smb2transport.c 19.0 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
/*
 *   fs/cifs/smb2transport.c
 *
 *   Copyright (C) International Business Machines  Corp., 2002, 2011
 *                 Etersoft, 2012
 *   Author(s): Steve French (sfrench@us.ibm.com)
 *              Jeremy Allison (jra@samba.org) 2006
 *              Pavel Shilovsky (pshilovsky@samba.org) 2012
 *
 *   This library is free software; you can redistribute it and/or modify
 *   it under the terms of the GNU Lesser General Public License as published
 *   by the Free Software Foundation; either version 2.1 of the License, or
 *   (at your option) any later version.
 *
 *   This library is distributed in the hope that it will be useful,
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 *   the GNU Lesser General Public License for more details.
 *
 *   You should have received a copy of the GNU Lesser General Public License
 *   along with this library; if not, write to the Free Software
 *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
 */

#include <linux/fs.h>
#include <linux/list.h>
#include <linux/wait.h>
#include <linux/net.h>
#include <linux/delay.h>
#include <linux/uaccess.h>
#include <asm/processor.h>
#include <linux/mempool.h>
33
#include <linux/highmem.h>
34
#include <crypto/aead.h>
35 36 37 38 39 40
#include "smb2pdu.h"
#include "cifsglob.h"
#include "cifsproto.h"
#include "smb2proto.h"
#include "cifs_debug.h"
#include "smb2status.h"
P
Pavel Shilovsky 已提交
41 42
#include "smb2glob.h"

43 44 45
static int
smb2_crypto_shash_allocate(struct TCP_Server_Info *server)
{
46 47 48
	return cifs_alloc_hash("hmac(sha256)",
			       &server->secmech.hmacsha256,
			       &server->secmech.sdeschmacsha256);
49 50 51 52 53
}

static int
smb3_crypto_shash_allocate(struct TCP_Server_Info *server)
{
54
	struct cifs_secmech *p = &server->secmech;
55 56
	int rc;

57 58 59
	rc = cifs_alloc_hash("hmac(sha256)",
			     &p->hmacsha256,
			     &p->sdeschmacsha256);
60
	if (rc)
61
		goto err;
62

63 64 65
	rc = cifs_alloc_hash("cmac(aes)", &p->cmacaes, &p->sdesccmacaes);
	if (rc)
		goto err;
66 67

	return 0;
68 69 70
err:
	cifs_free_hash(&p->hmacsha256, &p->sdeschmacsha256);
	return rc;
71 72
}

A
Aurelien Aptel 已提交
73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
int
smb311_crypto_shash_allocate(struct TCP_Server_Info *server)
{
	struct cifs_secmech *p = &server->secmech;
	int rc = 0;

	rc = cifs_alloc_hash("hmac(sha256)",
			     &p->hmacsha256,
			     &p->sdeschmacsha256);
	if (rc)
		return rc;

	rc = cifs_alloc_hash("cmac(aes)", &p->cmacaes, &p->sdesccmacaes);
	if (rc)
		goto err;

	rc = cifs_alloc_hash("sha512", &p->sha512, &p->sdescsha512);
	if (rc)
		goto err;

	return 0;

err:
	cifs_free_hash(&p->cmacaes, &p->sdesccmacaes);
	cifs_free_hash(&p->hmacsha256, &p->sdeschmacsha256);
	return rc;
}

S
Sachin Prabhu 已提交
101 102
static struct cifs_ses *
smb2_find_smb_ses_unlocked(struct TCP_Server_Info *server, __u64 ses_id)
103 104 105 106
{
	struct cifs_ses *ses;

	list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) {
107
		if (ses->Suid != ses_id)
108 109 110
			continue;
		return ses;
	}
S
Sachin Prabhu 已提交
111 112 113 114 115 116 117 118 119 120 121

	return NULL;
}

struct cifs_ses *
smb2_find_smb_ses(struct TCP_Server_Info *server, __u64 ses_id)
{
	struct cifs_ses *ses;

	spin_lock(&cifs_tcp_ses_lock);
	ses = smb2_find_smb_ses_unlocked(server, ses_id);
122 123
	spin_unlock(&cifs_tcp_ses_lock);

