Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openeuler
raspberrypi-kernel
提交
790fe579
R
raspberrypi-kernel
项目概览
openeuler
/
raspberrypi-kernel
通知
13
Star
1
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
R
raspberrypi-kernel
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
790fe579
编写于
7月 07, 2007
作者:
S
Steve French
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
[CIFS] more whitespace cleanup
Signed-off-by:
N
Steve French
<
sfrench@us.ibm.com
>
上级
6dc0f87e
变更
7
展开全部
隐藏空白更改
内联
并排
Showing
7 changed file
with
544 addition
and
538 deletion
+544
-538
fs/cifs/cifsfs.c
fs/cifs/cifsfs.c
+9
-9
fs/cifs/cifssmb.c
fs/cifs/cifssmb.c
+270
-270
fs/cifs/misc.c
fs/cifs/misc.c
+32
-32
fs/cifs/netmisc.c
fs/cifs/netmisc.c
+9
-9
fs/cifs/readdir.c
fs/cifs/readdir.c
+91
-88
fs/cifs/sess.c
fs/cifs/sess.c
+114
-111
fs/cifs/smbencrypt.c
fs/cifs/smbencrypt.c
+19
-19
未找到文件。
fs/cifs/cifsfs.c
浏览文件 @
790fe579
...
...
@@ -98,7 +98,7 @@ cifs_read_super(struct super_block *sb, void *data,
/* BB should we make this contingent on mount parm? */
sb
->
s_flags
|=
MS_NODIRATIME
|
MS_NOATIME
;
sb
->
s_fs_info
=
kzalloc
(
sizeof
(
struct
cifs_sb_info
),
GFP_KERNEL
);
sb
->
s_fs_info
=
kzalloc
(
sizeof
(
struct
cifs_sb_info
),
GFP_KERNEL
);
cifs_sb
=
CIFS_SB
(
sb
);
if
(
cifs_sb
==
NULL
)
return
-
ENOMEM
;
...
...
@@ -117,9 +117,10 @@ cifs_read_super(struct super_block *sb, void *data,
#ifdef CONFIG_CIFS_EXPERIMENTAL
if
(
experimEnabled
!=
0
)
sb
->
s_export_op
=
&
cifs_export_ops
;
#endif
/* EXPERIMENTAL */
#endif
/* EXPERIMENTAL */
/* if (cifs_sb->tcon->ses->server->maxBuf > MAX_CIFS_HDR_SIZE + 512)
sb->s_blocksize = cifs_sb->tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE; */
sb->s_blocksize =
cifs_sb->tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE; */
#ifdef CONFIG_CIFS_QUOTA
sb
->
s_qcop
=
&
cifs_quotactl_ops
;
#endif
...
...
@@ -164,10 +165,10 @@ cifs_put_super(struct super_block *sb)
cFYI
(
1
,
(
"In cifs_put_super"
));
cifs_sb
=
CIFS_SB
(
sb
);
if
(
cifs_sb
==
NULL
)
{
cFYI
(
1
,(
"Empty cifs superblock info passed to unmount"
));
cFYI
(
1
,
(
"Empty cifs superblock info passed to unmount"
));
return
;
}
rc
=
cifs_umount
(
sb
,
cifs_sb
);
rc
=
cifs_umount
(
sb
,
cifs_sb
);
if
(
rc
)
{
cERROR
(
1
,
(
"cifs_umount failed with return code %d"
,
rc
));
}
...
...
@@ -180,7 +181,7 @@ static int
cifs_statfs
(
struct
dentry
*
dentry
,
struct
kstatfs
*
buf
)
{
struct
super_block
*
sb
=
dentry
->
d_sb
;
int
xid
;
int
xid
;
int
rc
=
-
EOPNOTSUPP
;
struct
cifs_sb_info
*
cifs_sb
;
struct
cifsTconInfo
*
pTcon
;
...
...
@@ -193,7 +194,7 @@ cifs_statfs(struct dentry *dentry, struct kstatfs *buf)
buf
->
f_type
=
CIFS_MAGIC_NUMBER
;
/* instead could get the real value via SMB_QUERY_FS_ATTRIBUTE_INFO */
buf
->
f_namelen
=
PATH_MAX
;
/* PATH_MAX may be too long - it would
buf
->
f_namelen
=
PATH_MAX
;
/* PATH_MAX may be too long - it would
presumably be total path, but note
that some servers (includinng Samba 3)
have a shorter maximum path */
...
...
@@ -217,8 +218,7 @@ cifs_statfs(struct dentry *dentry, struct kstatfs *buf)
bypassed it because we detected that this was an older LANMAN sess */
if
(
rc
)
rc
=
SMBOldQFSInfo
(
xid
,
pTcon
,
buf
);
/*
int f_type;
/* int f_type;
__fsid_t f_fsid;
int f_namelen; */
/* BB get from info in tcon struct at mount time call to QFSAttrInfo */
...
