| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* | 
 | 2 |  *   fs/cifs/cifsencrypt.c | 
 | 3 |  * | 
| Steve French | 12b3b8f | 2006-02-09 21:12:47 +0000 | [diff] [blame] | 4 |  *   Copyright (C) International Business Machines  Corp., 2005,2006 | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 5 |  *   Author(s): Steve French (sfrench@us.ibm.com) | 
 | 6 |  * | 
 | 7 |  *   This library is free software; you can redistribute it and/or modify | 
 | 8 |  *   it under the terms of the GNU Lesser General Public License as published | 
 | 9 |  *   by the Free Software Foundation; either version 2.1 of the License, or | 
 | 10 |  *   (at your option) any later version. | 
 | 11 |  * | 
 | 12 |  *   This library is distributed in the hope that it will be useful, | 
 | 13 |  *   but WITHOUT ANY WARRANTY; without even the implied warranty of | 
 | 14 |  *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See | 
 | 15 |  *   the GNU Lesser General Public License for more details. | 
 | 16 |  * | 
 | 17 |  *   You should have received a copy of the GNU Lesser General Public License | 
 | 18 |  *   along with this library; if not, write to the Free Software | 
 | 19 |  *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | 
 | 20 |  */ | 
 | 21 |  | 
 | 22 | #include <linux/fs.h> | 
| Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 23 | #include <linux/slab.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 24 | #include "cifspdu.h" | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 25 | #include "cifsglob.h" | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 26 | #include "cifs_debug.h" | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 27 | #include "cifs_unicode.h" | 
 | 28 | #include "cifsproto.h" | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 29 | #include "ntlmssp.h" | 
| Steve French | 7c7b25b | 2006-06-01 19:20:10 +0000 | [diff] [blame] | 30 | #include <linux/ctype.h> | 
| Steve French | 6d027cf | 2006-06-05 16:26:05 +0000 | [diff] [blame] | 31 | #include <linux/random.h> | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 32 |  | 
| Jeff Layton | 157c249 | 2011-04-02 07:34:30 -0400 | [diff] [blame] | 33 | /* | 
 | 34 |  * Calculate and return the CIFS signature based on the mac key and SMB PDU. | 
 | 35 |  * The 16 byte signature must be allocated by the caller. Note we only use the | 
 | 36 |  * 1st eight bytes and that the smb header signature field on input contains | 
 | 37 |  * the sequence number before this function is called. Also, this function | 
 | 38 |  * should be called with the server->srv_mutex held. | 
 | 39 |  */ | 
| Jeff Layton | 826a95e | 2011-10-11 06:41:32 -0400 | [diff] [blame] | 40 | static int cifs_calc_signature(const struct kvec *iov, int n_vec, | 
 | 41 | 			struct TCP_Server_Info *server, char *signature) | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 42 | { | 
| Steve French | e9917a0 | 2006-03-31 21:22:00 +0000 | [diff] [blame] | 43 | 	int i; | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 44 | 	int rc; | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 45 |  | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 46 | 	if (iov == NULL || signature == NULL || server == NULL) | 
| Steve French | e9917a0 | 2006-03-31 21:22:00 +0000 | [diff] [blame] | 47 | 		return -EINVAL; | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 48 |  | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 49 | 	if (!server->secmech.sdescmd5) { | 
 | 50 | 		cERROR(1, "%s: Can't generate signature\n", __func__); | 
 | 51 | 		return -1; | 
 | 52 | 	} | 
 | 53 |  | 
 | 54 | 	rc = crypto_shash_init(&server->secmech.sdescmd5->shash); | 
 | 55 | 	if (rc) { | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 56 | 		cERROR(1, "%s: Could not init md5\n", __func__); | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 57 | 		return rc; | 
 | 58 | 	} | 
 | 59 |  | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 60 | 	rc = crypto_shash_update(&server->secmech.sdescmd5->shash, | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 61 | 		server->session_key.response, server->session_key.len); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 62 | 	if (rc) { | 
 | 63 | 		cERROR(1, "%s: Could not update with response\n", __func__); | 
 | 64 | 		return rc; | 
 | 65 | 	} | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 66 |  | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 67 | 	for (i = 0; i < n_vec; i++) { | 
| Jeff Layton | 745542e | 2007-11-03 04:34:04 +0000 | [diff] [blame] | 68 | 		if (iov[i].iov_len == 0) | 
 | 69 | 			continue; | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 70 | 		if (iov[i].iov_base == NULL) { | 
| Steve French | 56234e2 | 2010-09-08 20:57:05 +0000 | [diff] [blame] | 71 | 			cERROR(1, "null iovec entry"); | 
| Steve French | e9917a0 | 2006-03-31 21:22:00 +0000 | [diff] [blame] | 72 | 			return -EIO; | 
| Jeff Layton | 745542e | 2007-11-03 04:34:04 +0000 | [diff] [blame] | 73 | 		} | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 74 | 		/* The first entry includes a length field (which does not get | 
| Steve French | e9917a0 | 2006-03-31 21:22:00 +0000 | [diff] [blame] | 75 | 		   signed that occupies the first 4 bytes before the header */ | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 76 | 		if (i == 0) { | 
| Steve French | 63d2583 | 2007-11-05 21:46:10 +0000 | [diff] [blame] | 77 | 			if (iov[0].iov_len <= 8) /* cmd field at offset 9 */ | 
| Steve French | e9917a0 | 2006-03-31 21:22:00 +0000 | [diff] [blame] | 78 | 				break; /* nothing to sign or corrupt header */ | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 79 | 			rc = | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 80 | 			crypto_shash_update(&server->secmech.sdescmd5->shash, | 
 | 81 | 				iov[i].iov_base + 4, iov[i].iov_len - 4); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 82 | 		} else { | 
 | 83 | 			rc = | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 84 | 			crypto_shash_update(&server->secmech.sdescmd5->shash, | 
