName, 300);
	}
168
	/* BB improve check for overflow */
S
Steve French 已提交
169
	bcc_ptr += strnlen(ses->userName, 300);
170
	*bcc_ptr = 0;
S
Steve French 已提交
171
	bcc_ptr++; /* account for null termination */
172

S
Steve French 已提交
173 174 175 176
	/* copy domain */

	if (ses->domainName != NULL) {
		strncpy(bcc_ptr, ses->domainName, 256);
177
		bcc_ptr += strnlen(ses->domainName, 256);
S
Steve French 已提交
178
	} /* else we will send a null domain name
179
	     so the server will default to its own domain */
180 181 182 183 184 185 186
	*bcc_ptr = 0;
	bcc_ptr++;

	/* BB check for overflow here */

	strcpy(bcc_ptr, "Linux version ");
	bcc_ptr += strlen("Linux version ");
187 188
	strcpy(bcc_ptr, init_utsname()->release);
	bcc_ptr += strlen(init_utsname()->release) + 1;
189 190 191 192

	strcpy(bcc_ptr, CIFS_NETWORK_OPSYS);
	bcc_ptr += strlen(CIFS_NETWORK_OPSYS) + 1;

S
Steve French 已提交
193
	*pbcc_area = bcc_ptr;
194 195
}

S
Steve French 已提交
196 197 198
static int decode_unicode_ssetup(char **pbcc_area, int bleft,
				 struct cifsSesInfo *ses,
				 const struct nls_table *nls_cp)
199 200 201
{
	int rc = 0;
	int words_left, len;
S
Steve French 已提交
202
	char *data = *pbcc_area;
203 204 205



S
Steve French 已提交
206
	cFYI(1, ("bleft %d", bleft));
207 208


209 210 211 212 213 214 215
	/* SMB header is unaligned, so cifs servers word align start of
	   Unicode strings */
	data++;
	bleft--; /* Windows servers do not always double null terminate
		    their final Unicode string - in which case we
		    now will not attempt to decode the byte of junk
		    which follows it */
216

217 218 219 220 221 222 223 224
	words_left = bleft / 2;

	/* save off server operating system */
	len = UniStrnlen((wchar_t *) data, words_left);

/* We look for obvious messed up bcc or strings in response so we do not go off
   the end since (at least) WIN2K and Windows XP have a major bug in not null
   terminating last Unicode string in response  */
S
Steve French 已提交
225
	if (len >= words_left)
226 227
		return rc;

228
	kfree(ses->serverOS);
229 230
	/* UTF-8 string will not grow more than four times as big as UCS-16 */
	ses->serverOS = kzalloc(4 * len, GFP_KERNEL);
231 232
	if (ses->serverOS != NULL)
		cifs_strfromUCS_le(ses->serverOS, (__le16 *)data, len, nls_cp);
233 234 235 236 237 238
	data += 2 * (len + 1);
	words_left -= len + 1;

	/* save off server network operating system */
	len = UniStrnlen((wchar_t *) data, words_left);

S
Steve French 已提交
239
	if (len >= words_left)
240 241
		return rc;

242
	kfree(ses->serverNOS);
243
	ses->serverNOS = kzalloc(4 * len, GFP_KERNEL); /* BB this is wrong length FIXME BB */
S
Steve French 已提交
244
	if (ses->serverNOS != NULL) {
245 246
		cifs_strfromUCS_le(ses->serverNOS, (__le16 *)data, len,
				   nls_cp);
S
Steve French 已提交
247 248
		if (strncmp(ses->serverNOS, "NT LAN Manager 4", 16) == 0) {
			cFYI(1, ("NT4 server"));
249 250 251 252 253 254
			ses->flags |= CIFS_SES_NT4;
		}
	}
	data += 2 * (len + 1);
	words_left -= len + 1;

S
Steve French 已提交
255 256 257 258 259 260
	/* save off server domain */
	len = UniStrnlen((wchar_t *) data, words_left);

	if (len > words_left)
		return rc;

261
	kfree(ses->serverDomain);
S
Steve French 已提交
262 263 264 265 266 267 268 269 270 271 272
	ses->serverDomain = kzalloc(2 * (len + 1), GFP_KERNEL); /* BB FIXME wrong length */
	if (ses->serverDomain != NULL) {
		cifs_strfromUCS_le(ses->serverDomain, (__le16 *)data, len,
				   nls_cp);
		ses->serverDomain[2*len] = 0;
		ses->serverDomain[(2*len) + 1] = 0;
	}
	data += 2 * (len + 1);
	words_left -= len + 1;

	cFYI(1, ("words left: %d", words_left));
273 274 275 276

	return rc;
}

S
Steve French 已提交
277 278 279
static int decode_ascii_ssetup(char **pbcc_area, int bleft,
			       struct cifsSesInfo *ses,
			       const struct nls_table *nls_cp)
280 281 282
{
	int rc = 0;
	int len;
S
Steve French 已提交
283
	char *bcc_ptr = *pbcc_area;
284