...
fs/cifs/cifssmb.c
浏览文件 @
790fe579
此差异已折叠。
点击以展开。
fs/cifs/misc.c
浏览文件 @
790fe579
/*
* fs/cifs/misc.c
*
* Copyright (C) International Business Machines Corp., 2002,200
5
* Copyright (C) International Business Machines Corp., 2002,200
7
* Author(s): Steve French (sfrench@us.ibm.com)
*
* This library is free software; you can redistribute it and/or modify
...
...
@@ -49,7 +49,7 @@ _GetXid(void)
GlobalTotalActiveXid
++
;
if
(
GlobalTotalActiveXid
>
GlobalMaxActiveXid
)
GlobalMaxActiveXid
=
GlobalTotalActiveXid
;
/* keep high water mark for number of simultaneous vfs ops in our filesystem */
if
(
GlobalTotalActiveXid
>
65000
)
if
(
GlobalTotalActiveXid
>
65000
)
cFYI
(
1
,(
"warning: more than 65000 requests active"
));
xid
=
GlobalCurrentXid
++
;
spin_unlock
(
&
GlobalMid_Lock
);
...
...
@@ -60,7 +60,7 @@ void
_FreeXid
(
unsigned
int
xid
)
{
spin_lock
(
&
GlobalMid_Lock
);
/* if(GlobalTotalActiveXid == 0)
/* if
(GlobalTotalActiveXid == 0)
BUG(); */
GlobalTotalActiveXid
--
;
spin_unlock
(
&
GlobalMid_Lock
);
...
...
@@ -242,7 +242,7 @@ __u16 GetNextMid(struct TCP_Server_Info *server)
__u16
last_mid
;
int
collision
;
if
(
server
==
NULL
)
if
(
server
==
NULL
)
return
mid
;
spin_lock
(
&
GlobalMid_Lock
);
...
...
@@ -260,7 +260,7 @@ __u16 GetNextMid(struct TCP_Server_Info *server)
struct
mid_q_entry
*
mid_entry
;
collision
=
0
;
if
(
server
->
CurrentMid
==
0
)
if
(
server
->
CurrentMid
==
0
)
server
->
CurrentMid
++
;
list_for_each
(
tmp
,
&
server
->
pending_mid_q
)
{
...
...
@@ -273,7 +273,7 @@ __u16 GetNextMid(struct TCP_Server_Info *server)
break
;
}
}
if
(
collision
==
0
)
{
if
(
collision
==
0
)
{
mid
=
server
->
CurrentMid
;
break
;
}
...
...
@@ -325,7 +325,7 @@ header_assemble(struct smb_hdr *buffer, char smb_command /* command */ ,
/* Uid is not converted */
buffer
->
Uid
=
treeCon
->
ses
->
Suid
;
buffer
->
Mid
=
GetNextMid
(
treeCon
->
ses
->
server
);
if
(
multiuser_mount
!=
0
)
{
if
(
multiuser_mount
!=
0
)
{
/* For the multiuser case, there are few obvious technically */
/* possible mechanisms to match the local linux user (uid) */
/* to a valid remote smb user (smb_uid): */
...
...
@@ -350,13 +350,13 @@ header_assemble(struct smb_hdr *buffer, char smb_command /* command */ ,
/* BB Add support for establishing new tCon and SMB Session */
/* with userid/password pairs found on the smb session */
/* for other target tcp/ip addresses BB */
if
(
current
->
fsuid
!=
treeCon
->
ses
->
linux_uid
)
{
if
(
current
->
fsuid
!=
treeCon
->
ses
->
linux_uid
)
{
cFYI
(
1
,(
"Multiuser mode and UID did not match tcon uid"
));
read_lock
(
&
GlobalSMBSeslock
);
list_for_each
(
temp_item
,
&
GlobalSMBSessionList
)
{
ses
=
list_entry
(
temp_item
,
struct
cifsSesInfo
,
cifsSessionList
);
if
(
ses
->
linux_uid
==
current
->
fsuid
)
{
if
(
ses
->
server
==
treeCon
->
ses
->
server
)
{
if
(
ses
->
linux_uid
==
current
->
fsuid
)
{
if
(
ses
->
server
==
treeCon
->
ses
->
server
)
{
cFYI
(
1
,(
"found matching uid substitute right smb_uid"
));
buffer
->
Uid
=
ses
->
Suid
;
break
;
...
...
@@ -374,8 +374,8 @@ header_assemble(struct smb_hdr *buffer, char smb_command /* command */ ,
buffer
->
Flags2
|=
SMBFLG2_DFS
;
if
(
treeCon
->
nocase
)
buffer
->
Flags
|=
SMBFLG_CASELESS
;
if
((
treeCon
->
ses
)
&&
(
treeCon
->
ses
->
server
))
if
(
treeCon
->
ses
->
server
->
secMode
&
if
((
treeCon
->
ses
)
&&
(
treeCon
->
ses
->
server
))
if
(
treeCon
->
ses
->
server
->
secMode
&
(
SECMODE_SIGN_REQUIRED
|
SECMODE_SIGN_ENABLED
))
buffer
->
Flags2
|=
SMBFLG2_SECURITY_SIGNATURE
;
}
...
