[PATCH] crypto: Niagara2 driver needs to depend upon CRYPTO_DES.

2010-09-09 Thread David Miller
Reported-by: Dennis Gilmore Signed-off-by: David S. Miller diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig index ea0b386..ad1cd59 100644 --- a/drivers/crypto/Kconfig +++ b/drivers/crypto/Kconfig @@ -172,6 +172,7 @@ config CRYPTO_DEV_MV_CESA config CRYPTO_DEV_NIAGARA2 tri

[PATCH -v2 6/6] convert signature calculations to use crypto apis

2010-09-09 Thread shirishpargaonkar
From: Shirish Pargaonkar Use crypto apis to generate smb signagtures. Use hmac-md5 to genereate ntlmv2 hash, ntlmv2 response, and HMAC (CR1 of ntlmv2 auth blob. User crypto apis to genereate signature and to verify signature. md5 hash is used to calculate signature. Use secondary key to calculat

[PATCH -v2 5/6] convert hash calculations to use crypto apis

2010-09-09 Thread shirishpargaonkar
From: Shirish Pargaonkar Use kernel crypto sync hash apis insetead of cifs crypto functions. The calls typically corrospond one to one except that insead of key init, setkey is used. Signed-off-by: Shirish Pargaonkar --- fs/cifs/cifsencrypt.c | 152 ---

[PATCH -v2 3/6] define, declare, and use crypto hash functions

2010-09-09 Thread shirishpargaonkar
From: Shirish Pargaonkar Mark dependency on crypto modules in Kconfig. Defining per structures sdesc and cifs_secmech which are used to store crypto hash functions and contexts. They are stored per smb connection and used for all auth mechs to genereate hash values and signatures. Allocate cr

[PATCH -v2 4/6] generate secondary session key and ciphertext and send it if signing enabled

2010-09-09 Thread shirishpargaonkar
From: Shirish Pargaonkar structure ntlmssp_auth and filed cphready is defined as per smb connection. ntlmssp_auth holds secondary key which is a nonce that gets used as a key to generate signatures, ciphertext is genereated by rc4/arc4 encryption of secondary key using ntlmv2 session key and sen

[PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code

2010-09-09 Thread shirishpargaonkar
From: Shirish Pargaonkar To calculate ntlmv2 response we need ti/av pair blob. For sec mech like ntlmssp, the blob is plucked from type 2 response from the server. From this blob, netbios name of the domain is retrieved, if user has not already provided, to be included in the Target String as p

[PATCH -v2 1/6] functions to either extract or create av_ pair/ti_info blob

2010-09-09 Thread shirishpargaonkar
From: Shirish Pargaonkar Attribue Value (AV) pairs or Target Info (TI) pairs are part of ntlmv2 authentication. Structure ntlmv2_resp had only definition for two av pairs. So removed it, and now allocation of av pairs is dynamic. For servers like Windows 7/2008, av pairs sent by server in challe

Re: [PATCH 4/8] ntlmv2/ntlmssp define, declare, and use crypto hash functions

2010-09-09 Thread Suresh Jayaraman
On 09/09/2010 09:43 PM, Shirish Pargaonkar wrote: > On Thu, Sep 9, 2010 at 7:00 AM, Suresh Jayaraman wrote: >> On 09/08/2010 10:15 AM, shirishpargaon...@gmail.com wrote: >>> From: Shirish Pargaonkar >>> >>> >>> Allocate crypto hashing functions, ecurity descriptiors, and respective >>> contexts w

Re: [PATCH 4/8] ntlmv2/ntlmssp define, declare, and use crypto hash functions

2010-09-09 Thread Shirish Pargaonkar
On Thu, Sep 9, 2010 at 7:00 AM, Suresh Jayaraman wrote: > On 09/08/2010 10:15 AM, shirishpargaon...@gmail.com wrote: >> From: Shirish Pargaonkar >> >> >> Allocate crypto hashing functions, ecurity descriptiors, and respective >> contexts when a smb/tcp connection is established. >> Release them w