cifs: allow sec=none mounts to work against servers that don't support extended security
authorJeff Layton <jlayton@redhat.com>
Fri, 24 May 2013 11:40:04 +0000 (07:40 -0400)
committerSteve French <sfrench@us.ibm.com>
Fri, 24 May 2013 18:08:26 +0000 (13:08 -0500)
In the case of sec=none, we're not sending a username or password, so
there's little benefit to mandating NTLMSSP auth. Allow it to use
unencapsulated auth in that case.

Signed-off-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Steve French <sfrench@us.ibm.com>
fs/cifs/connect.c

index 99eeaa17ee006956d37350cad00bfd854c8b5306..0a7fdc31f253b59e85137ecd39dd4c17cd10547a 100644 (file)
@@ -1061,6 +1061,7 @@ static int cifs_parse_security_flavors(char *value,
 #endif
        case Opt_sec_none:
                vol->nullauth = 1;
+               vol->secFlg |= CIFSSEC_MAY_NTLM;
                break;
        default:
                cifs_dbg(VFS, "bad security option: %s\n", value);