...
@@ -392,11 +392,11 @@ checkSMBhdr(struct smb_hdr *smb, __u16 mid)
and that the message ids match */
if
((
*
(
__le32
*
)
smb
->
Protocol
==
cpu_to_le32
(
0x424d53ff
))
&&
(
mid
==
smb
->
Mid
))
{
if
(
smb
->
Flags
&
SMBFLG_RESPONSE
)
if
(
smb
->
Flags
&
SMBFLG_RESPONSE
)
return
0
;
else
{
/* only one valid case where server sends us request */
if
(
smb
->
Command
==
SMB_COM_LOCKING_ANDX
)
if
(
smb
->
Command
==
SMB_COM_LOCKING_ANDX
)
return
0
;
else
cERROR
(
1
,
(
"Rcvd Request not response"
));
...
...
@@ -458,16 +458,16 @@ checkSMB(struct smb_hdr *smb, __u16 mid, unsigned int length)
return
1
;
clc_len
=
smbCalcSize_LE
(
smb
);
if
(
4
+
len
!=
length
)
{
if
(
4
+
len
!=
length
)
{
cERROR
(
1
,
(
"Length read does not match RFC1001 length %d"
,
len
));
return
1
;
}
if
(
4
+
len
!=
clc_len
)
{
/* check if bcc wrapped around for large read responses */
if
((
len
>
64
*
1024
)
&&
(
len
>
clc_len
))
{
if
((
len
>
64
*
1024
)
&&
(
len
>
clc_len
))
{
/* check if lengths match mod 64K */
if
(((
4
+
len
)
&
0xFFFF
)
==
(
clc_len
&
0xFFFF
))
if
(((
4
+
len
)
&
0xFFFF
)
==
(
clc_len
&
0xFFFF
))
return
0
;
/* bcc wrapped */
}
cFYI
(
1
,
(
"Calculated size %d vs length %d mismatch for mid %d"
,
...
...
@@ -483,7 +483,7 @@ checkSMB(struct smb_hdr *smb, __u16 mid, unsigned int length)
but server says length is 0x21 bytes too long as if the server
forget to reset the smb rfc1001 length when it reset the
wct and bcc to minimum size and drop the t2 parms and data */
if
((
4
+
len
>
clc_len
)
&&
(
len
<=
clc_len
+
512
))
if
((
4
+
len
>
clc_len
)
&&
(
len
<=
clc_len
+
512
))
return
0
;
else
{
cERROR
(
1
,
(
"RFC1001 size %d bigger than SMB for Mid=%d"
,
...
...
@@ -503,13 +503,13 @@ is_valid_oplock_break(struct smb_hdr *buf, struct TCP_Server_Info *srv)
struct
cifsFileInfo
*
netfile
;
cFYI
(
1
,(
"Checking for oplock break or dnotify response"
));
if
((
pSMB
->
hdr
.
Command
==
SMB_COM_NT_TRANSACT
)
&&
if
((
pSMB
->
hdr
.
Command
==
SMB_COM_NT_TRANSACT
)
&&
(
pSMB
->
hdr
.
Flags
&
SMBFLG_RESPONSE
))
{
struct
smb_com_transaction_change_notify_rsp
*
pSMBr
=
(
struct
smb_com_transaction_change_notify_rsp
*
)
buf
;
struct
file_notify_information
*
pnotify
;
__u32
data_offset
=
0
;
if
(
pSMBr
->
ByteCount
>
sizeof
(
struct
file_notify_information
))
{
if
(
pSMBr
->
ByteCount
>
sizeof
(
struct
file_notify_information
))
{
data_offset
=
le32_to_cpu
(
pSMBr
->
DataOffset
);
pnotify
=
(
struct
file_notify_information
*
)
...
...
@@ -520,15 +520,15 @@ is_valid_oplock_break(struct smb_hdr *buf, struct TCP_Server_Info *srv)
sizeof(struct smb_hdr)+60); */
return
TRUE
;
}
if
(
pSMBr
->
hdr
.
Status
.
CifsError
)
{
if
(
pSMBr
->
hdr
.
Status
.
CifsError
)
{
cFYI
(
1
,(
"notify err 0x%d"
,
pSMBr
->
hdr
.
Status
.
CifsError
));
return
TRUE
;
}
return
FALSE
;
}
if
(
pSMB
->
hdr
.
Command
!=
SMB_COM_LOCKING_ANDX
)
if
(
pSMB
->
hdr
.
Command
!=
SMB_COM_LOCKING_ANDX
)
return
FALSE
;
if
(
pSMB
->
hdr
.
Flags
&
SMBFLG_RESPONSE
)
{
if
(
pSMB
->
hdr
.
Flags
&
SMBFLG_RESPONSE
)
{
/* no sense logging error on invalid handle on oplock
break - harmless race between close request and oplock
break response is expected from time to time writing out
...
...
@@ -544,11 +544,11 @@ is_valid_oplock_break(struct smb_hdr *buf, struct TCP_Server_Info *srv)
return
FALSE
;
/* on valid oplock brk we get "request" */
}
}
if
(
pSMB
->
hdr
.