 | 85 | 				iov[i].iov_base, iov[i].iov_len); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 86 | 		} | 
 | 87 | 		if (rc) { | 
 | 88 | 			cERROR(1, "%s: Could not update with payload\n", | 
 | 89 | 							__func__); | 
 | 90 | 			return rc; | 
 | 91 | 		} | 
| Steve French | e9917a0 | 2006-03-31 21:22:00 +0000 | [diff] [blame] | 92 | 	} | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 93 |  | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 94 | 	rc = crypto_shash_final(&server->secmech.sdescmd5->shash, signature); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 95 | 	if (rc) | 
 | 96 | 		cERROR(1, "%s: Could not generate md5 hash\n", __func__); | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 97 |  | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 98 | 	return rc; | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 99 | } | 
 | 100 |  | 
| Jeff Layton | a0f8b4f | 2011-01-07 11:30:28 -0500 | [diff] [blame] | 101 | /* must be called with server->srv_mutex held */ | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 102 | int cifs_sign_smb2(struct kvec *iov, int n_vec, struct TCP_Server_Info *server, | 
| Steve French | 63d2583 | 2007-11-05 21:46:10 +0000 | [diff] [blame] | 103 | 		   __u32 *pexpected_response_sequence_number) | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 104 | { | 
 | 105 | 	int rc = 0; | 
 | 106 | 	char smb_signature[20]; | 
| Jeff Layton | 826a95e | 2011-10-11 06:41:32 -0400 | [diff] [blame] | 107 | 	struct smb_hdr *cifs_pdu = (struct smb_hdr *)iov[0].iov_base; | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 108 |  | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 109 | 	if ((cifs_pdu == NULL) || (server == NULL)) | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 110 | 		return -EINVAL; | 
 | 111 |  | 
| Jeff Layton | 998d6fc | 2011-07-26 12:21:17 -0400 | [diff] [blame] | 112 | 	if (!(cifs_pdu->Flags2 & SMBFLG2_SECURITY_SIGNATURE) || | 
 | 113 | 	    server->tcpStatus == CifsNeedNegotiate) | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 114 | 		return rc; | 
 | 115 |  | 
| Jeff Layton | 998d6fc | 2011-07-26 12:21:17 -0400 | [diff] [blame] | 116 | 	if (!server->session_estab) { | 
| Jeff Layton | b4dacbc | 2011-10-11 06:41:32 -0400 | [diff] [blame] | 117 | 		memcpy(cifs_pdu->Signature.SecuritySignature, "BSRSPYL", 8); | 
| Jeff Layton | 998d6fc | 2011-07-26 12:21:17 -0400 | [diff] [blame] | 118 | 		return rc; | 
 | 119 | 	} | 
 | 120 |  | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 121 | 	cifs_pdu->Signature.Sequence.SequenceNumber = | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 122 | 				cpu_to_le32(server->sequence_number); | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 123 | 	cifs_pdu->Signature.Sequence.Reserved = 0; | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 124 |  | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 125 | 	*pexpected_response_sequence_number = server->sequence_number++; | 
 | 126 | 	server->sequence_number++; | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 127 |  | 
| Jeff Layton | 826a95e | 2011-10-11 06:41:32 -0400 | [diff] [blame] | 128 | 	rc = cifs_calc_signature(iov, n_vec, server, smb_signature); | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 129 | 	if (rc) | 
 | 130 | 		memset(cifs_pdu->Signature.SecuritySignature, 0, 8); | 
 | 131 | 	else | 
 | 132 | 		memcpy(cifs_pdu->Signature.SecuritySignature, smb_signature, 8); | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 133 |  | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 134 | 	return rc; | 
| Steve French | 84afc29 | 2005-12-02 13:32:45 -0800 | [diff] [blame] | 135 | } | 
 | 136 |  | 
| Jeff Layton | 826a95e | 2011-10-11 06:41:32 -0400 | [diff] [blame] | 137 | /* must be called with server->srv_mutex held */ | 
 | 138 | int cifs_sign_smb(struct smb_hdr *cifs_pdu, struct TCP_Server_Info *server, | 
 | 139 | 		  __u32 *pexpected_response_sequence_number) | 
 | 140 | { | 
 | 141 | 	struct kvec iov; | 
 | 142 |  | 
 | 143 | 	iov.iov_base = cifs_pdu; | 
 | 144 | 	iov.iov_len = be32_to_cpu(cifs_pdu->smb_buf_length) + 4; | 
 | 145 |  | 
 | 146 | 	return cifs_sign_smb2(&iov, 1, server, | 
 | 147 | 			      pexpected_response_sequence_number); | 
 | 148 | } | 
 | 149 |  | 
 | 150 | int cifs_verify_signature(struct kvec *iov, unsigned int nr_iov, | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 151 | 			  struct TCP_Server_Info *server, | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 152 | 			  __u32 expected_sequence_number) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 153 | { | 
| Steve French | c8e56f1 | 2010-09-08 21:10:58 +0000 | [diff] [blame] | 154 | 	unsigned int rc; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 155 | 	char server_response_sig[8]; | 
 | 156 | 	char what_we_think_sig_should_be[20]; | 
| Jeff Layton | 826a95e | 2011-10-11 06:41:32 -0400 | [diff] [blame] | 157 | 	struct smb_hdr *cifs_pdu = (struct smb_hdr *)iov[0].iov_base; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 158 |  | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 159 | 	if (cifs_pdu == NULL || server == NULL) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 160 | 		return -EINVAL; | 
 | 161 |  | 
| Jeff Layton | 9c4843e | 2011-06-06 15:40:23 -0400 | [diff] [blame] | 162 | 	if (!server->session_estab) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 163 | 		return 0; | 
 | 164 |  | 
 | 165 | 	if (cifs_pdu->Command == SMB_COM_LOCKING_ANDX) { | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 166 | 		struct smb_com_lock_req *pSMB = | 
| Steve French | ffdd6e4 | 2007-06-24 21:15:44 +0000 | [diff] [blame] | 167 | 			(struct smb_com_lock_req *)cifs_pdu; | 
 | 168 | 	    if (pSMB->LockType & LOCKING_ANDX_OPLOCK_RELEASE) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 169 | 			return 0; | 
 | 170 | 	} | 
 | 171 |  | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 172 | 	/* BB what if signatures are supposed to be on for session but | 