S
Sachin Prabhu 已提交
124 125 126 127 128 129 130 131 132 133 134 135 136 137 138
	return ses;
}

static struct cifs_tcon *
smb2_find_smb_sess_tcon_unlocked(struct cifs_ses *ses, __u32  tid)
{
	struct cifs_tcon *tcon;

	list_for_each_entry(tcon, &ses->tcon_list, tcon_list) {
		if (tcon->tid != tid)
			continue;
		++tcon->tc_count;
		return tcon;
	}

139 140 141
	return NULL;
}

S
Sachin Prabhu 已提交
142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164
/*
 * Obtain tcon corresponding to the tid in the given
 * cifs_ses
 */

struct cifs_tcon *
smb2_find_smb_tcon(struct TCP_Server_Info *server, __u64 ses_id, __u32  tid)
{
	struct cifs_ses *ses;
	struct cifs_tcon *tcon;

	spin_lock(&cifs_tcp_ses_lock);
	ses = smb2_find_smb_ses_unlocked(server, ses_id);
	if (!ses) {
		spin_unlock(&cifs_tcp_ses_lock);
		return NULL;
	}
	tcon = smb2_find_smb_sess_tcon_unlocked(ses, tid);
	spin_unlock(&cifs_tcp_ses_lock);

	return tcon;
}

165
int
166
smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
P
Pavel Shilovsky 已提交
167
{
168
	int rc;
P
Pavel Shilovsky 已提交
169 170
	unsigned char smb2_signature[SMB2_HMACSHA256_SIZE];
	unsigned char *sigptr = smb2_signature;
171
	struct kvec *iov = rqst->rq_iov;
172
	struct smb2_sync_hdr *shdr = (struct smb2_sync_hdr *)iov[0].iov_base;
173
	struct cifs_ses *ses;
174
	struct shash_desc *shash;
175
	struct smb_rqst drqst;
176

177
	ses = smb2_find_smb_ses(server, shdr->SessionId);
178
	if (!ses) {
179
		cifs_server_dbg(VFS, "%s: Could not find session\n", __func__);
180 181
		return 0;
	}
P
Pavel Shilovsky 已提交
182 183

	memset(smb2_signature, 0x0, SMB2_HMACSHA256_SIZE);
184
	memset(shdr->Signature, 0x0, SMB2_SIGNATURE_SIZE);
P
Pavel Shilovsky 已提交
185

186 187
	rc = smb2_crypto_shash_allocate(server);
	if (rc) {
188
		cifs_server_dbg(VFS, "%s: sha256 alloc failed\n", __func__);
189 190 191
		return rc;
	}

P
Pavel Shilovsky 已提交
192
	rc = crypto_shash_setkey(server->secmech.hmacsha256,
193
				 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE);
P
Pavel Shilovsky 已提交
194
	if (rc) {
195
		cifs_server_dbg(VFS, "%s: Could not update with response\n", __func__);
P
Pavel Shilovsky 已提交
196 197 198
		return rc;
	}

199
	shash = &server->secmech.sdeschmacsha256->shash;
200
	rc = crypto_shash_init(shash);
P
Pavel Shilovsky 已提交
201
	if (rc) {
202
		cifs_server_dbg(VFS, "%s: Could not init sha256", __func__);
P
Pavel Shilovsky 已提交
203 204 205
		return rc;
	}

206 207 208 209 210 211 212 213 214 215 216 217
	/*
	 * For SMB2+, __cifs_calc_signature() expects to sign only the actual
	 * data, that is, iov[0] should not contain a rfc1002 length.
	 *
	 * Sign the rfc1002 length prior to passing the data (iov[1-N]) down to
	 * __cifs_calc_signature().
	 */
	drqst = *rqst;
	if (drqst.rq_nvec >= 2 && iov[0].iov_len == 4) {
		rc = crypto_shash_update(shash, iov[0].iov_base,
					 iov[0].iov_len);
		if (rc) {
218
			cifs_server_dbg(VFS, "%s: Could not update with payload\n",
219 220 221 222 223 224
				 __func__);
			return rc;
		}
		drqst.rq_iov++;
		drqst.rq_nvec--;
	}
P
Pavel Shilovsky 已提交
225