WordCount
!=
8
)
if
(
pSMB
->
hdr
.
WordCount
!=
8
)
return
FALSE
;
cFYI
(
1
,(
" oplock type 0x%d level 0x%d"
,
pSMB
->
LockType
,
pSMB
->
OplockLevel
));
if
(
!
(
pSMB
->
LockType
&
LOCKING_ANDX_OPLOCK_RELEASE
))
if
(
!
(
pSMB
->
LockType
&
LOCKING_ANDX_OPLOCK_RELEASE
))
return
FALSE
;
/* look up tcon based on tid & uid */
...
...
@@ -560,14 +560,14 @@ is_valid_oplock_break(struct smb_hdr *buf, struct TCP_Server_Info *srv)
list_for_each
(
tmp1
,
&
tcon
->
openFileList
){
netfile
=
list_entry
(
tmp1
,
struct
cifsFileInfo
,
tlist
);
if
(
pSMB
->
Fid
==
netfile
->
netfid
)
{
if
(
pSMB
->
Fid
==
netfile
->
netfid
)
{
struct
cifsInodeInfo
*
pCifsInode
;
read_unlock
(
&
GlobalSMBSeslock
);
cFYI
(
1
,(
"file id match, oplock break"
));
pCifsInode
=
CIFS_I
(
netfile
->
pInode
);
pCifsInode
->
clientCanCacheAll
=
FALSE
;
if
(
pSMB
->
OplockLevel
==
0
)
if
(
pSMB
->
OplockLevel
==
0
)
pCifsInode
->
clientCanCacheRead
=
FALSE
;
pCifsInode
->
oplockPending
=
TRUE
;
...
...
@@ -575,7 +575,7 @@ is_valid_oplock_break(struct smb_hdr *buf, struct TCP_Server_Info *srv)
netfile
->
netfid
,
tcon
);
cFYI
(
1
,(
"about to wake up oplock thd"
));
if
(
oplockThread
)
if
(
oplockThread
)
wake_up_process
(
oplockThread
);
return
TRUE
;
}
...
...
@@ -681,7 +681,7 @@ cifs_convertUCSpath(char *target, const __le16 * source, int maxlen,
default:
len
=
cp
->
uni2char
(
src_char
,
&
target
[
j
],
NLS_MAX_CHARSET_SIZE
);
if
(
len
>
0
)
{
if
(
len
>
0
)
{
j
+=
len
;
continue
;
}
else
{
...
...
@@ -690,7 +690,7 @@ cifs_convertUCSpath(char *target, const __le16 * source, int maxlen,
}
j
++
;
/* make sure we do not overrun callers allocated temp buffer */
if
(
j
>=
(
2
*
NAME_MAX
))
if
(
j
>=
(
2
*
NAME_MAX
))
break
;
}
cUCS_out:
...
...
@@ -711,7 +711,7 @@ cifsConvertToUCS(__le16 * target, const char *source, int maxlen,
char
src_char
;
__u16
temp
;
if
(
!
mapChars
)
if
(
!
mapChars
)
return
cifs_strtoUCS
(
target
,
source
,
PATH_MAX
,
cp
);
for
(
i
=
0
,
j
=
0
;
i
<
maxlen
;
j
++
)
{
...
...
@@ -749,7 +749,7 @@ cifsConvertToUCS(__le16 * target, const char *source, int maxlen,
len_remaining
,
&
temp
);
/* if no match, use question mark, which
at least in some cases servers as wild card */
if
(
charlen
<
1
)
{
if
(
charlen
<
1
)
{
target
[
j
]
=
cpu_to_le16
(
0x003f
);
charlen
=
1
;
}
else
...
...
fs/cifs/netmisc.c
浏览文件 @
790fe579
...
...
@@ -140,9 +140,9 @@ cifs_inet_pton(int address_family, char *cp,void *dst)
/* calculate length by finding first slash or NULL */
/* BB Should we convert '/' slash to '\' here since it seems already done
before this */
if
(
address_family
==
AF_INET
)
{
if
(
address_family
==
AF_INET
)
{
ret
=
in4_pton
(
cp
,
-
1
/* len */
,
dst
,
'\\'
,
NULL
);
}
else
if
(
address_family
==
AF_INET6
)
{
}
else
if
(
address_family
==
AF_INET6
)
{
ret
=
in6_pton
(
cp
,
-
1
/* len */
,
dst
,
'\\'
,
NULL
);
}
#ifdef CONFIG_CIFS_DEBUG2
...
...
@@ -773,7 +773,7 @@ map_smb_to_linux_error(struct smb_hdr *smb)
if
(
smb
->
Flags2
&
SMBFLG2_ERR_STATUS
)
{
/* translate the newer STATUS codes to old style errors and then to POSIX errors */
__u32
err
=
le32_to_cpu
(
smb
->
Status
.
CifsError
);
if
(
cifsFYI
&
CIFS_RC
)
if
(
cifsFYI
&
CIFS_RC
)
cifs_print_status
(
err
);
ntstatus_to_dos
(
err
,
&
smberrclass
,
&
smberrcode
);
}
else
{
...