 | 173 | 	   server does not send one? BB */ | 
 | 174 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 175 | 	/* Do not need to verify session setups with signature "BSRSPYL "  */ | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 176 | 	if (memcmp(cifs_pdu->Signature.SecuritySignature, "BSRSPYL ", 8) == 0) | 
| Joe Perches | b6b38f7 | 2010-04-21 03:50:45 +0000 | [diff] [blame] | 177 | 		cFYI(1, "dummy signature received for smb command 0x%x", | 
 | 178 | 			cifs_pdu->Command); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 179 |  | 
 | 180 | 	/* save off the origiginal signature so we can modify the smb and check | 
 | 181 | 		its signature against what the server sent */ | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 182 | 	memcpy(server_response_sig, cifs_pdu->Signature.SecuritySignature, 8); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 183 |  | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 184 | 	cifs_pdu->Signature.Sequence.SequenceNumber = | 
 | 185 | 					cpu_to_le32(expected_sequence_number); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 186 | 	cifs_pdu->Signature.Sequence.Reserved = 0; | 
 | 187 |  | 
| Jeff Layton | 157c249 | 2011-04-02 07:34:30 -0400 | [diff] [blame] | 188 | 	mutex_lock(&server->srv_mutex); | 
| Jeff Layton | 826a95e | 2011-10-11 06:41:32 -0400 | [diff] [blame] | 189 | 	rc = cifs_calc_signature(iov, nr_iov, server, | 
 | 190 | 				 what_we_think_sig_should_be); | 
| Jeff Layton | 157c249 | 2011-04-02 07:34:30 -0400 | [diff] [blame] | 191 | 	mutex_unlock(&server->srv_mutex); | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 192 |  | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 193 | 	if (rc) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 194 | 		return rc; | 
 | 195 |  | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 196 | /*	cifs_dump_mem("what we think it should be: ", | 
 | 197 | 		      what_we_think_sig_should_be, 16); */ | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 198 |  | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 199 | 	if (memcmp(server_response_sig, what_we_think_sig_should_be, 8)) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 200 | 		return -EACCES; | 
 | 201 | 	else | 
 | 202 | 		return 0; | 
 | 203 |  | 
 | 204 | } | 
 | 205 |  | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 206 | /* first calculate 24 bytes ntlm response and then 16 byte session key */ | 
| Shirish Pargaonkar | 9ef5992 | 2011-10-20 13:21:59 -0500 | [diff] [blame] | 207 | int setup_ntlm_response(struct cifs_ses *ses, const struct nls_table *nls_cp) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 208 | { | 
| Shirish Pargaonkar | ee2c925 | 2011-01-27 09:58:04 -0600 | [diff] [blame] | 209 | 	int rc = 0; | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 210 | 	unsigned int temp_len = CIFS_SESS_KEY_SIZE + CIFS_AUTH_RESP_SIZE; | 
 | 211 | 	char temp_key[CIFS_SESS_KEY_SIZE]; | 
 | 212 |  | 
 | 213 | 	if (!ses) | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 214 | 		return -EINVAL; | 
 | 215 |  | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 216 | 	ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); | 
 | 217 | 	if (!ses->auth_key.response) { | 
 | 218 | 		cERROR(1, "NTLM can't allocate (%u bytes) memory", temp_len); | 
 | 219 | 		return -ENOMEM; | 
 | 220 | 	} | 
 | 221 | 	ses->auth_key.len = temp_len; | 
 | 222 |  | 
| Shirish Pargaonkar | ee2c925 | 2011-01-27 09:58:04 -0600 | [diff] [blame] | 223 | 	rc = SMBNTencrypt(ses->password, ses->server->cryptkey, | 
| Shirish Pargaonkar | 9ef5992 | 2011-10-20 13:21:59 -0500 | [diff] [blame] | 224 | 			ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); | 
| Shirish Pargaonkar | ee2c925 | 2011-01-27 09:58:04 -0600 | [diff] [blame] | 225 | 	if (rc) { | 
 | 226 | 		cFYI(1, "%s Can't generate NTLM response, error: %d", | 
 | 227 | 			__func__, rc); | 
 | 228 | 		return rc; | 
 | 229 | 	} | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 230 |  | 
| Shirish Pargaonkar | 9ef5992 | 2011-10-20 13:21:59 -0500 | [diff] [blame] | 231 | 	rc = E_md4hash(ses->password, temp_key, nls_cp); | 
| Shirish Pargaonkar | ee2c925 | 2011-01-27 09:58:04 -0600 | [diff] [blame] | 232 | 	if (rc) { | 
 | 233 | 		cFYI(1, "%s Can't generate NT hash, error: %d", __func__, rc); | 
 | 234 | 		return rc; | 
 | 235 | 	} | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 236 |  | 
| Shirish Pargaonkar | ee2c925 | 2011-01-27 09:58:04 -0600 | [diff] [blame] | 237 | 	rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); | 
 | 238 | 	if (rc) | 
 | 239 | 		cFYI(1, "%s Can't generate NTLM session key, error: %d", | 
 | 240 | 			__func__, rc); | 
 | 241 |  | 
 | 242 | 	return rc; | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 243 | } | 
 | 244 |  | 
| Steve French | 7c7b25b | 2006-06-01 19:20:10 +0000 | [diff] [blame] | 245 | #ifdef CONFIG_CIFS_WEAK_PW_HASH | 
| Steve French | 43988d7 | 2011-04-19 18:23:31 +0000 | [diff] [blame] | 246 | int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, | 
| Jeff Layton | 4e53a3f | 2008-12-05 20:41:21 -0500 | [diff] [blame] | 247 | 			char *lnm_session_key) | 
| Steve French | 7c7b25b | 2006-06-01 19:20:10 +0000 | [diff] [blame] | 248 | { | 
 | 249 | 	int i; | 
| Steve French | 43988d7 | 2011-04-19 18:23:31 +0000 | [diff] [blame] | 250 | 	int rc; | 
| Steve French | 7c7b25b | 2006-06-01 19:20:10 +0000 | [diff] [blame] | 251 | 	char password_with_pad[CIFS_ENCPWD_SIZE]; | 
 | 252 |  | 
 | 253 | 	memset(password_with_pad, 0, CIFS_ENCPWD_SIZE); | 
| Jeff Layton | 4e53a3f | 2008-12-05 20:41:21 -0500 | [diff] [blame] | 254 | 	if (password) | 
 | 255 | 		strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); | 
| Steve French | 7c7b25b | 2006-06-01 19:20:10 +0000 | [diff] [blame] | 256 |  | 
| Jeff Layton | 04912d6 | 2010-04-24 07:57:45 -0400 | [diff] [blame] | 257 | 	if (!encrypt && global_secflags & CIFSSEC_MAY_PLNTXT) { | 
| Jeff Layton | 4e53a3f | 2008-12-05 20:41:21 -0500 | [diff] [blame] | 258 | 		memset(lnm_session_key, 0, CIFS_SESS_KEY_SIZE); | 