226
	rc = __cifs_calc_signature(&drqst, server, sigptr, shash);
227
	if (!rc)
228
		memcpy(shdr->Signature, sigptr, SMB2_SIGNATURE_SIZE);
P
Pavel Shilovsky 已提交
229 230 231 232

	return rc;
}

233 234
static int generate_key(struct cifs_ses *ses, struct kvec label,
			struct kvec context, __u8 *key, unsigned int key_size)
S
Steve French 已提交
235 236 237 238 239 240 241
{
	unsigned char zero = 0x0;
	__u8 i[4] = {0, 0, 0, 1};
	__u8 L[4] = {0, 0, 0, 128};
	int rc = 0;
	unsigned char prfhash[SMB2_HMACSHA256_SIZE];
	unsigned char *hashptr = prfhash;
242
	struct TCP_Server_Info *server = ses->server;
S
Steve French 已提交
243 244

	memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE);
245
	memset(key, 0x0, key_size);
S
Steve French 已提交
246

247
	rc = smb3_crypto_shash_allocate(server);
248
	if (rc) {
249
		cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__);
250 251 252
		goto smb3signkey_ret;
	}

253
	rc = crypto_shash_setkey(server->secmech.hmacsha256,
254
		ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE);
S
Steve French 已提交
255
	if (rc) {
256
		cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__);
S
Steve French 已提交
257 258 259
		goto smb3signkey_ret;
	}

260
	rc = crypto_shash_init(&server->secmech.sdeschmacsha256->shash);
S
Steve French 已提交
261
	if (rc) {
262
		cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__);
S
Steve French 已提交
263 264 265
		goto smb3signkey_ret;
	}

266
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
S
Steve French 已提交
267 268
				i, 4);
	if (rc) {
269
		cifs_server_dbg(VFS, "%s: Could not update with n\n", __func__);
S
Steve French 已提交
270 271 272
		goto smb3signkey_ret;
	}

273
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
274
				label.iov_base, label.iov_len);
S
Steve French 已提交
275
	if (rc) {
276
		cifs_server_dbg(VFS, "%s: Could not update with label\n", __func__);
S
Steve French 已提交
277 278 279
		goto smb3signkey_ret;
	}

280
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
S
Steve French 已提交
281 282
				&zero, 1);
	if (rc) {
283
		cifs_server_dbg(VFS, "%s: Could not update with zero\n", __func__);
S
Steve French 已提交
284 285 286
		goto smb3signkey_ret;
	}

287
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
288
				context.iov_base, context.iov_len);
S
Steve French 已提交
289
	if (rc) {
290
		cifs_server_dbg(VFS, "%s: Could not update with context\n", __func__);
S
Steve French 已提交
291 292 293
		goto smb3signkey_ret;
	}

294
	rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
S
Steve French 已提交
295 296
				L, 4);
	if (rc) {
297
		cifs_server_dbg(VFS, "%s: Could not update with L\n", __func__);
S
Steve French 已提交
298 299 300
		goto smb3signkey_ret;
	}

301
	rc = crypto_shash_final(&server->secmech.sdeschmacsha256->shash,
S
Steve French 已提交
302 303
				hashptr);
	if (rc) {
304
		cifs_server_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__);
S
Steve French 已提交
305 306 307
		goto smb3signkey_ret;
	}

308
	memcpy(key, hashptr, key_size);
S
Steve French 已提交
309 310

smb3signkey_ret:
311
	return rc;
S
Steve French 已提交
312 313
}

314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342
struct derivation {
	struct kvec label;
	struct kvec context;
};

struct derivation_triplet {
	struct derivation signing;
	struct derivation encryption;
	struct derivation decryption;
};

static int
generate_smb3signingkey(struct cifs_ses *ses,
			const struct derivation_triplet *ptriplet)
{
	int rc;

	rc = generate_key(ses, ptriplet->signing.label,
			  ptriplet->signing.context, ses->smb3signingkey,
			  SMB3_SIGN_KEY_SIZE);
	if (rc)
		return rc;

	rc = generate_key(ses, ptriplet->encryption.label,
			  ptriplet->encryption.context, ses->smb3encryptionkey,
			  SMB3_SIGN_KEY_SIZE);
	if (rc)
		return rc;

343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367
	rc = generate_key(ses, ptriplet->decryption.label,
			  ptriplet->decryption.context,
			  ses->smb3decryptionkey, SMB3_SIGN_KEY_SIZE);

	if (rc)
		return rc;

