Reported-by: Dennis Gilmore
Signed-off-by: David S. Miller
diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig
index ea0b386..ad1cd59 100644
--- a/drivers/crypto/Kconfig
+++ b/drivers/crypto/Kconfig
@@ -172,6 +172,7 @@ config CRYPTO_DEV_MV_CESA
config CRYPTO_DEV_NIAGARA2
tri
From: Shirish Pargaonkar
Use crypto apis to generate smb signagtures.
Use hmac-md5 to genereate ntlmv2 hash, ntlmv2 response, and HMAC (CR1 of
ntlmv2 auth blob.
User crypto apis to genereate signature and to verify signature.
md5 hash is used to calculate signature.
Use secondary key to calculat
From: Shirish Pargaonkar
Use kernel crypto sync hash apis insetead of cifs crypto functions.
The calls typically corrospond one to one except that insead of
key init, setkey is used.
Signed-off-by: Shirish Pargaonkar
---
fs/cifs/cifsencrypt.c | 152 ---
From: Shirish Pargaonkar
Mark dependency on crypto modules in Kconfig.
Defining per structures sdesc and cifs_secmech which are used to store
crypto hash functions and contexts. They are stored per smb connection
and used for all auth mechs to genereate hash values and signatures.
Allocate cr
From: Shirish Pargaonkar
structure ntlmssp_auth and filed cphready is defined as per smb connection.
ntlmssp_auth holds secondary key which is a nonce that gets used as a key
to generate signatures, ciphertext is genereated by rc4/arc4 encryption of
secondary key using ntlmv2 session key and sen
From: Shirish Pargaonkar
To calculate ntlmv2 response we need ti/av pair blob.
For sec mech like ntlmssp, the blob is plucked from type 2 response from
the server. From this blob, netbios name of the domain is retrieved,
if user has not already provided, to be included in the Target String
as p
From: Shirish Pargaonkar
Attribue Value (AV) pairs or Target Info (TI) pairs are part of
ntlmv2 authentication.
Structure ntlmv2_resp had only definition for two av pairs.
So removed it, and now allocation of av pairs is dynamic.
For servers like Windows 7/2008, av pairs sent by server in
challe
On 09/09/2010 09:43 PM, Shirish Pargaonkar wrote:
> On Thu, Sep 9, 2010 at 7:00 AM, Suresh Jayaraman wrote:
>> On 09/08/2010 10:15 AM, shirishpargaon...@gmail.com wrote:
>>> From: Shirish Pargaonkar
>>>
>>>
>>> Allocate crypto hashing functions, ecurity descriptiors, and respective
>>> contexts w
On Thu, Sep 9, 2010 at 7:00 AM, Suresh Jayaraman wrote:
> On 09/08/2010 10:15 AM, shirishpargaon...@gmail.com wrote:
>> From: Shirish Pargaonkar
>>
>>
>> Allocate crypto hashing functions, ecurity descriptiors, and respective
>> contexts when a smb/tcp connection is established.
>> Release them w