• S
    NTLM auth and sign - Use kernel crypto apis to calculate hashes and smb signatures · 307fbd31
    Shirish Pargaonkar 提交于
    Use kernel crypto sync hash apis insetead of cifs crypto functions.
    The calls typically corrospond one to one except that insead of
    key init, setkey is used.
    
    Use crypto apis to generate smb signagtures also.
    Use hmac-md5 to genereate ntlmv2 hash, ntlmv2 response, and HMAC (CR1 of
    ntlmv2 auth blob.
    User crypto apis to genereate signature and to verify signature.
    md5 hash is used to calculate signature.
    Use secondary key to calculate signature in case of ntlmssp.
    
    For ntlmv2 within ntlmssp, during signature calculation, only 16 bytes key
    (a nonce) stored within session key is used. during smb signature calculation.
    For ntlm and ntlmv2 without extended security, 16 bytes key
    as well as entire response (24 bytes in case of ntlm and variable length
    in case of ntlmv2) is used for smb signature calculation.
    For kerberos, there is no distinction between key and response.
    Acked-by: NJeff Layton <jlayton@redhat.com>
    Signed-off-by: NShirish Pargaonkar <shirishpargaonkar@gmail.com>
    Signed-off-by: NSteve French <sfrench@us.ibm.com>
    307fbd31
cifsproto.h 17.7 KB