#ifdef CONFIG_CIFS_DEBUG_DUMP_KEYS
	cifs_dbg(VFS, "%s: dumping generated AES session keys\n", __func__);
	/*
	 * The session id is opaque in terms of endianness, so we can't
	 * print it as a long long. we dump it as we got it on the wire
	 */
	cifs_dbg(VFS, "Session Id    %*ph\n", (int)sizeof(ses->Suid),
			&ses->Suid);
	cifs_dbg(VFS, "Session Key   %*ph\n",
		 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response);
	cifs_dbg(VFS, "Signing Key   %*ph\n",
		 SMB3_SIGN_KEY_SIZE, ses->smb3signingkey);
	cifs_dbg(VFS, "ServerIn Key  %*ph\n",
		 SMB3_SIGN_KEY_SIZE, ses->smb3encryptionkey);
	cifs_dbg(VFS, "ServerOut Key %*ph\n",
		 SMB3_SIGN_KEY_SIZE, ses->smb3decryptionkey);
#endif
	return rc;
368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405
}

int
generate_smb30signingkey(struct cifs_ses *ses)

{
	struct derivation_triplet triplet;
	struct derivation *d;

	d = &triplet.signing;
	d->label.iov_base = "SMB2AESCMAC";
	d->label.iov_len = 12;
	d->context.iov_base = "SmbSign";
	d->context.iov_len = 8;

	d = &triplet.encryption;
	d->label.iov_base = "SMB2AESCCM";
	d->label.iov_len = 11;
	d->context.iov_base = "ServerIn ";
	d->context.iov_len = 10;

	d = &triplet.decryption;
	d->label.iov_base = "SMB2AESCCM";
	d->label.iov_len = 11;
	d->context.iov_base = "ServerOut";
	d->context.iov_len = 10;

	return generate_smb3signingkey(ses, &triplet);
}

int
generate_smb311signingkey(struct cifs_ses *ses)

{
	struct derivation_triplet triplet;
	struct derivation *d;

	d = &triplet.signing;
406 407 408 409
	d->label.iov_base = "SMBSigningKey";
	d->label.iov_len = 14;
	d->context.iov_base = ses->preauth_sha_hash;
	d->context.iov_len = 64;
410 411

	d = &triplet.encryption;
412 413 414 415
	d->label.iov_base = "SMBC2SCipherKey";
	d->label.iov_len = 16;
	d->context.iov_base = ses->preauth_sha_hash;
	d->context.iov_len = 64;
416 417

	d = &triplet.decryption;
418 419 420 421
	d->label.iov_base = "SMBS2CCipherKey";
	d->label.iov_len = 16;
	d->context.iov_base = ses->preauth_sha_hash;
	d->context.iov_len = 64;
422 423 424 425

	return generate_smb3signingkey(ses, &triplet);
}

426 427 428
int
smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
{
429
	int rc;
S
Steve French 已提交
430 431 432
	unsigned char smb3_signature[SMB2_CMACAES_SIZE];
	unsigned char *sigptr = smb3_signature;
	struct kvec *iov = rqst->rq_iov;
433
	struct smb2_sync_hdr *shdr = (struct smb2_sync_hdr *)iov[0].iov_base;
434
	struct cifs_ses *ses;
435 436
	struct shash_desc *shash = &server->secmech.sdesccmacaes->shash;
	struct smb_rqst drqst;
437

438
	ses = smb2_find_smb_ses(server, shdr->SessionId);
439
	if (!ses) {
440
		cifs_server_dbg(VFS, "%s: Could not find session\n", __func__);
441 442
		return 0;
	}
S
Steve French 已提交
443 444

	memset(smb3_signature, 0x0, SMB2_CMACAES_SIZE);
445
	memset(shdr->Signature, 0x0, SMB2_SIGNATURE_SIZE);
S
Steve French 已提交
446 447

	rc = crypto_shash_setkey(server->secmech.cmacaes,
448
				 ses->smb3signingkey, SMB2_CMACAES_SIZE);
S
Steve French 已提交
449
	if (rc) {
450
		cifs_server_dbg(VFS, "%s: Could not set key for cmac aes\n", __func__);
S
Steve French 已提交
451 452 453
		return rc;
	}