...
@@ -889,15 +889,15 @@ struct timespec cnvrtDosUnixTm(__u16 date, __u16 time)
sec
=
2
*
st
->
TwoSeconds
;
min
=
st
->
Minutes
;
if
((
sec
>
59
)
||
(
min
>
59
))
if
((
sec
>
59
)
||
(
min
>
59
))
cERROR
(
1
,(
"illegal time min %d sec %d"
,
min
,
sec
));
sec
+=
(
min
*
60
);
sec
+=
60
*
60
*
st
->
Hours
;
if
(
st
->
Hours
>
24
)
if
(
st
->
Hours
>
24
)
cERROR
(
1
,(
"illegal hours %d"
,
st
->
Hours
));
days
=
sd
->
Day
;
month
=
sd
->
Month
;
if
((
days
>
31
)
||
(
month
>
12
))
if
((
days
>
31
)
||
(
month
>
12
))
cERROR
(
1
,(
"illegal date, month %d day: %d"
,
month
,
days
));
month
-=
1
;
days
+=
total_days_of_prev_months
[
month
];
...
...
@@ -911,13 +911,13 @@ struct timespec cnvrtDosUnixTm(__u16 date, __u16 time)
consider 2 special case years, ie the years 2000 and 2100, and only
adjust for the lack of leap year for the year 2100, as 2000 was a
leap year (divisable by 400) */
if
(
year
>=
120
)
/* the year 2100 */
if
(
year
>=
120
)
/* the year 2100 */
days
=
days
-
1
;
/* do not count leap year for the year 2100 */
/* adjust for leap year where we are still before leap day */
if
(
year
!=
120
)
if
(
year
!=
120
)
days
-=
((
year
&
0x03
)
==
0
)
&&
(
month
<
2
?
1
:
0
);
sec
+=
24
*
60
*
60
*
days
;
sec
+=
24
*
60
*
60
*
days
;
ts
.
tv_sec
=
sec
;
...
...
fs/cifs/readdir.c
浏览文件 @
790fe579
此差异已折叠。
点击以展开。
fs/cifs/sess.c
浏览文件 @
790fe579
...
...
@@ -3,7 +3,7 @@
*
* SMB/CIFS session setup handling routines
*
* Copyright (c) International Business Machines Corp., 2006
* Copyright (c) International Business Machines Corp., 2006
, 2007
* Author(s): Steve French (sfrench@us.ibm.com)
*
* This library is free software; you can redistribute it and/or modify
...
...
@@ -31,7 +31,7 @@
#include <linux/utsname.h>
extern
void
SMBNTencrypt
(
unsigned
char
*
passwd
,
unsigned
char
*
c8
,
unsigned
char
*
p24
);
unsigned
char
*
p24
);
static
__u32
cifs_ssetup_hdr
(
struct
cifsSesInfo
*
ses
,
SESSION_SETUP_ANDX
*
pSMB
)
{
...
...
@@ -45,13 +45,14 @@ static __u32 cifs_ssetup_hdr(struct cifsSesInfo *ses, SESSION_SETUP_ANDX *pSMB)
/* Now no need to set SMBFLG_CASELESS or obsolete CANONICAL PATH */
/* BB verify whether signing required on neg or just on auth frame
/* BB verify whether signing required on neg or just on auth frame
(and NTLM case) */
capabilities
=
CAP_LARGE_FILES
|
CAP_NT_SMBS
|
CAP_LEVEL_II_OPLOCKS
|
CAP_LARGE_WRITE_X
|
CAP_LARGE_READ_X
;
if
(
ses
->
server
->
secMode
&
(
SECMODE_SIGN_REQUIRED
|
SECMODE_SIGN_ENABLED
))
if
(
ses
->
server
->
secMode
&
(
SECMODE_SIGN_REQUIRED
|
SECMODE_SIGN_ENABLED
))
pSMB
->
req
.
hdr
.
Flags2
|=
SMBFLG2_SECURITY_SIGNATURE
;
if
(
ses
->
capabilities
&
CAP_UNICODE
)
{
...
...
@@ -75,9 +76,9 @@ static __u32 cifs_ssetup_hdr(struct cifsSesInfo *ses, SESSION_SETUP_ANDX *pSMB)
}
static
void
unicode_ssetup_strings
(
char
**
pbcc_area
,
struct
cifsSesInfo
*
ses
,
const
struct
nls_table
*
nls_cp
)
const
struct
nls_table
*
nls_cp
)
{
char
*
bcc_ptr
=
*
pbcc_area
;
char
*
bcc_ptr
=
*
pbcc_area
;
int
bytes_ret
=
0
;
/* BB FIXME add check that strings total less
...
...
@@ -89,7 +90,7 @@ static void unicode_ssetup_strings(char ** pbcc_area, struct cifsSesInfo *ses,
bcc_ptr++;
} */
/* copy user */
if
(
ses
->
userName
==
NULL
)
{
if
(
ses
->
userName
==
NULL
)
{
/* null user mount */
*
bcc_ptr
=
0
;
*
(
bcc_ptr
+
1
)
=
0
;
...