S
Steve French 已提交
285
	cFYI(1, ("decode sessetup ascii. bleft %d", bleft));
286

287
	len = strnlen(bcc_ptr, bleft);
S
Steve French 已提交
288
	if (len >= bleft)
289
		return rc;
290

291
	kfree(ses->serverOS);
292 293

	ses->serverOS = kzalloc(len + 1, GFP_KERNEL);
S
Steve French 已提交
294
	if (ses->serverOS)
295
		strncpy(ses->serverOS, bcc_ptr, len);
S
Steve French 已提交
296 297
	if (strncmp(ses->serverOS, "OS/2", 4) == 0) {
			cFYI(1, ("OS/2 server"));
298 299
			ses->flags |= CIFS_SES_OS2;
	}
300 301 302 303 304

	bcc_ptr += len + 1;
	bleft -= len + 1;

	len = strnlen(bcc_ptr, bleft);
S
Steve French 已提交
305
	if (len >= bleft)
306 307
		return rc;

308
	kfree(ses->serverNOS);
309 310

	ses->serverNOS = kzalloc(len + 1, GFP_KERNEL);
S
Steve French 已提交
311
	if (ses->serverNOS)
312 313 314 315 316
		strncpy(ses->serverNOS, bcc_ptr, len);

	bcc_ptr += len + 1;
	bleft -= len + 1;

S
Steve French 已提交
317 318 319
	len = strnlen(bcc_ptr, bleft);
	if (len > bleft)
		return rc;
320

321 322 323 324 325
	/* No domain field in LANMAN case. Domain is
	   returned by old servers in the SMB negprot response */
	/* BB For newer servers which do not support Unicode,
	   but thus do return domain here we could add parsing
	   for it later, but it is not very important */
S
Steve French 已提交
326
	cFYI(1, ("ascii: bytes left %d", bleft));
327 328 329 330

	return rc;
}

S
Steve French 已提交
331
int
332 333 334 335 336 337 338
CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
		const struct nls_table *nls_cp)
{
	int rc = 0;
	int wct;
	struct smb_hdr *smb_buf;
	char *bcc_ptr;
339
	char *str_area;
340 341 342 343
	SESSION_SETUP_ANDX *pSMB;
	__u32 capabilities;
	int count;
	int resp_buf_type = 0;
344
	struct kvec iov[2];
345 346 347
	enum securityEnum type;
	__u16 action;
	int bytes_remaining;
348

S
Steve French 已提交
349
	if (ses == NULL)
350 351 352
		return -EINVAL;

	type = ses->server->secType;
353

S
Steve French 已提交
354 355
	cFYI(1, ("sess setup type %d", type));
	if (type == LANMAN) {
356 357 358 359 360 361 362 363 364
#ifndef CONFIG_CIFS_WEAK_PW_HASH
		/* LANMAN and plaintext are less secure and off by default.
		So we make this explicitly be turned on in kconfig (in the
		build) and turned on at runtime (changed from the default)
		in proc/fs/cifs or via mount parm.  Unfortunately this is
		needed for old Win (e.g. Win95), some obscure NAS and OS/2 */
		return -EOPNOTSUPP;
#endif
		wct = 10; /* lanman 2 style sessionsetup */
S
Steve French 已提交
365
	} else if ((type == NTLM) || (type == NTLMv2)) {
366
		/* For NTLMv2 failures eventually may need to retry NTLM */
367
		wct = 13; /* old style NTLM sessionsetup */
S
Steve French 已提交
368
	} else /* same size: negotiate or auth, NTLMSSP or extended security */
369 370 371 372
		wct = 12;

	rc = small_smb_init_no_tc(SMB_COM_SESSION_SETUP_ANDX, wct, ses,
			    (void **)&smb_buf);
S
Steve French 已提交
373
	if (rc)
374 375 376 377 378
		return rc;

	pSMB = (SESSION_SETUP_ANDX *)smb_buf;

	capabilities = cifs_ssetup_hdr(ses, pSMB);
379 380 381 382 383 384

	/* we will send the SMB in two pieces,
	a fixed length beginning part, and a
	second part which will include the strings
	and rest of bcc area, in order to avoid having
	to do a large buffer 17K allocation */
S
Steve French 已提交
385 386
	iov[0].iov_base = (char *)pSMB;
	iov[0].iov_len = smb_buf->smb_buf_length + 4;
387 388 389

	/* 2000 big enough to fit max user, domain, NOS name etc. */
	str_area = kmalloc(2000, GFP_KERNEL);
390 391 392 393
	if (str_area == NULL) {
		cifs_small_buf_release(smb_buf);
		return -ENOMEM;
	}
394
	bcc_ptr = str_area;
395