 | 259 | 		memcpy(lnm_session_key, password_with_pad, | 
 | 260 | 			CIFS_ENCPWD_SIZE); | 
| Steve French | 43988d7 | 2011-04-19 18:23:31 +0000 | [diff] [blame] | 261 | 		return 0; | 
| Jeff Layton | 4e53a3f | 2008-12-05 20:41:21 -0500 | [diff] [blame] | 262 | 	} | 
| Steve French | bdc4bf6e | 2006-06-02 22:57:13 +0000 | [diff] [blame] | 263 |  | 
| Steve French | 7c7b25b | 2006-06-01 19:20:10 +0000 | [diff] [blame] | 264 | 	/* calculate old style session key */ | 
 | 265 | 	/* calling toupper is less broken than repeatedly | 
 | 266 | 	calling nls_toupper would be since that will never | 
 | 267 | 	work for UTF8, but neither handles multibyte code pages | 
 | 268 | 	but the only alternative would be converting to UCS-16 (Unicode) | 
 | 269 | 	(using a routine something like UniStrupr) then | 
 | 270 | 	uppercasing and then converting back from Unicode - which | 
 | 271 | 	would only worth doing it if we knew it were utf8. Basically | 
 | 272 | 	utf8 and other multibyte codepages each need their own strupper | 
 | 273 | 	function since a byte at a time will ont work. */ | 
 | 274 |  | 
| Shirish Pargaonkar | ef571ca | 2008-07-24 15:56:05 +0000 | [diff] [blame] | 275 | 	for (i = 0; i < CIFS_ENCPWD_SIZE; i++) | 
| Steve French | 7c7b25b | 2006-06-01 19:20:10 +0000 | [diff] [blame] | 276 | 		password_with_pad[i] = toupper(password_with_pad[i]); | 
| Steve French | 7c7b25b | 2006-06-01 19:20:10 +0000 | [diff] [blame] | 277 |  | 
| Steve French | 43988d7 | 2011-04-19 18:23:31 +0000 | [diff] [blame] | 278 | 	rc = SMBencrypt(password_with_pad, cryptkey, lnm_session_key); | 
| Jeff Layton | 4e53a3f | 2008-12-05 20:41:21 -0500 | [diff] [blame] | 279 |  | 
| Steve French | 43988d7 | 2011-04-19 18:23:31 +0000 | [diff] [blame] | 280 | 	return rc; | 
| Steve French | 7c7b25b | 2006-06-01 19:20:10 +0000 | [diff] [blame] | 281 | } | 
 | 282 | #endif /* CIFS_WEAK_PW_HASH */ | 
 | 283 |  | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 284 | /* Build a proper attribute value/target info pairs blob. | 
 | 285 |  * Fill in netbios and dns domain name and workstation name | 
 | 286 |  * and client time (total five av pairs and + one end of fields indicator. | 
 | 287 |  * Allocate domain name which gets freed when session struct is deallocated. | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 288 |  */ | 
 | 289 | static int | 
| Steve French | 96daf2b | 2011-05-27 04:34:02 +0000 | [diff] [blame] | 290 | build_avpair_blob(struct cifs_ses *ses, const struct nls_table *nls_cp) | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 291 | { | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 292 | 	unsigned int dlen; | 
| Shirish Pargaonkar | cfbd6f8 | 2011-08-24 23:05:46 -0500 | [diff] [blame] | 293 | 	unsigned int size = 2 * sizeof(struct ntlmssp2_name); | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 294 | 	char *defdmname = "WORKGROUP"; | 
 | 295 | 	unsigned char *blobptr; | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 296 | 	struct ntlmssp2_name *attrptr; | 
 | 297 |  | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 298 | 	if (!ses->domainName) { | 
 | 299 | 		ses->domainName = kstrdup(defdmname, GFP_KERNEL); | 
 | 300 | 		if (!ses->domainName) | 
 | 301 | 			return -ENOMEM; | 
 | 302 | 	} | 
 | 303 |  | 
 | 304 | 	dlen = strlen(ses->domainName); | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 305 |  | 
| Shirish Pargaonkar | cfbd6f8 | 2011-08-24 23:05:46 -0500 | [diff] [blame] | 306 | 	/* | 
 | 307 | 	 * The length of this blob is two times the size of a | 
 | 308 | 	 * structure (av pair) which holds name/size | 
 | 309 | 	 * ( for NTLMSSP_AV_NB_DOMAIN_NAME followed by NTLMSSP_AV_EOL ) + | 
 | 310 | 	 * unicode length of a netbios domain name | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 311 | 	 */ | 
| Shirish Pargaonkar | cfbd6f8 | 2011-08-24 23:05:46 -0500 | [diff] [blame] | 312 | 	ses->auth_key.len = size + 2 * dlen; | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 313 | 	ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); | 
 | 314 | 	if (!ses->auth_key.response) { | 
 | 315 | 		ses->auth_key.len = 0; | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 316 | 		cERROR(1, "Challenge target info allocation failure"); | 
 | 317 | 		return -ENOMEM; | 
 | 318 | 	} | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 319 |  | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 320 | 	blobptr = ses->auth_key.response; | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 321 | 	attrptr = (struct ntlmssp2_name *) blobptr; | 
 | 322 |  | 
| Shirish Pargaonkar | cfbd6f8 | 2011-08-24 23:05:46 -0500 | [diff] [blame] | 323 | 	/* | 
 | 324 | 	 * As defined in MS-NTLM 3.3.2, just this av pair field | 
 | 325 | 	 * is sufficient as part of the temp | 
 | 326 | 	 */ | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 327 | 	attrptr->type = cpu_to_le16(NTLMSSP_AV_NB_DOMAIN_NAME); | 
 | 328 | 	attrptr->length = cpu_to_le16(2 * dlen); | 
 | 329 | 	blobptr = (unsigned char *)attrptr + sizeof(struct ntlmssp2_name); | 
| Steve French | acbbb76 | 2012-01-18 22:32:33 -0600 | [diff] [blame] | 330 | 	cifs_strtoUTF16((__le16 *)blobptr, ses->domainName, dlen, nls_cp); | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 331 |  | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 332 | 	return 0; | 
 | 333 | } | 
 | 334 |  | 
 | 335 | /* Server has provided av pairs/target info in the type 2 challenge | 
 | 336 |  * packet and we have plucked it and stored within smb session. | 
 | 337 |  * We parse that blob here to find netbios domain name to be used | 
 | 338 |  * as part of ntlmv2 authentication (in Target String), if not already | 
 | 339 |  * specified on the command line. | 
 | 340 |  * If this function returns without any error but without fetching | 
 | 341 |  * domain name, authentication may fail against some server but | 
 | 342 |  * may not fail against other (those who are not very particular | 