...
@@ -100,7 +101,7 @@ static void unicode_ssetup_strings(char ** pbcc_area, struct cifsSesInfo *ses,
bcc_ptr
+=
2
*
bytes_ret
;
bcc_ptr
+=
2
;
/* account for null termination */
/* copy domain */
if
(
ses
->
domainName
==
NULL
)
{
if
(
ses
->
domainName
==
NULL
)
{
/* Sending null domain better than using a bogus domain name (as
we did briefly in 2.6.18) since server will use its default */
*
bcc_ptr
=
0
;
...
...
@@ -122,7 +123,7 @@ static void unicode_ssetup_strings(char ** pbcc_area, struct cifsSesInfo *ses,
bcc_ptr
+=
2
;
/* trailing null */
bytes_ret
=
cifs_strtoUCS
((
__le16
*
)
bcc_ptr
,
CIFS_NETWORK_OPSYS
,
32
,
nls_cp
);
32
,
nls_cp
);
bcc_ptr
+=
2
*
bytes_ret
;
bcc_ptr
+=
2
;
/* trailing null */
...
...
@@ -130,29 +131,29 @@ static void unicode_ssetup_strings(char ** pbcc_area, struct cifsSesInfo *ses,
}
static
void
ascii_ssetup_strings
(
char
**
pbcc_area
,
struct
cifsSesInfo
*
ses
,
const
struct
nls_table
*
nls_cp
)
const
struct
nls_table
*
nls_cp
)
{
char
*
bcc_ptr
=
*
pbcc_area
;
char
*
bcc_ptr
=
*
pbcc_area
;
/* copy user */
/* BB what about null user mounts - check that we do this BB */
/* copy user */
if
(
ses
->
userName
==
NULL
)
{
/* BB what about null user mounts - check that we do this BB */
}
else
{
/* 300 should be long enough for any conceivable user name */
strncpy
(
bcc_ptr
,
ses
->
userName
,
300
);
}
/* copy user */
if
(
ses
->
userName
==
NULL
)
{
/* BB what about null user mounts - check that we do this BB */
}
else
{
/* 300 should be long enough for any conceivable user name */
strncpy
(
bcc_ptr
,
ses
->
userName
,
300
);
}
/* BB improve check for overflow */
bcc_ptr
+=
strnlen
(
ses
->
userName
,
300
);
bcc_ptr
+=
strnlen
(
ses
->
userName
,
300
);
*
bcc_ptr
=
0
;
bcc_ptr
++
;
/* account for null termination */
bcc_ptr
++
;
/* account for null termination */
/* copy domain */
if
(
ses
->
domainName
!=
NULL
)
{
strncpy
(
bcc_ptr
,
ses
->
domainName
,
256
);
/* copy domain */
if
(
ses
->
domainName
!=
NULL
)
{
strncpy
(
bcc_ptr
,
ses
->
domainName
,
256
);
bcc_ptr
+=
strnlen
(
ses
->
domainName
,
256
);
}
/* else we will send a null domain name
}
/* else we will send a null domain name
so the server will default to its own domain */
*
bcc_ptr
=
0
;
bcc_ptr
++
;
...
...
@@ -167,19 +168,20 @@ static void ascii_ssetup_strings(char ** pbcc_area, struct cifsSesInfo *ses,
strcpy
(
bcc_ptr
,
CIFS_NETWORK_OPSYS
);
bcc_ptr
+=
strlen
(
CIFS_NETWORK_OPSYS
)
+
1
;
*
pbcc_area
=
bcc_ptr
;
*
pbcc_area
=
bcc_ptr
;
}
static
int
decode_unicode_ssetup
(
char
**
pbcc_area
,
int
bleft
,
struct
cifsSesInfo
*
ses
,
const
struct
nls_table
*
nls_cp
)
static
int
decode_unicode_ssetup
(
char
**
pbcc_area
,
int
bleft
,
struct
cifsSesInfo
*
ses
,
const
struct
nls_table
*
nls_cp
)
{
int
rc
=
0
;
int
words_left
,
len
;
char
*
data
=
*
pbcc_area
;
char
*
data
=
*
pbcc_area
;
cFYI
(
1
,
(
"bleft %d"
,
bleft
));
cFYI
(
1
,
(
"bleft %d"
,
bleft
));
/* SMB header is unaligned, so cifs servers word align start of
...
...
@@ -198,14 +200,14 @@ static int decode_unicode_ssetup(char ** pbcc_area, int bleft, struct cifsSesInf
/* We look for obvious messed up bcc or strings in response so we do not go off
the end since (at least) WIN2K and Windows XP have a major bug in not null
terminating last Unicode string in response */
if
(
len
>=
words_left
)
if
(
len
>=
words_left
)
return
rc
;
if
(
ses
->
serverOS
)
if
(
ses
->
serverOS
)
kfree
(
ses
->
serverOS
);
/* UTF-8 string will not grow more than four times as big as UCS-16 */
ses
->
serverOS
=
kzalloc
(
4
*
len
,
GFP_KERNEL
);
if
(
ses
->
serverOS
!=
NULL
)
{
if
(
ses
->
serverOS
!=
NULL
)
{
cifs_strfromUCS_le
(
ses
->
serverOS
,
(
__le16
*
)
data
,
len
,
nls_cp
);
}
...
