Re: [PATCH] cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack

2016-12-13 Thread Jeff Layton
one(tfm_des, out, in); > + crypto_free_cipher(tfm_des); > > - skcipher_request_set_callback(req, 0, NULL, NULL); > - skcipher_request_set_crypt(req, &sgin, &sgout, 8, NULL); > - > - rc = crypto_skcipher_encrypt(req); > - if (rc) > - cifs

Re: [PATCH] cifs: Replace cifs md5 hashing functions with kernel crypto APIs

2011-01-21 Thread Jeff Layton
s.ko footprint. Assuming that mfsymlink support still works after this patch... Reviewed-by: Jeff Layton -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code

2010-09-12 Thread Jeff Layton
e of us who are spending time to review them (so far, Steve, Suresh and I). All of us have limited amounts of time available to spend on review. None of us want to spend time sifting through the trivial changes in these patches to hunt down the ones that actually change behavior. -- Jeff Layton --

Re: [PATCH -v2 2/6] ntlmv2/ntlmssp ntlmssp autentication code

2010-09-12 Thread Jeff Layton
iov_len) % 2) { > *bcc_ptr = 0; > diff --git a/fs/cifs/transport.c b/fs/cifs/transport.c > index 82f78c4..a66c91e 100644 > --- a/fs/cifs/transport.c > +++ b/fs/cifs/transport.c > @@ -543,7 +543,7 @@ SendReceive2(const unsigned int xid, struct cifsSesInf

Re: [PATCH -v2 1/6] functions to either extract or create av_ pair/ti_info blob

2010-09-12 Thread Jeff Layton
char *bcc_ptr, int > blob_len, > /* BB spec says that if AvId field of MsvAvTimestamp is populated then > we must set the MIC field of the AUTHENTICATE_MESSAGE */ > > + tioffset = cpu_to_le16(pblob->TargetInfoArray.BufferOffset); > + tilen = cpu_to_le16(pblob->TargetInfoArray.Length); > + ses->tilen = tilen; > + if (ses->tilen) { > + ses->tiblob = kmalloc(tilen, GFP_KERNEL); > + if (!ses->tiblob) { > + cERROR(1, "Challenge target info allocation failure"); > + return -ENOMEM; > + } > + memcpy(ses->tiblob, bcc_ptr + tioffset, ses->tilen); > + } > + > return 0; > } > A little weird to add these blob allocations in this patch without actually ever freeing them. Maybe it would be better to split this up differently for bisectability? -- Jeff Layton -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 7/8 Rev2] ntlmv2/ntlmssp generate secondary session key and ciphertext and send it if signing enabled

2010-09-08 Thread Jeff Layton
; + if ((ses->server->ntlmssp.server_flags & NTLMSSP_NEGOTIATE_KEY_XCH) && > + !calc_seckey(ses->server)) { > + memcpy(tmp, ses->server->ntlmssp.ciphertext, CIFS_CPHTXT_SIZE); > + sec_blob->SessionKey.BufferOffse

Re: [linux-cifs-client][patch] Make NTLMv2 as auth mech withing NTLMSSP and enable signing using crypto shash APIs

2010-08-21 Thread Jeff Layton
On Sat, 21 Aug 2010 09:23:11 -0500 Shirish Pargaonkar wrote: > On Sat, Aug 21, 2010 at 6:14 AM, Jeff Layton wrote: > > On Wed,  4 Aug 2010 21:34:39 -0500 > > shirishpargaon...@gmail.com wrote: > > > >> Make ntlmv2 as an authentication mechanism within ntlmssp >

Re: [linux-cifs-client][patch] Make NTLMv2 as auth mech withing NTLMSSP and enable signing using crypto shash APIs

2010-08-21 Thread Jeff Layton
key.len = msg->sesskey_len; > - memcpy(ses->server->mac_signing_key.data.krb5, > + ses->server->session_key.len = msg->sesskey_len; > + memcpy(ses->server->session_key.data.krb5, >