 | 343 |  * about target string i.e. for some, just user name might suffice. | 
 | 344 |  */ | 
 | 345 | static int | 
| Steve French | 96daf2b | 2011-05-27 04:34:02 +0000 | [diff] [blame] | 346 | find_domain_name(struct cifs_ses *ses, const struct nls_table *nls_cp) | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 347 | { | 
 | 348 | 	unsigned int attrsize; | 
 | 349 | 	unsigned int type; | 
 | 350 | 	unsigned int onesize = sizeof(struct ntlmssp2_name); | 
 | 351 | 	unsigned char *blobptr; | 
 | 352 | 	unsigned char *blobend; | 
 | 353 | 	struct ntlmssp2_name *attrptr; | 
 | 354 |  | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 355 | 	if (!ses->auth_key.len || !ses->auth_key.response) | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 356 | 		return 0; | 
 | 357 |  | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 358 | 	blobptr = ses->auth_key.response; | 
 | 359 | 	blobend = blobptr + ses->auth_key.len; | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 360 |  | 
 | 361 | 	while (blobptr + onesize < blobend) { | 
 | 362 | 		attrptr = (struct ntlmssp2_name *) blobptr; | 
 | 363 | 		type = le16_to_cpu(attrptr->type); | 
 | 364 | 		if (type == NTLMSSP_AV_EOL) | 
 | 365 | 			break; | 
 | 366 | 		blobptr += 2; /* advance attr type */ | 
 | 367 | 		attrsize = le16_to_cpu(attrptr->length); | 
 | 368 | 		blobptr += 2; /* advance attr size */ | 
 | 369 | 		if (blobptr + attrsize > blobend) | 
 | 370 | 			break; | 
 | 371 | 		if (type == NTLMSSP_AV_NB_DOMAIN_NAME) { | 
 | 372 | 			if (!attrsize) | 
 | 373 | 				break; | 
 | 374 | 			if (!ses->domainName) { | 
 | 375 | 				ses->domainName = | 
 | 376 | 					kmalloc(attrsize + 1, GFP_KERNEL); | 
 | 377 | 				if (!ses->domainName) | 
 | 378 | 						return -ENOMEM; | 
| Steve French | acbbb76 | 2012-01-18 22:32:33 -0600 | [diff] [blame] | 379 | 				cifs_from_utf16(ses->domainName, | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 380 | 					(__le16 *)blobptr, attrsize, attrsize, | 
| Shirish Pargaonkar | f7c5445 | 2010-10-26 18:10:24 -0500 | [diff] [blame] | 381 | 					nls_cp, false); | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 382 | 				break; | 
 | 383 | 			} | 
 | 384 | 		} | 
 | 385 | 		blobptr += attrsize; /* advance attr  value */ | 
 | 386 | 	} | 
 | 387 |  | 
 | 388 | 	return 0; | 
 | 389 | } | 
 | 390 |  | 
| Steve French | 96daf2b | 2011-05-27 04:34:02 +0000 | [diff] [blame] | 391 | static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash, | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 392 | 			    const struct nls_table *nls_cp) | 
| Steve French | a8ee034 | 2006-06-05 23:34:19 +0000 | [diff] [blame] | 393 | { | 
 | 394 | 	int rc = 0; | 
 | 395 | 	int len; | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 396 | 	char nt_hash[CIFS_NTHASH_SIZE]; | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 397 | 	wchar_t *user; | 
 | 398 | 	wchar_t *domain; | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 399 | 	wchar_t *server; | 
| Steve French | c8e56f1 | 2010-09-08 21:10:58 +0000 | [diff] [blame] | 400 |  | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 401 | 	if (!ses->server->secmech.sdeschmacmd5) { | 
 | 402 | 		cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash\n"); | 
 | 403 | 		return -1; | 
 | 404 | 	} | 
| Steve French | a8ee034 | 2006-06-05 23:34:19 +0000 | [diff] [blame] | 405 |  | 
 | 406 | 	/* calculate md4 hash of password */ | 
| Shirish Pargaonkar | 9ef5992 | 2011-10-20 13:21:59 -0500 | [diff] [blame] | 407 | 	E_md4hash(ses->password, nt_hash, nls_cp); | 
| Steve French | a8ee034 | 2006-06-05 23:34:19 +0000 | [diff] [blame] | 408 |  | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 409 | 	rc = crypto_shash_setkey(ses->server->secmech.hmacmd5, nt_hash, | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 410 | 				CIFS_NTHASH_SIZE); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 411 | 	if (rc) { | 
 | 412 | 		cERROR(1, "%s: Could not set NT Hash as a key", __func__); | 
 | 413 | 		return rc; | 
 | 414 | 	} | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 415 |  | 
 | 416 | 	rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash); | 
 | 417 | 	if (rc) { | 
 | 418 | 		cERROR(1, "calc_ntlmv2_hash: could not init hmacmd5\n"); | 
 | 419 | 		return rc; | 
 | 420 | 	} | 
| Steve French | a8ee034 | 2006-06-05 23:34:19 +0000 | [diff] [blame] | 421 |  | 
| Steve French | 8727c8a | 2011-02-25 01:11:56 -0600 | [diff] [blame] | 422 | 	/* convert ses->user_name to unicode and uppercase */ | 
| Jeff Layton | 04febab | 2012-01-17 16:09:15 -0500 | [diff] [blame] | 423 | 	len = ses->user_name ? strlen(ses->user_name) : 0; | 
| Steve French | 1717ffc | 2006-06-08 05:41:32 +0000 | [diff] [blame] | 424 | 	user = kmalloc(2 + (len * 2), GFP_KERNEL); | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 425 | 	if (user == NULL) { | 
 | 426 | 		cERROR(1, "calc_ntlmv2_hash: user mem alloc failure\n"); | 
 | 427 | 		rc = -ENOMEM; | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 428 | 		return rc; | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 429 | 	} | 
| Jeff Layton | 04febab | 2012-01-17 16:09:15 -0500 | [diff] [blame] | 430 |  | 
 | 431 | 	if (len) { | 
| Steve French | acbbb76 | 2012-01-18 22:32:33 -0600 | [diff] [blame] | 432 | 		len = cifs_strtoUTF16((__le16 *)user, ses->user_name, len, nls_cp); | 
| Jeff Layton | 04febab | 2012-01-17 16:09:15 -0500 | [diff] [blame] | 433 | 		UniStrupr(user); | 
 | 434 | 	} else { | 
 | 435 | 		memset(user, '\0', 2); | 
 | 436 | 	} | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 437 |  | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 438 | 	rc = crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash, | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 439 | 				(char *)user, 2 * len); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 440 | 	kfree(user); | 
 | 441 | 	if (rc) { | 
 | 442 | 		cERROR(1, "%s: Could not update with user\n", __func__); | 
 | 443 | 		return rc; | 
 | 444 | 	} | 