...
@@ -215,67 +217,68 @@ static int decode_unicode_ssetup(char ** pbcc_area, int bleft, struct cifsSesInf
/* save off server network operating system */
len
=
UniStrnlen
((
wchar_t
*
)
data
,
words_left
);
if
(
len
>=
words_left
)
if
(
len
>=
words_left
)
return
rc
;
if
(
ses
->
serverNOS
)
if
(
ses
->
serverNOS
)
kfree
(
ses
->
serverNOS
);
ses
->
serverNOS
=
kzalloc
(
4
*
len
,
GFP_KERNEL
);
/* BB this is wrong length FIXME BB */
if
(
ses
->
serverNOS
!=
NULL
)
{
if
(
ses
->
serverNOS
!=
NULL
)
{
cifs_strfromUCS_le
(
ses
->
serverNOS
,
(
__le16
*
)
data
,
len
,
nls_cp
);
if
(
strncmp
(
ses
->
serverNOS
,
"NT LAN Manager 4"
,
16
)
==
0
)
{
cFYI
(
1
,(
"NT4 server"
));
if
(
strncmp
(
ses
->
serverNOS
,
"NT LAN Manager 4"
,
16
)
==
0
)
{
cFYI
(
1
,
(
"NT4 server"
));
ses
->
flags
|=
CIFS_SES_NT4
;
}
}
data
+=
2
*
(
len
+
1
);
words_left
-=
len
+
1
;
/* save off server domain */
len
=
UniStrnlen
((
wchar_t
*
)
data
,
words_left
);
if
(
len
>
words_left
)
return
rc
;
if
(
ses
->
serverDomain
)
kfree
(
ses
->
serverDomain
);
ses
->
serverDomain
=
kzalloc
(
2
*
(
len
+
1
),
GFP_KERNEL
);
/* BB FIXME wrong length */
if
(
ses
->
serverDomain
!=
NULL
)
{
cifs_strfromUCS_le
(
ses
->
serverDomain
,
(
__le16
*
)
data
,
len
,
nls_cp
);
ses
->
serverDomain
[
2
*
len
]
=
0
;
ses
->
serverDomain
[(
2
*
len
)
+
1
]
=
0
;
}
data
+=
2
*
(
len
+
1
);
words_left
-=
len
+
1
;
cFYI
(
1
,
(
"words left: %d"
,
words_left
));
/* save off server domain */
len
=
UniStrnlen
((
wchar_t
*
)
data
,
words_left
);
if
(
len
>
words_left
)
return
rc
;
if
(
ses
->
serverDomain
)
kfree
(
ses
->
serverDomain
);
ses
->
serverDomain
=
kzalloc
(
2
*
(
len
+
1
),
GFP_KERNEL
);
/* BB FIXME wrong length */
if
(
ses
->
serverDomain
!=
NULL
)
{
cifs_strfromUCS_le
(
ses
->
serverDomain
,
(
__le16
*
)
data
,
len
,
nls_cp
);
ses
->
serverDomain
[
2
*
len
]
=
0
;
ses
->
serverDomain
[(
2
*
len
)
+
1
]
=
0
;
}
data
+=
2
*
(
len
+
1
);
words_left
-=
len
+
1
;
cFYI
(
1
,
(
"words left: %d"
,
words_left
));
return
rc
;
}
static
int
decode_ascii_ssetup
(
char
**
pbcc_area
,
int
bleft
,
struct
cifsSesInfo
*
ses
,
const
struct
nls_table
*
nls_cp
)
static
int
decode_ascii_ssetup
(
char
**
pbcc_area
,
int
bleft
,
struct
cifsSesInfo
*
ses
,
const
struct
nls_table
*
nls_cp
)
{
int
rc
=
0
;
int
len
;
char
*
bcc_ptr
=
*
pbcc_area
;
char
*
bcc_ptr
=
*
pbcc_area
;
cFYI
(
1
,(
"decode sessetup ascii. bleft %d"
,
bleft
));
cFYI
(
1
,
(
"decode sessetup ascii. bleft %d"
,
bleft
));
len
=
strnlen
(
bcc_ptr
,
bleft
);
if
(
len
>=
bleft
)
if
(
len
>=
bleft
)
return
rc
;
if
(
ses
->
serverOS
)
if
(
ses
->
serverOS
)
kfree
(
ses
->
serverOS
);
ses
->
serverOS
=
kzalloc
(
len
+
1
,
GFP_KERNEL
);
if
(
ses
->
serverOS
)
if
(
ses
->
serverOS
)
strncpy
(
ses
->
serverOS
,
bcc_ptr
,
len
);
if
(
strncmp
(
ses
->
serverOS
,
"OS/2"
,
4
)
==
0
)
{
cFYI
(
1
,(
"OS/2 server"
));
if
(
strncmp
(
ses
->
serverOS
,
"OS/2"
,
4
)
==
0
)
{
cFYI
(
1
,
(
"OS/2 server"
));
ses
->
flags
|=
CIFS_SES_OS2
;
}
...