454 455 456 457 458
	/*
	 * we already allocate sdesccmacaes when we init smb3 signing key,
	 * so unlike smb2 case we do not have to check here if secmech are
	 * initialized
	 */
459
	rc = crypto_shash_init(shash);
S
Steve French 已提交
460
	if (rc) {
461
		cifs_server_dbg(VFS, "%s: Could not init cmac aes\n", __func__);
S
Steve French 已提交
462 463
		return rc;
	}
464

465 466 467 468 469 470 471 472 473 474 475 476
	/*
	 * For SMB2+, __cifs_calc_signature() expects to sign only the actual
	 * data, that is, iov[0] should not contain a rfc1002 length.
	 *
	 * Sign the rfc1002 length prior to passing the data (iov[1-N]) down to
	 * __cifs_calc_signature().
	 */
	drqst = *rqst;
	if (drqst.rq_nvec >= 2 && iov[0].iov_len == 4) {
		rc = crypto_shash_update(shash, iov[0].iov_base,
					 iov[0].iov_len);
		if (rc) {
477
			cifs_server_dbg(VFS, "%s: Could not update with payload\n",
478 479 480 481 482 483
				 __func__);
			return rc;
		}
		drqst.rq_iov++;
		drqst.rq_nvec--;
	}
S
Steve French 已提交
484

485
	rc = __cifs_calc_signature(&drqst, server, sigptr, shash);
486
	if (!rc)
487
		memcpy(shdr->Signature, sigptr, SMB2_SIGNATURE_SIZE);
S
Steve French 已提交
488 489

	return rc;
490 491
}

P
Pavel Shilovsky 已提交
492 493
/* must be called with server->srv_mutex held */
static int
494
smb2_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server)
P
Pavel Shilovsky 已提交
495 496
{
	int rc = 0;
497
	struct smb2_sync_hdr *shdr =
498
			(struct smb2_sync_hdr *)rqst->rq_iov[0].iov_base;
P
Pavel Shilovsky 已提交
499

500
	if (!(shdr->Flags & SMB2_FLAGS_SIGNED) ||
P
Pavel Shilovsky 已提交
501 502 503 504
	    server->tcpStatus == CifsNeedNegotiate)
		return rc;

	if (!server->session_estab) {
505
		strncpy(shdr->Signature, "BSRSPYL", 8);
P
Pavel Shilovsky 已提交
506 507 508
		return rc;
	}

509
	rc = server->ops->calc_signature(rqst, server);
P
Pavel Shilovsky 已提交
510 511 512 513 514

	return rc;
}

int
515
smb2_verify_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
P
Pavel Shilovsky 已提交
516 517 518
{
	unsigned int rc;
	char server_response_sig[16];
519
	struct smb2_sync_hdr *shdr =
520
			(struct smb2_sync_hdr *)rqst->rq_iov[0].iov_base;
P
Pavel Shilovsky 已提交
521

522 523 524
	if ((shdr->Command == SMB2_NEGOTIATE) ||
	    (shdr->Command == SMB2_SESSION_SETUP) ||
	    (shdr->Command == SMB2_OPLOCK_BREAK) ||
525
	    server->ignore_signature ||
P
Pavel Shilovsky 已提交
526 527 528 529 530 531 532 533 534
	    (!server->session_estab))
		return 0;

	/*
	 * BB what if signatures are supposed to be on for session but
	 * server does not send one? BB
	 */

	/* Do not need to verify session setups with signature "BSRSPYL " */
535
	if (memcmp(shdr->Signature, "BSRSPYL ", 8) == 0)
536
		cifs_dbg(FYI, "dummy signature received for smb command 0x%x\n",
537
			 shdr->Command);
P
Pavel Shilovsky 已提交
538 539 540 541 542

	/*
	 * Save off the origiginal signature so we can modify the smb and check
	 * our calculated signature against what the server sent.
	 */
543
	memcpy(server_response_sig, shdr->Signature, SMB2_SIGNATURE_SIZE);
P
Pavel Shilovsky 已提交
544

545
	memset(shdr->Signature, 0, SMB2_SIGNATURE_SIZE);
P
Pavel Shilovsky 已提交
546 547

	mutex_lock(&server->srv_mutex);
548
	rc = server->ops->calc_signature(rqst, server);
P
Pavel Shilovsky 已提交
549 550 551 552 553
	mutex_unlock(&server->srv_mutex);

	if (rc)
		return rc;

