NIST SP800-138 availibility using kernel crypto APIs for SMB3.0 MAC generation

2013-05-19 Thread Shirish Pargaonkar
With the recent patches added to kernel crypto for improving AES support, adding aesni etc, it seems like it is time to add AES CMAC to the cifs kernel module (for the popular SMB3 signing and per-share encryption) but needed for an implementation for SP800-138 in kernel crypto codebase. Was

Re: [PATCH] cifs: Use ecb des kernel crypto APIs instead of local cifs functions

2011-02-17 Thread Shirish Pargaonkar
On Mon, Feb 14, 2011 at 5:33 PM, shirishpargaon...@gmail.com wrote: From: Shirish Pargaonkar shirishpargaon...@gmail.com Use kernel crypto APIs for DES encryption during LM and NT hash generation instead of local functions within cifs. Source file smbdes.c is deleted excpet four functions

Re: [PATCH] cifs: Replace cifs md5 hashing functions with kernel crypto APIs

2011-01-21 Thread Shirish Pargaonkar
On Fri, Jan 21, 2011 at 9:42 AM, Jeff Layton jlay...@redhat.com wrote: On Fri, 21 Jan 2011 09:04:05 -0600 shirishpargaon...@gmail.com wrote: From: Shirish Pargaonkar shirishpargaon...@gmail.com Replace remaining use of md5 hash functions local to cifs module with kernel crypto APIs. Remove

Re: [PATCH] cifs: Replace cifs md5 hashing functions with kernel crypto APIs

2011-01-21 Thread Shirish Pargaonkar
On Fri, Jan 21, 2011 at 11:07 AM, Stefan (metze) Metzmacher me...@samba.org wrote: Hi Shirish, From: Shirish Pargaonkar shirishpargaon...@gmail.com Replace remaining use of md5 hash functions local to cifs module with kernel crypto APIs. Remove header and source file containing those local

Re: [PATCH -v2 1/6] functions to either extract or create av_ pair/ti_info blob

2011-01-20 Thread Shirish Pargaonkar
On Thu, Jan 20, 2011 at 3:56 PM, shirishpargaon...@gmail.com wrote: From: Shirish Pargaonkar shirishpargaon...@gmail.com Attribue Value (AV) pairs or Target Info (TI) pairs are part of ntlmv2 authentication. Structure ntlmv2_resp had only definition for two av pairs. So removed it, and now

Re: [PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code

2010-09-12 Thread Shirish Pargaonkar
On Sun, Sep 12, 2010 at 7:52 AM, Jeff Layton jlay...@samba.org wrote: On Thu,  9 Sep 2010 13:12:40 -0500 shirishpargaon...@gmail.com wrote: From: Shirish Pargaonkar shirishpargaon...@gmail.com To calculate ntlmv2 response we need ti/av pair blob. For sec mech like ntlmssp, the blob

Re: [PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code

2010-09-12 Thread Shirish Pargaonkar
On Sun, Sep 12, 2010 at 9:25 PM, Jeff Layton jlay...@samba.org wrote: Would it be reasonable to split the simple mac_key to session_key rename part into a separate patch from the ones that actually change behavior? OK. But I am not sure what we are trying to achieve here churning these

Re: [PATCH 4/8] ntlmv2/ntlmssp define, declare, and use crypto hash functions

2010-09-09 Thread Shirish Pargaonkar
On Thu, Sep 9, 2010 at 7:00 AM, Suresh Jayaraman sjayara...@suse.de wrote: On 09/08/2010 10:15 AM, shirishpargaon...@gmail.com wrote: From: Shirish Pargaonkar shirishpargaon...@gmail.com Allocate crypto hashing functions, ecurity descriptiors, and respective contexts when a smb/tcp

Re: [PATCH 7/8 Rev2] ntlmv2/ntlmssp generate secondary session key and ciphertext and send it if signing enabled

2010-09-08 Thread Shirish Pargaonkar
On Wed, Sep 8, 2010 at 12:25 PM, Jeff Layton jlay...@poochiereds.net wrote: On Wed,  8 Sep 2010 12:04:38 -0500 shirishpargaon...@gmail.com wrote: From: Shirish Pargaonkar shirishpargaon...@gmail.com A key is exchanged with the server if client indicates so in flags in type 1 messsage

Re: crypto apis in cifs module allocating storage for character array during run-time vs. dynamic allocation

2010-08-24 Thread Shirish Pargaonkar
On Mon, Aug 23, 2010 at 5:39 PM, Miloslav Trmac m...@redhat.com wrote: - Shirish Pargaonkar shirishpargaon...@gmail.com wrote: Instead of determining and allocating a char array for use during usage of crypto_shash_* calls, would like to instead dynamically allocate (and free) storage

Re: [linux-cifs-client][patch] Make NTLMv2 as auth mech withing NTLMSSP and enable signing using crypto shash APIs

2010-08-21 Thread Shirish Pargaonkar
the type of key it holds. Use kernel crypto_shash_* APIs instead of the equivalent cifs functions. From 6ab552fd60804f3c708e1745ca936112fc9f9821 Mon Sep 17 00:00:00 2001 From: Shirish Pargaonkar shirishpargaon...@gmail.com Date: Wed, 4 Aug 2010 17:24:07 -0500 Subject: [PATCH] Make ntlmv2 as auth

Re: [linux-cifs-client][PATCH] Enable signing for ntlmv2 within NTLMSSP using kernel crypto APIs

2010-08-02 Thread Shirish Pargaonkar
On Mon, Aug 2, 2010 at 1:55 AM, Herbert Xu herb...@gondor.apana.org.au wrote: shirishpargaon...@gmail.com wrote: static int cifs_calculate_signature(const struct smb_hdr *cifs_pdu, -                                   const struct mac_key *key, char *signature) +                       struct

using hmac-sha256 to generate smb2 signagures and oopsing

2010-07-21 Thread Shirish Pargaonkar
Not sure the oops, wondering what am I doing incorrect while invoking ahash_request_set_crypt with an array of scatterlist and then calling ahash_crypto_digest. Just to experiment, I called ahash_request_set_crypt with a single scatterlist and I did not oops. Any help/pointers are appreciated.