On Wed, 27 Oct 2010 15:20:36 -0500 shirishpargaonkar@xxxxxxxxx wrote: > From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx> > > > Need to have cryptkey or server challenge in smb connection > (struct TCP_Server_Info) for ntlm and ntlmv2 auth types for which > cryptkey (Encryption Key) is supplied just once in Negotiate Protocol > response during an smb connection setup for all the smb sessions over > that smb connection. > > For ntlmssp, cryptkey or server challenge is provided for every > smb session in type 2 packet of ntlmssp negotiation, the cryptkey > provided during Negotiation Protocol response before smb connection > does not count. > > Rename cryptKey to cryptkey and related changes. > > > Signed-off-by: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx> > --- > fs/cifs/cifsencrypt.c | 10 +++++++--- > fs/cifs/cifsglob.h | 3 ++- > fs/cifs/cifssmb.c | 4 ++-- > fs/cifs/connect.c | 4 ++-- > fs/cifs/sess.c | 12 ++++++++---- > 5 files changed, 21 insertions(+), 12 deletions(-) > > diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c > index 17d603a..ef95a27 100644 > --- a/fs/cifs/cifsencrypt.c > +++ b/fs/cifs/cifsencrypt.c > @@ -249,7 +249,7 @@ int setup_ntlm_response(struct cifsSesInfo *ses) > } > ses->auth_key.len = temp_len; > > - SMBNTencrypt(ses->password, ses->cryptKey, > + SMBNTencrypt(ses->password, ses->server->cryptkey, > ses->auth_key.response + CIFS_SESS_KEY_SIZE); > > E_md4hash(ses->password, temp_key); > @@ -537,8 +537,12 @@ CalcNTLMv2_response(const struct cifsSesInfo *ses) > return rc; > } > > - memcpy(ses->auth_key.response + offset, > - ses->cryptKey, CIFS_SERVER_CHALLENGE_SIZE); > + if (ses->server->secType == RawNTLMSSP) > + memcpy(ses->auth_key.response + offset, > + ses->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); > + else > + memcpy(ses->auth_key.response + offset, > + ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); > crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash, > ses->auth_key.response + offset, ses->auth_key.len - offset); > > diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h > index 67d6a22..b736951 100644 > --- a/fs/cifs/cifsglob.h > +++ b/fs/cifs/cifsglob.h > @@ -196,6 +196,7 @@ struct TCP_Server_Info { > int capabilities; /* allow selective disabling of caps by smb sess */ > int timeAdj; /* Adjust for difference in server time zone in sec */ > __u16 CurrentMid; /* multiplex id - rotating counter */ > + char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlm, ntlmv2 etc */ > /* 16th byte of RFC1001 workstation name is always null */ > char workstation_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL]; > __u32 sequence_number; /* needed for CIFS PDU signature */ > @@ -240,7 +241,7 @@ struct cifsSesInfo { > char userName[MAX_USERNAME_SIZE + 1]; > char *domainName; > char *password; > - char cryptKey[CIFS_CRYPTO_KEY_SIZE]; > + char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */ > struct session_key auth_key; > char ntlmv2_hash[16]; > unsigned int tilen; /* length of the target info blob */ > diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c > index e98f1f3..2f2632b 100644 > --- a/fs/cifs/cifssmb.c > +++ b/fs/cifs/cifssmb.c > @@ -503,7 +503,7 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses) > > if (rsp->EncryptionKeyLength == > cpu_to_le16(CIFS_CRYPTO_KEY_SIZE)) { > - memcpy(ses->cryptKey, rsp->EncryptionKey, > + memcpy(ses->server->cryptkey, rsp->EncryptionKey, > CIFS_CRYPTO_KEY_SIZE); > } else if (server->secMode & SECMODE_PW_ENCRYPT) { > rc = -EIO; /* need cryptkey unless plain text */ > @@ -574,7 +574,7 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses) > server->timeAdj = (int)(__s16)le16_to_cpu(pSMBr->ServerTimeZone); > server->timeAdj *= 60; > if (pSMBr->EncryptionKeyLength == CIFS_CRYPTO_KEY_SIZE) { > - memcpy(ses->cryptKey, pSMBr->u.EncryptionKey, > + memcpy(ses->server->cryptkey, pSMBr->u.EncryptionKey, > CIFS_CRYPTO_KEY_SIZE); > } else if ((pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC) > && (pSMBr->EncryptionKeyLength == 0)) { > diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c > index 469c3dd..4d8004c 100644 > --- a/fs/cifs/connect.c > +++ b/fs/cifs/connect.c > @@ -3002,13 +3002,13 @@ CIFSTCon(unsigned int xid, struct cifsSesInfo *ses, > #ifdef CONFIG_CIFS_WEAK_PW_HASH > if ((global_secflags & CIFSSEC_MAY_LANMAN) && > (ses->server->secType == LANMAN)) > - calc_lanman_hash(tcon->password, ses->cryptKey, > + calc_lanman_hash(tcon->password, ses->server->cryptkey, > ses->server->secMode & > SECMODE_PW_ENCRYPT ? true : false, > bcc_ptr); > else > #endif /* CIFS_WEAK_PW_HASH */ > - SMBNTencrypt(tcon->password, ses->cryptKey, bcc_ptr); > + SMBNTencrypt(tcon->password, ses->server->cryptkey, bcc_ptr); > > bcc_ptr += CIFS_SESS_KEY_SIZE; > if (ses->capabilities & CAP_UNICODE) { > diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c > index e0515a6..f74c5a8 100644 > --- a/fs/cifs/sess.c > +++ b/fs/cifs/sess.c > @@ -399,7 +399,7 @@ static int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len, > return -EINVAL; > } > > - memcpy(ses->cryptKey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); > + memcpy(ses->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE); > /* BB we could decode pblob->NegotiateFlags; some may be useful */ > /* In particular we can examine sign flags */ > /* BB spec says that if AvId field of MsvAvTimestamp is populated then > @@ -667,10 +667,14 @@ ssetup_ntlmssp_authenticate: > /* no capabilities flags in old lanman negotiation */ > > pSMB->old_req.PasswordLength = cpu_to_le16(CIFS_SESS_KEY_SIZE); > - /* BB calculate hash with password */ > - /* and copy into bcc */ > > - calc_lanman_hash(ses->password, ses->cryptKey, > + /* Calculate hash with password and copy into bcc_ptr. > + * Encryption Key (stored as in cryptkey) gets used if the > + * security mode bit in Negottiate Protocol response states > + * to use challenge/response method (i.e. Password bit is 1). > + */ > + > + calc_lanman_hash(ses->password, ses->server->cryptkey, > ses->server->secMode & SECMODE_PW_ENCRYPT ? > true : false, lnm_session_key); > Ack on this patch, assuming that it's a prerequisite for the later cleanup patch. Acked-by: Jeff Layton <jlayton@xxxxxxxxxx> -- To unsubscribe from this list: send the line "unsubscribe linux-cifs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html