| Steve French | a8ee034 | 2006-06-05 23:34:19 +0000 | [diff] [blame] | 445 |  | 
 | 446 | 	/* convert ses->domainName to unicode and uppercase */ | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 447 | 	if (ses->domainName) { | 
| Steve French | 1717ffc | 2006-06-08 05:41:32 +0000 | [diff] [blame] | 448 | 		len = strlen(ses->domainName); | 
| Steve French | a8ee034 | 2006-06-05 23:34:19 +0000 | [diff] [blame] | 449 |  | 
| Steve French | 50c2f75 | 2007-07-13 00:33:32 +0000 | [diff] [blame] | 450 | 		domain = kmalloc(2 + (len * 2), GFP_KERNEL); | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 451 | 		if (domain == NULL) { | 
 | 452 | 			cERROR(1, "calc_ntlmv2_hash: domain mem alloc failure"); | 
 | 453 | 			rc = -ENOMEM; | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 454 | 			return rc; | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 455 | 		} | 
| Steve French | acbbb76 | 2012-01-18 22:32:33 -0600 | [diff] [blame] | 456 | 		len = cifs_strtoUTF16((__le16 *)domain, ses->domainName, len, | 
 | 457 | 				      nls_cp); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 458 | 		rc = | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 459 | 		crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash, | 
 | 460 | 					(char *)domain, 2 * len); | 
| Steve French | 1717ffc | 2006-06-08 05:41:32 +0000 | [diff] [blame] | 461 | 		kfree(domain); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 462 | 		if (rc) { | 
 | 463 | 			cERROR(1, "%s: Could not update with domain\n", | 
 | 464 | 								__func__); | 
 | 465 | 			return rc; | 
 | 466 | 		} | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 467 | 	} else if (ses->serverName) { | 
 | 468 | 		len = strlen(ses->serverName); | 
 | 469 |  | 
 | 470 | 		server = kmalloc(2 + (len * 2), GFP_KERNEL); | 
 | 471 | 		if (server == NULL) { | 
 | 472 | 			cERROR(1, "calc_ntlmv2_hash: server mem alloc failure"); | 
 | 473 | 			rc = -ENOMEM; | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 474 | 			return rc; | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 475 | 		} | 
| Steve French | acbbb76 | 2012-01-18 22:32:33 -0600 | [diff] [blame] | 476 | 		len = cifs_strtoUTF16((__le16 *)server, ses->serverName, len, | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 477 | 					nls_cp); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 478 | 		rc = | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 479 | 		crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash, | 
 | 480 | 					(char *)server, 2 * len); | 
 | 481 | 		kfree(server); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 482 | 		if (rc) { | 
 | 483 | 			cERROR(1, "%s: Could not update with server\n", | 
 | 484 | 								__func__); | 
 | 485 | 			return rc; | 
 | 486 | 		} | 
| Steve French | 1717ffc | 2006-06-08 05:41:32 +0000 | [diff] [blame] | 487 | 	} | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 488 |  | 
 | 489 | 	rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 490 | 					ntlmv2_hash); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 491 | 	if (rc) | 
 | 492 | 		cERROR(1, "%s: Could not generate md5 hash\n", __func__); | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 493 |  | 
| Steve French | a8ee034 | 2006-06-05 23:34:19 +0000 | [diff] [blame] | 494 | 	return rc; | 
 | 495 | } | 
 | 496 |  | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 497 | static int | 
| Steve French | 96daf2b | 2011-05-27 04:34:02 +0000 | [diff] [blame] | 498 | CalcNTLMv2_response(const struct cifs_ses *ses, char *ntlmv2_hash) | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 499 | { | 
 | 500 | 	int rc; | 
 | 501 | 	unsigned int offset = CIFS_SESS_KEY_SIZE + 8; | 
 | 502 |  | 
 | 503 | 	if (!ses->server->secmech.sdeschmacmd5) { | 
 | 504 | 		cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash\n"); | 
 | 505 | 		return -1; | 
 | 506 | 	} | 
 | 507 |  | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 508 | 	rc = crypto_shash_setkey(ses->server->secmech.hmacmd5, | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 509 | 				ntlmv2_hash, CIFS_HMAC_MD5_HASH_SIZE); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 510 | 	if (rc) { | 
 | 511 | 		cERROR(1, "%s: Could not set NTLMV2 Hash as a key", __func__); | 
 | 512 | 		return rc; | 
 | 513 | 	} | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 514 |  | 
 | 515 | 	rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash); | 
 | 516 | 	if (rc) { | 
 | 517 | 		cERROR(1, "CalcNTLMv2_response: could not init hmacmd5"); | 
 | 518 | 		return rc; | 
 | 519 | 	} | 
 | 520 |  | 
| Shirish Pargaonkar | d3ba50b | 2010-10-27 15:20:36 -0500 | [diff] [blame] | 521 | 	if (ses->server->secType == RawNTLMSSP) | 
 | 522 | 		memcpy(ses->auth_key.response + offset, | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 523 | 			ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); | 
| Shirish Pargaonkar | d3ba50b | 2010-10-27 15:20:36 -0500 | [diff] [blame] | 524 | 	else | 
 | 525 | 		memcpy(ses->auth_key.response + offset, | 
 | 526 | 			ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 527 | 	rc = crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash, | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 528 | 		ses->auth_key.response + offset, ses->auth_key.len - offset); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 529 | 	if (rc) { | 
 | 530 | 		cERROR(1, "%s: Could not update with response\n", __func__); | 
 | 531 | 		return rc; | 
 | 532 | 	} | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 533 |  | 
 | 534 | 	rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, | 
 | 535 | 		ses->auth_key.response + CIFS_SESS_KEY_SIZE); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 536 | 	if (rc) | 
 | 537 | 		cERROR(1, "%s: Could not generate md5 hash\n", __func__); | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 538 |  | 
 | 539 | 	return rc; | 
 | 540 | } | 
 | 541 |  | 
 | 542 |  | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 543 | int | 