396 397
	ses->flags &= ~CIFS_SES_LANMAN;

S
Steve French 已提交
398
	if (type == LANMAN) {
399
#ifdef CONFIG_CIFS_WEAK_PW_HASH
400
		char lnm_session_key[CIFS_SESS_KEY_SIZE];
401 402 403

		/* no capabilities flags in old lanman negotiation */

S
Steve French 已提交
404
		pSMB->old_req.PasswordLength = cpu_to_le16(CIFS_SESS_KEY_SIZE);
405 406 407
		/* BB calculate hash with password */
		/* and copy into bcc */

408
		calc_lanman_hash(ses, lnm_session_key);
S
Steve French 已提交
409
		ses->flags |= CIFS_SES_LANMAN;
410
/* #ifdef CONFIG_CIFS_DEBUG2
411
		cifs_dump_mem("cryptkey: ",ses->server->cryptKey,
412
			CIFS_SESS_KEY_SIZE);
413
#endif */
414 415
		memcpy(bcc_ptr, (char *)lnm_session_key, CIFS_SESS_KEY_SIZE);
		bcc_ptr += CIFS_SESS_KEY_SIZE;
416 417 418 419 420 421

		/* can not sign if LANMAN negotiated so no need
		to calculate signing key? but what if server
		changed to do higher than lanman dialect and
		we reconnected would we ever calc signing_key? */

S
Steve French 已提交
422
		cFYI(1, ("Negotiating LANMAN setting up strings"));
423 424
		/* Unicode not allowed for LANMAN dialects */
		ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
S
Steve French 已提交
425
#endif
426
	} else if (type == NTLM) {
427
		char ntlm_session_key[CIFS_SESS_KEY_SIZE];
428 429 430

		pSMB->req_no_secext.Capabilities = cpu_to_le32(capabilities);
		pSMB->req_no_secext.CaseInsensitivePasswordLength =
431
			cpu_to_le16(CIFS_SESS_KEY_SIZE);
432
		pSMB->req_no_secext.CaseSensitivePasswordLength =
433
			cpu_to_le16(CIFS_SESS_KEY_SIZE);
434

435 436 437 438
		/* calculate session key */
		SMBNTencrypt(ses->password, ses->server->cryptKey,
			     ntlm_session_key);

S
Steve French 已提交
439
		if (first_time) /* should this be moved into common code
440
				  with similar ntlmv2 path? */
441
			cifs_calculate_mac_key(&ses->server->mac_signing_key,
442 443 444
				ntlm_session_key, ses->password);
		/* copy session key */

S
Steve French 已提交
445
		memcpy(bcc_ptr, (char *)ntlm_session_key, CIFS_SESS_KEY_SIZE);
446
		bcc_ptr += CIFS_SESS_KEY_SIZE;
S
Steve French 已提交
447
		memcpy(bcc_ptr, (char *)ntlm_session_key, CIFS_SESS_KEY_SIZE);
448
		bcc_ptr += CIFS_SESS_KEY_SIZE;
S
Steve French 已提交
449
		if (ses->capabilities & CAP_UNICODE) {
450 451 452
			/* unicode strings must be word aligned */
			if (iov[0].iov_len % 2) {
				*bcc_ptr = 0;
S
Steve French 已提交
453 454
				bcc_ptr++;
			}
455
			unicode_ssetup_strings(&bcc_ptr, ses, nls_cp);
456
		} else
457 458
			ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
	} else if (type == NTLMv2) {
S
Steve French 已提交
459
		char *v2_sess_key =
S
Steve French 已提交
460
			kmalloc(sizeof(struct ntlmv2_resp), GFP_KERNEL);
S
Steve French 已提交
461 462 463

		/* BB FIXME change all users of v2_sess_key to
		   struct ntlmv2_resp */
464

S
Steve French 已提交
465
		if (v2_sess_key == NULL) {
466 467 468 469 470 471 472 473 474 475 476
			cifs_small_buf_release(smb_buf);
			return -ENOMEM;
		}

		pSMB->req_no_secext.Capabilities = cpu_to_le32(capabilities);

		/* LM2 password would be here if we supported it */
		pSMB->req_no_secext.CaseInsensitivePasswordLength = 0;
		/*	cpu_to_le16(LM2_SESS_KEY_SIZE); */

		pSMB->req_no_secext.CaseSensitivePasswordLength =
S
Steve French 已提交
477
			cpu_to_le16(sizeof(struct ntlmv2_resp));
478 479