554
	if (memcmp(server_response_sig, shdr->Signature, SMB2_SIGNATURE_SIZE))
P
Pavel Shilovsky 已提交
555 556 557 558 559
		return -EACCES;
	else
		return 0;
}

560 561 562 563 564
/*
 * Set message id for the request. Should be called after wait_for_free_request
 * and when srv_mutex is held.
 */
static inline void
565 566
smb2_seq_num_into_buf(struct TCP_Server_Info *server,
		      struct smb2_sync_hdr *shdr)
567
{
568
	unsigned int i, num = le16_to_cpu(shdr->CreditCharge);
569

570
	shdr->MessageId = get_next_mid64(server);
571 572 573
	/* skip message numbers according to CreditCharge field */
	for (i = 1; i < num; i++)
		get_next_mid(server);
574 575 576
}

static struct mid_q_entry *
577
smb2_mid_entry_alloc(const struct smb2_sync_hdr *shdr,
578 579 580
		     struct TCP_Server_Info *server)
{
	struct mid_q_entry *temp;
581
	unsigned int credits = le16_to_cpu(shdr->CreditCharge);
582 583

	if (server == NULL) {
584
		cifs_dbg(VFS, "Null TCP session in smb2_mid_entry_alloc\n");
585 586 587 588
		return NULL;
	}

	temp = mempool_alloc(cifs_mid_poolp, GFP_NOFS);
589
	memset(temp, 0, sizeof(struct mid_q_entry));
590
	kref_init(&temp->refcount);
591
	temp->mid = le64_to_cpu(shdr->MessageId);
592
	temp->credits = credits > 0 ? credits : 1;
593 594 595 596 597 598 599 600 601 602 603
	temp->pid = current->pid;
	temp->command = shdr->Command; /* Always LE */
	temp->when_alloc = jiffies;
	temp->server = server;

	/*
	 * The default is for the mid to be synchronous, so the
	 * default callback just wakes up the current task.
	 */
	temp->callback = cifs_wake_up_task;
	temp->callback_data = current;
604 605 606

	atomic_inc(&midCount);
	temp->mid_state = MID_REQUEST_ALLOCATED;
607 608
	trace_smb3_cmd_enter(shdr->TreeId, shdr->SessionId,
		le16_to_cpu(shdr->Command), temp->mid);
609 610 611 612
	return temp;
}

static int
613
smb2_get_mid_entry(struct cifs_ses *ses, struct smb2_sync_hdr *shdr,
614 615 616 617 618 619
		   struct mid_q_entry **mid)
{
	if (ses->server->tcpStatus == CifsExiting)
		return -ENOENT;

	if (ses->server->tcpStatus == CifsNeedReconnect) {
620
		cifs_dbg(FYI, "tcp session dead - return to caller to retry\n");
621 622 623
		return -EAGAIN;
	}

624 625 626 627
	if (ses->server->tcpStatus == CifsNeedNegotiate &&
	   shdr->Command != SMB2_NEGOTIATE)
		return -EAGAIN;

628
	if (ses->status == CifsNew) {
629 630
		if ((shdr->Command != SMB2_SESSION_SETUP) &&
		    (shdr->Command != SMB2_NEGOTIATE))
631 632 633
			return -EAGAIN;
		/* else ok - we are setting up session */
	}
634 635

	if (ses->status == CifsExiting) {
636
		if (shdr->Command != SMB2_LOGOFF)
637 638 639 640
			return -EAGAIN;
		/* else ok - we are shutting down the session */
	}

641
	*mid = smb2_mid_entry_alloc(shdr, ses->server);
642 643 644 645 646
	if (*mid == NULL)
		return -ENOMEM;
	spin_lock(&GlobalMid_Lock);
	list_add_tail(&(*mid)->qhead, &ses->server->pending_mid_q);
	spin_unlock(&GlobalMid_Lock);
647

648 649 650 651 652 653 654
	return 0;
}

int
smb2_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server,
		   bool log_error)
{
655
	unsigned int len = mid->resp_buf_size;
656
	struct kvec iov[1];
657
	struct smb_rqst rqst = { .rq_iov = iov,
658
				 .rq_nvec = 1 };
659