| Steve French | 96daf2b | 2011-05-27 04:34:02 +0000 | [diff] [blame] | 544 | setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp) | 
| Steve French | 9fbc590 | 2010-08-20 20:42:26 +0000 | [diff] [blame] | 545 | { | 
| Steve French | c8e56f1 | 2010-09-08 21:10:58 +0000 | [diff] [blame] | 546 | 	int rc; | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 547 | 	int baselen; | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 548 | 	unsigned int tilen; | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 549 | 	struct ntlmv2_resp *buf; | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 550 | 	char ntlmv2_hash[16]; | 
 | 551 | 	unsigned char *tiblob = NULL; /* target info blob */ | 
| Steve French | 6d027cf | 2006-06-05 16:26:05 +0000 | [diff] [blame] | 552 |  | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 553 | 	if (ses->server->secType == RawNTLMSSP) { | 
 | 554 | 		if (!ses->domainName) { | 
| Shirish Pargaonkar | f7c5445 | 2010-10-26 18:10:24 -0500 | [diff] [blame] | 555 | 			rc = find_domain_name(ses, nls_cp); | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 556 | 			if (rc) { | 
 | 557 | 				cERROR(1, "error %d finding domain name", rc); | 
 | 558 | 				goto setup_ntlmv2_rsp_ret; | 
 | 559 | 			} | 
 | 560 | 		} | 
 | 561 | 	} else { | 
| Shirish Pargaonkar | 9daa42e | 2010-10-10 13:21:05 -0500 | [diff] [blame] | 562 | 		rc = build_avpair_blob(ses, nls_cp); | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 563 | 		if (rc) { | 
 | 564 | 			cERROR(1, "error %d building av pair blob", rc); | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 565 | 			goto setup_ntlmv2_rsp_ret; | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 566 | 		} | 
 | 567 | 	} | 
| Steve French | a8ee034 | 2006-06-05 23:34:19 +0000 | [diff] [blame] | 568 |  | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 569 | 	baselen = CIFS_SESS_KEY_SIZE + sizeof(struct ntlmv2_resp); | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 570 | 	tilen = ses->auth_key.len; | 
 | 571 | 	tiblob = ses->auth_key.response; | 
 | 572 |  | 
 | 573 | 	ses->auth_key.response = kmalloc(baselen + tilen, GFP_KERNEL); | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 574 | 	if (!ses->auth_key.response) { | 
 | 575 | 		rc = ENOMEM; | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 576 | 		ses->auth_key.len = 0; | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 577 | 		cERROR(1, "%s: Can't allocate auth blob", __func__); | 
 | 578 | 		goto setup_ntlmv2_rsp_ret; | 
 | 579 | 	} | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 580 | 	ses->auth_key.len += baselen; | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 581 |  | 
 | 582 | 	buf = (struct ntlmv2_resp *) | 
 | 583 | 			(ses->auth_key.response + CIFS_SESS_KEY_SIZE); | 
 | 584 | 	buf->blob_signature = cpu_to_le32(0x00000101); | 
 | 585 | 	buf->reserved = 0; | 
 | 586 | 	buf->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME)); | 
 | 587 | 	get_random_bytes(&buf->client_chal, sizeof(buf->client_chal)); | 
 | 588 | 	buf->reserved2 = 0; | 
 | 589 |  | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 590 | 	memcpy(ses->auth_key.response + baselen, tiblob, tilen); | 
| Shirish Pargaonkar | 21e7339 | 2010-10-21 06:42:55 -0500 | [diff] [blame] | 591 |  | 
| Shirish Pargaonkar | f7c5445 | 2010-10-26 18:10:24 -0500 | [diff] [blame] | 592 | 	/* calculate ntlmv2_hash */ | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 593 | 	rc = calc_ntlmv2_hash(ses, ntlmv2_hash, nls_cp); | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 594 | 	if (rc) { | 
| Joe Perches | b6b38f7 | 2010-04-21 03:50:45 +0000 | [diff] [blame] | 595 | 		cERROR(1, "could not get v2 hash rc %d", rc); | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 596 | 		goto setup_ntlmv2_rsp_ret; | 
 | 597 | 	} | 
| Shirish Pargaonkar | f7c5445 | 2010-10-26 18:10:24 -0500 | [diff] [blame] | 598 |  | 
 | 599 | 	/* calculate first part of the client response (CR1) */ | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 600 | 	rc = CalcNTLMv2_response(ses, ntlmv2_hash); | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 601 | 	if (rc) { | 
 | 602 | 		cERROR(1, "Could not calculate CR1  rc: %d", rc); | 
 | 603 | 		goto setup_ntlmv2_rsp_ret; | 
 | 604 | 	} | 
| Steve French | b609f06 | 2007-07-09 07:55:14 +0000 | [diff] [blame] | 605 |  | 
| Shirish Pargaonkar | 5d0d288 | 2010-10-13 18:15:00 -0500 | [diff] [blame] | 606 | 	/* now calculate the session key for NTLMv2 */ | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 607 | 	rc = crypto_shash_setkey(ses->server->secmech.hmacmd5, | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 608 | 		ntlmv2_hash, CIFS_HMAC_MD5_HASH_SIZE); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 609 | 	if (rc) { | 
 | 610 | 		cERROR(1, "%s: Could not set NTLMV2 Hash as a key", __func__); | 
 | 611 | 		goto setup_ntlmv2_rsp_ret; | 
 | 612 | 	} | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 613 |  | 
 | 614 | 	rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash); | 
 | 615 | 	if (rc) { | 
 | 616 | 		cERROR(1, "%s: Could not init hmacmd5\n", __func__); | 
 | 617 | 		goto setup_ntlmv2_rsp_ret; | 
 | 618 | 	} | 
 | 619 |  | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 620 | 	rc = crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash, | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 621 | 		ses->auth_key.response + CIFS_SESS_KEY_SIZE, | 
 | 622 | 		CIFS_HMAC_MD5_HASH_SIZE); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 623 | 	if (rc) { | 
 | 624 | 		cERROR(1, "%s: Could not update with response\n", __func__); | 
 | 625 | 		goto setup_ntlmv2_rsp_ret; | 
 | 626 | 	} | 
| Shirish Pargaonkar | 307fbd3 | 2010-10-21 14:25:17 -0500 | [diff] [blame] | 627 |  | 
 | 628 | 	rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, | 
 | 629 | 		ses->auth_key.response); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 630 | 	if (rc) | 