		/* calculate session key */
S
Steve French 已提交
480
		setup_ntlmv2_rsp(ses, v2_sess_key, nls_cp);
S
Steve French 已提交
481 482
		if (first_time) /* should this be moved into common code
				   with similar ntlmv2 path? */
483 484 485 486 487 488 489
		/*   cifs_calculate_ntlmv2_mac_key(ses->server->mac_signing_key,
				response BB FIXME, v2_sess_key); */

		/* copy session key */

	/*	memcpy(bcc_ptr, (char *)ntlm_session_key,LM2_SESS_KEY_SIZE);
		bcc_ptr += LM2_SESS_KEY_SIZE; */
S
Steve French 已提交
490 491
		memcpy(bcc_ptr, (char *)v2_sess_key,
		       sizeof(struct ntlmv2_resp));
S
Steve French 已提交
492 493
		bcc_ptr += sizeof(struct ntlmv2_resp);
		kfree(v2_sess_key);
S
Steve French 已提交
494 495
		if (ses->capabilities & CAP_UNICODE) {
			if (iov[0].iov_len % 2) {
496
				*bcc_ptr = 0;
497 498
				bcc_ptr++;
			}
499
			unicode_ssetup_strings(&bcc_ptr, ses, nls_cp);
500
		} else
501 502 503 504 505 506 507 508
			ascii_ssetup_strings(&bcc_ptr, ses, nls_cp);
	} else /* NTLMSSP or SPNEGO */ {
		pSMB->req.hdr.Flags2 |= SMBFLG2_EXT_SEC;
		capabilities |= CAP_EXTENDED_SECURITY;
		pSMB->req.Capabilities = cpu_to_le32(capabilities);
		/* BB set password lengths */
	}

509
	count = (long) bcc_ptr - (long) str_area;
510 511 512 513
	smb_buf->smb_buf_length += count;

	BCC_LE(smb_buf) = cpu_to_le16(count);

514
	iov[1].iov_base = str_area;
S
Steve French 已提交
515
	iov[1].iov_len = count;
516
	rc = SendReceive2(xid, ses, iov, 2 /* num_iovecs */, &resp_buf_type, 0);
517 518
	/* SMB request buf freed in SendReceive2 */

S
Steve French 已提交
519 520
	cFYI(1, ("ssetup rc from sendrecv2 is %d", rc));
	if (rc)
521 522 523 524 525
		goto ssetup_exit;

	pSMB = (SESSION_SETUP_ANDX *)iov[0].iov_base;
	smb_buf = (struct smb_hdr *)iov[0].iov_base;

S
Steve French 已提交
526
	if ((smb_buf->WordCount != 3) && (smb_buf->WordCount != 4)) {
527
		rc = -EIO;
S
Steve French 已提交
528
		cERROR(1, ("bad word count %d", smb_buf->WordCount));
529 530 531 532
		goto ssetup_exit;
	}
	action = le16_to_cpu(pSMB->resp.Action);
	if (action & GUEST_LOGIN)
533
		cFYI(1, ("Guest login")); /* BB mark SesInfo struct? */
534 535 536 537 538 539 540
	ses->Suid = smb_buf->Uid;   /* UID left in wire format (le) */
	cFYI(1, ("UID = %d ", ses->Suid));
	/* response can have either 3 or 4 word count - Samba sends 3 */
	/* and lanman response is 3 */
	bytes_remaining = BCC(smb_buf);
	bcc_ptr = pByteArea(smb_buf);

S
Steve French 已提交
541
	if (smb_buf->WordCount == 4) {
542 543 544
		__u16 blob_len;
		blob_len = le16_to_cpu(pSMB->resp.SecurityBlobLength);
		bcc_ptr += blob_len;
S
Steve French 已提交
545 546
		if (blob_len > bytes_remaining) {
			cERROR(1, ("bad security blob length %d", blob_len));
547 548 549 550
			rc = -EINVAL;
			goto ssetup_exit;
		}
		bytes_remaining -= blob_len;
S
Steve French 已提交
551
	}
552 553

	/* BB check if Unicode and decode strings */
S
Steve French 已提交
554
	if (smb_buf->Flags2 & SMBFLG2_UNICODE)
555 556 557
		rc = decode_unicode_ssetup(&bcc_ptr, bytes_remaining,
						   ses, nls_cp);
	else
558 559
		rc = decode_ascii_ssetup(&bcc_ptr, bytes_remaining,
					 ses, nls_cp);
560

561
ssetup_exit:
562
	kfree(str_area);
S
Steve French 已提交
563 564
	if (resp_buf_type == CIFS_SMALL_BUFFER) {
		cFYI(1, ("ssetup freeing small buf %p", iov[0].iov_base));
565
		cifs_small_buf_release(iov[0].iov_base);
S
Steve French 已提交
566
	} else if (resp_buf_type == CIFS_LARGE_BUFFER)
567 568 569 570
		cifs_buf_release(iov[0].iov_base);

	return rc;
}