With the recent patches added to kernel crypto for improving AES
support, adding aesni etc, it seems like it is time to add AES CMAC
to the cifs kernel module (for the popular SMB3 signing and per-share
encryption) but needed for an implementation for SP800-138 in kernel
crypto codebase.
Was
On Mon, Feb 14, 2011 at 5:33 PM, shirishpargaon...@gmail.com wrote:
From: Shirish Pargaonkar shirishpargaon...@gmail.com
Use kernel crypto APIs for DES encryption during LM and NT hash generation
instead of local functions within cifs.
Source file smbdes.c is deleted excpet four functions
On Fri, Jan 21, 2011 at 9:42 AM, Jeff Layton jlay...@redhat.com wrote:
On Fri, 21 Jan 2011 09:04:05 -0600
shirishpargaon...@gmail.com wrote:
From: Shirish Pargaonkar shirishpargaon...@gmail.com
Replace remaining use of md5 hash functions local to cifs module
with kernel crypto APIs.
Remove
On Fri, Jan 21, 2011 at 11:07 AM, Stefan (metze) Metzmacher
me...@samba.org wrote:
Hi Shirish,
From: Shirish Pargaonkar shirishpargaon...@gmail.com
Replace remaining use of md5 hash functions local to cifs module
with kernel crypto APIs.
Remove header and source file containing those local
On Thu, Jan 20, 2011 at 3:56 PM, shirishpargaon...@gmail.com wrote:
From: Shirish Pargaonkar shirishpargaon...@gmail.com
Attribue Value (AV) pairs or Target Info (TI) pairs are part of
ntlmv2 authentication.
Structure ntlmv2_resp had only definition for two av pairs.
So removed it, and now
On Sun, Sep 12, 2010 at 7:52 AM, Jeff Layton jlay...@samba.org wrote:
On Thu, 9 Sep 2010 13:12:40 -0500
shirishpargaon...@gmail.com wrote:
From: Shirish Pargaonkar shirishpargaon...@gmail.com
To calculate ntlmv2 response we need ti/av pair blob.
For sec mech like ntlmssp, the blob
On Sun, Sep 12, 2010 at 9:25 PM, Jeff Layton jlay...@samba.org wrote:
Would it be reasonable to split the simple mac_key to session_key
rename part into a separate patch from the ones that actually change
behavior?
OK. But I am not sure what we are trying to achieve here churning
these
On Thu, Sep 9, 2010 at 7:00 AM, Suresh Jayaraman sjayara...@suse.de wrote:
On 09/08/2010 10:15 AM, shirishpargaon...@gmail.com wrote:
From: Shirish Pargaonkar shirishpargaon...@gmail.com
Allocate crypto hashing functions, ecurity descriptiors, and respective
contexts when a smb/tcp
On Wed, Sep 8, 2010 at 12:25 PM, Jeff Layton jlay...@poochiereds.net wrote:
On Wed, 8 Sep 2010 12:04:38 -0500
shirishpargaon...@gmail.com wrote:
From: Shirish Pargaonkar shirishpargaon...@gmail.com
A key is exchanged with the server if client indicates so in flags in
type 1 messsage
On Mon, Aug 23, 2010 at 5:39 PM, Miloslav Trmac m...@redhat.com wrote:
- Shirish Pargaonkar shirishpargaon...@gmail.com wrote:
Instead of determining and allocating a char array for use during usage of
crypto_shash_* calls, would like to instead dynamically
allocate (and free) storage
the type of key it holds.
Use kernel crypto_shash_* APIs instead of the equivalent cifs functions.
From 6ab552fd60804f3c708e1745ca936112fc9f9821 Mon Sep 17 00:00:00 2001
From: Shirish Pargaonkar shirishpargaon...@gmail.com
Date: Wed, 4 Aug 2010 17:24:07 -0500
Subject: [PATCH] Make ntlmv2 as auth
On Mon, Aug 2, 2010 at 1:55 AM, Herbert Xu herb...@gondor.apana.org.au wrote:
shirishpargaon...@gmail.com wrote:
static int cifs_calculate_signature(const struct smb_hdr *cifs_pdu,
- const struct mac_key *key, char
*signature)
+ struct
Not sure the oops, wondering what am I doing incorrect while invoking
ahash_request_set_crypt with an array of scatterlist and then calling
ahash_crypto_digest.
Just to experiment, I called ahash_request_set_crypt with a single
scatterlist and I did not oops.
Any help/pointers are appreciated.
13 matches
Mail list logo