 | 631 | 		cERROR(1, "%s: Could not generate md5 hash\n", __func__); | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 632 |  | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 633 | setup_ntlmv2_rsp_ret: | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 634 | 	kfree(tiblob); | 
| Shirish Pargaonkar | 2b149f1 | 2010-09-18 22:02:18 -0500 | [diff] [blame] | 635 |  | 
 | 636 | 	return rc; | 
| Steve French | 6d027cf | 2006-06-05 16:26:05 +0000 | [diff] [blame] | 637 | } | 
 | 638 |  | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 639 | int | 
| Steve French | 96daf2b | 2011-05-27 04:34:02 +0000 | [diff] [blame] | 640 | calc_seckey(struct cifs_ses *ses) | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 641 | { | 
 | 642 | 	int rc; | 
 | 643 | 	struct crypto_blkcipher *tfm_arc4; | 
 | 644 | 	struct scatterlist sgin, sgout; | 
 | 645 | 	struct blkcipher_desc desc; | 
 | 646 | 	unsigned char sec_key[CIFS_SESS_KEY_SIZE]; /* a nonce */ | 
 | 647 |  | 
 | 648 | 	get_random_bytes(sec_key, CIFS_SESS_KEY_SIZE); | 
 | 649 |  | 
 | 650 | 	tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, CRYPTO_ALG_ASYNC); | 
| Shirish Pargaonkar | 7a8587e | 2011-01-29 13:54:58 -0600 | [diff] [blame] | 651 | 	if (IS_ERR(tfm_arc4)) { | 
 | 652 | 		rc = PTR_ERR(tfm_arc4); | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 653 | 		cERROR(1, "could not allocate crypto API arc4\n"); | 
| Shirish Pargaonkar | 7a8587e | 2011-01-29 13:54:58 -0600 | [diff] [blame] | 654 | 		return rc; | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 655 | 	} | 
 | 656 |  | 
 | 657 | 	desc.tfm = tfm_arc4; | 
 | 658 |  | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 659 | 	rc = crypto_blkcipher_setkey(tfm_arc4, ses->auth_key.response, | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 660 | 					CIFS_SESS_KEY_SIZE); | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 661 | 	if (rc) { | 
 | 662 | 		cERROR(1, "%s: Could not set response as a key", __func__); | 
 | 663 | 		return rc; | 
 | 664 | 	} | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 665 |  | 
 | 666 | 	sg_init_one(&sgin, sec_key, CIFS_SESS_KEY_SIZE); | 
| Shirish Pargaonkar | d3686d5 | 2010-10-28 09:53:07 -0500 | [diff] [blame] | 667 | 	sg_init_one(&sgout, ses->ntlmssp->ciphertext, CIFS_CPHTXT_SIZE); | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 668 |  | 
 | 669 | 	rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, CIFS_CPHTXT_SIZE); | 
 | 670 | 	if (rc) { | 
 | 671 | 		cERROR(1, "could not encrypt session key rc: %d\n", rc); | 
 | 672 | 		crypto_free_blkcipher(tfm_arc4); | 
 | 673 | 		return rc; | 
 | 674 | 	} | 
 | 675 |  | 
 | 676 | 	/* make secondary_key/nonce as session key */ | 
 | 677 | 	memcpy(ses->auth_key.response, sec_key, CIFS_SESS_KEY_SIZE); | 
 | 678 | 	/* and make len as that of session key only */ | 
 | 679 | 	ses->auth_key.len = CIFS_SESS_KEY_SIZE; | 
 | 680 |  | 
 | 681 | 	crypto_free_blkcipher(tfm_arc4); | 
 | 682 |  | 
| Shirish Pargaonkar | 14cae32 | 2011-06-20 16:14:03 -0500 | [diff] [blame] | 683 | 	return rc; | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 684 | } | 
 | 685 |  | 
 | 686 | void | 
 | 687 | cifs_crypto_shash_release(struct TCP_Server_Info *server) | 
 | 688 | { | 
 | 689 | 	if (server->secmech.md5) | 
 | 690 | 		crypto_free_shash(server->secmech.md5); | 
 | 691 |  | 
 | 692 | 	if (server->secmech.hmacmd5) | 
 | 693 | 		crypto_free_shash(server->secmech.hmacmd5); | 
 | 694 |  | 
 | 695 | 	kfree(server->secmech.sdeschmacmd5); | 
 | 696 |  | 
 | 697 | 	kfree(server->secmech.sdescmd5); | 
 | 698 | } | 
 | 699 |  | 
 | 700 | int | 
 | 701 | cifs_crypto_shash_allocate(struct TCP_Server_Info *server) | 
 | 702 | { | 
 | 703 | 	int rc; | 
 | 704 | 	unsigned int size; | 
 | 705 |  | 
 | 706 | 	server->secmech.hmacmd5 = crypto_alloc_shash("hmac(md5)", 0, 0); | 
| Shirish Pargaonkar | ee2c925 | 2011-01-27 09:58:04 -0600 | [diff] [blame] | 707 | 	if (IS_ERR(server->secmech.hmacmd5)) { | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 708 | 		cERROR(1, "could not allocate crypto hmacmd5\n"); | 
 | 709 | 		return PTR_ERR(server->secmech.hmacmd5); | 
 | 710 | 	} | 
 | 711 |  | 
 | 712 | 	server->secmech.md5 = crypto_alloc_shash("md5", 0, 0); | 
| Shirish Pargaonkar | ee2c925 | 2011-01-27 09:58:04 -0600 | [diff] [blame] | 713 | 	if (IS_ERR(server->secmech.md5)) { | 
| Shirish Pargaonkar | d2b9152 | 2010-10-21 14:25:08 -0500 | [diff] [blame] | 714 | 		cERROR(1, "could not allocate crypto md5\n"); | 
 | 715 | 		rc = PTR_ERR(server->secmech.md5); | 
 | 716 | 		goto crypto_allocate_md5_fail; | 
 | 717 | 	} | 
 | 718 |  | 
 | 719 | 	size = sizeof(struct shash_desc) + | 
 | 720 | 			crypto_shash_descsize(server->secmech.hmacmd5); | 
 | 721 | 	server->secmech.sdeschmacmd5 = kmalloc(size, GFP_KERNEL); | 
 | 722 | 	if (!server->secmech.sdeschmacmd5) { | 
 | 723 | 		cERROR(1, "cifs_crypto_shash_allocate: can't alloc hmacmd5\n"); | 
 | 724 | 		rc = -ENOMEM; | 
 | 725 | 		goto crypto_allocate_hmacmd5_sdesc_fail; | 
 | 726 | 	} | 
 | 727 | 	server->secmech.sdeschmacmd5->shash.tfm = server->secmech.hmacmd5; | 
 | 728 | 	server->secmech.sdeschmacmd5->shash.flags = 0x0; | 
 | 729 |  | 
 | 730 |  | 
 | 731 | 	size = sizeof(struct shash_desc) + | 
 | 732 | 			crypto_shash_descsize(server->secmech.md5); | 
 | 733 | 	server->secmech.sdescmd5 = kmalloc(size, GFP_KERNEL); | 
 | 734 | 	if (!server->secmech.sdescmd5) { | 
 | 735 | 		cERROR(1, "cifs_crypto_shash_allocate: can't alloc md5\n"); | 
 | 736 | 		rc = -ENOMEM; | 
 | 737 | 		goto crypto_allocate_md5_sdesc_fail; | 
 | 738 | 	} | 
 | 739 | 	server->secmech.sdescmd5->shash.tfm = server->secmech.md5; | 
 | 740 | 	server->secmech.sdescmd5->shash.flags = 0x0; | 
 | 741 |  | 
 | 742 | 	return 0; | 
 | 743 |  | 
 | 744 | crypto_allocate_md5_sdesc_fail: | 
 | 745 | 	kfree(server->secmech.sdeschmacmd5); | 
 | 746 |  | 
 | 747 | crypto_allocate_hmacmd5_sdesc_fail: | 
 | 748 | 	crypto_free_shash(server->secmech.md5); | 
 | 749 |  | 
 | 750 | crypto_allocate_md5_fail: | 
 | 751 | 	crypto_free_shash(server->secmech.hmacmd5); | 
 | 752 |  | 
 | 753 | 	return rc; | 
 | 754 | } |