660
	iov[0].iov_base = (char *)mid->resp_buf;
661
	iov[0].iov_len = len;
662 663 664

	dump_smb(mid->resp_buf, min_t(u32, 80, len));
	/* convert the length into a more usable form */
665
	if (len > 24 && server->sign && !mid->decrypted) {
P
Pavel Shilovsky 已提交
666 667
		int rc;

668
		rc = smb2_verify_signature(&rqst, server);
P
Pavel Shilovsky 已提交
669
		if (rc)
670
			cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n",
671
				 rc);
P
Pavel Shilovsky 已提交
672
	}
673 674 675 676

	return map_smb2_to_linux_error(mid->resp_buf, log_error);
}

677 678
struct mid_q_entry *
smb2_setup_request(struct cifs_ses *ses, struct smb_rqst *rqst)
679 680
{
	int rc;
681
	struct smb2_sync_hdr *shdr =
682
			(struct smb2_sync_hdr *)rqst->rq_iov[0].iov_base;
683 684
	struct mid_q_entry *mid;

685
	smb2_seq_num_into_buf(ses->server, shdr);
686

687
	rc = smb2_get_mid_entry(ses, shdr, &mid);
688 689
	if (rc) {
		revert_current_mid_from_hdr(ses->server, shdr);
690
		return ERR_PTR(rc);
691 692
	}

693 694
	rc = smb2_sign_rqst(rqst, ses->server);
	if (rc) {
695
		revert_current_mid_from_hdr(ses->server, shdr);
P
Pavel Shilovsky 已提交
696
		cifs_delete_mid(mid);
697 698
		return ERR_PTR(rc);
	}
699

700
	return mid;
701 702
}

703 704
struct mid_q_entry *
smb2_setup_async_request(struct TCP_Server_Info *server, struct smb_rqst *rqst)
705
{
706
	int rc;
707
	struct smb2_sync_hdr *shdr =
708
			(struct smb2_sync_hdr *)rqst->rq_iov[0].iov_base;
709 710
	struct mid_q_entry *mid;

711 712 713 714
	if (server->tcpStatus == CifsNeedNegotiate &&
	   shdr->Command != SMB2_NEGOTIATE)
		return ERR_PTR(-EAGAIN);

715
	smb2_seq_num_into_buf(server, shdr);
716

717
	mid = smb2_mid_entry_alloc(shdr, server);
718 719
	if (mid == NULL) {
		revert_current_mid_from_hdr(server, shdr);
720
		return ERR_PTR(-ENOMEM);
721
	}
722

723
	rc = smb2_sign_rqst(rqst, server);
724
	if (rc) {
725
		revert_current_mid_from_hdr(server, shdr);
726
		DeleteMidQEntry(mid);
727
		return ERR_PTR(rc);
P
Pavel Shilovsky 已提交
728 729
	}

730
	return mid;
731
}
732 733 734 735 736 737 738

int
smb3_crypto_aead_allocate(struct TCP_Server_Info *server)
{
	struct crypto_aead *tfm;

	if (!server->secmech.ccmaesencrypt) {
739 740 741 742
		if (server->cipher_type == SMB2_ENCRYPTION_AES128_GCM)
			tfm = crypto_alloc_aead("gcm(aes)", 0, 0);
		else
			tfm = crypto_alloc_aead("ccm(aes)", 0, 0);
743
		if (IS_ERR(tfm)) {
744
			cifs_server_dbg(VFS, "%s: Failed to alloc encrypt aead\n",
745 746 747 748 749 750 751
				 __func__);
			return PTR_ERR(tfm);
		}
		server->secmech.ccmaesencrypt = tfm;
	}

	if (!server->secmech.ccmaesdecrypt) {
752 753 754 755
		if (server->cipher_type == SMB2_ENCRYPTION_AES128_GCM)
			tfm = crypto_alloc_aead("gcm(aes)", 0, 0);
		else
			tfm = crypto_alloc_aead("ccm(aes)", 0, 0);
756 757 758
		if (IS_ERR(tfm)) {
			crypto_free_aead(server->secmech.ccmaesencrypt);
			server->secmech.ccmaesencrypt = NULL;
759
			cifs_server_dbg(VFS, "%s: Failed to alloc decrypt aead\n",
760 761 762 763 764 765 766 767
				 __func__);
			return PTR_ERR(tfm);
		}
		server->secmech.ccmaesdecrypt = tfm;
	}

	return 0;
}