...
@@ -283,34 +286,34 @@ static int decode_ascii_ssetup(char ** pbcc_area, int bleft, struct cifsSesInfo
bleft
-=
len
+
1
;
len
=
strnlen
(
bcc_ptr
,
bleft
);
if
(
len
>=
bleft
)
if
(
len
>=
bleft
)
return
rc
;
if
(
ses
->
serverNOS
)
if
(
ses
->
serverNOS
)
kfree
(
ses
->
serverNOS
);
ses
->
serverNOS
=
kzalloc
(
len
+
1
,
GFP_KERNEL
);
if
(
ses
->
serverNOS
)
if
(
ses
->
serverNOS
)
strncpy
(
ses
->
serverNOS
,
bcc_ptr
,
len
);
bcc_ptr
+=
len
+
1
;
bleft
-=
len
+
1
;
len
=
strnlen
(
bcc_ptr
,
bleft
);
if
(
len
>
bleft
)
return
rc
;
len
=
strnlen
(
bcc_ptr
,
bleft
);
if
(
len
>
bleft
)
return
rc
;
/* No domain field in LANMAN case. Domain is
returned by old servers in the SMB negprot response */
/* BB For newer servers which do not support Unicode,
but thus do return domain here we could add parsing
for it later, but it is not very important */
cFYI
(
1
,
(
"ascii: bytes left %d"
,
bleft
));
cFYI
(
1
,
(
"ascii: bytes left %d"
,
bleft
));
return
rc
;
}
int
int
CIFS_SessSetup
(
unsigned
int
xid
,
struct
cifsSesInfo
*
ses
,
int
first_time
,
const
struct
nls_table
*
nls_cp
)
{
...
...
@@ -328,13 +331,13 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
__u16
action
;
int
bytes_remaining
;
if
(
ses
==
NULL
)
if
(
ses
==
NULL
)
return
-
EINVAL
;
type
=
ses
->
server
->
secType
;
cFYI
(
1
,
(
"sess setup type %d"
,
type
));
if
(
type
==
LANMAN
)
{
cFYI
(
1
,
(
"sess setup type %d"
,
type
));
if
(
type
==
LANMAN
)
{
#ifndef CONFIG_CIFS_WEAK_PW_HASH
/* LANMAN and plaintext are less secure and off by default.
So we make this explicitly be turned on in kconfig (in the
...
...
@@ -344,15 +347,15 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
return
-
EOPNOTSUPP
;
#endif
wct
=
10
;
/* lanman 2 style sessionsetup */
}
else
if
((
type
==
NTLM
)
||
(
type
==
NTLMv2
))
{
}
else
if
((
type
==
NTLM
)
||
(
type
==
NTLMv2
))
{
/* For NTLMv2 failures eventually may need to retry NTLM */
wct
=
13
;
/* old style NTLM sessionsetup */
}
else
/* same size
for
negotiate or auth, NTLMSSP or extended security */
}
else
/* same size
:
negotiate or auth, NTLMSSP or extended security */
wct
=
12
;
rc
=
small_smb_init_no_tc
(
SMB_COM_SESSION_SETUP_ANDX
,
wct
,
ses
,
(
void
**
)
&
smb_buf
);
if
(
rc
)
if
(
rc
)
return
rc
;
pSMB
=
(
SESSION_SETUP_ANDX
*
)
smb_buf
;
...
...
@@ -364,8 +367,8 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
second part which will include the strings
and rest of bcc area, in order to avoid having
to do a large buffer 17K allocation */
iov
[
0
].
iov_base
=
(
char
*
)
pSMB
;
iov
[
0
].
iov_len
=
smb_buf
->
smb_buf_length
+
4
;
iov
[
0
].
iov_base
=
(
char
*
)
pSMB
;
iov
[
0
].
iov_len
=
smb_buf
->
smb_buf_length
+
4
;
/* 2000 big enough to fit max user, domain, NOS name etc. */
str_area
=
kmalloc
(
2000
,
GFP_KERNEL
);
...
...
@@ -373,18 +376,18 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
ses
->
flags
&=
~
CIFS_SES_LANMAN
;
if
(
type
==
LANMAN
)
{
if
(
type
==
LANMAN
)
{
#ifdef CONFIG_CIFS_WEAK_PW_HASH
char
lnm_session_key
[
CIFS_SESS_KEY_SIZE
];
/* no capabilities flags in old lanman negotiation */
pSMB
->
old_req
.
PasswordLength
=
cpu_to_le16
(
CIFS_SESS_KEY_SIZE
);
pSMB
->
old_req
.
PasswordLength
=
cpu_to_le16
(
CIFS_SESS_KEY_SIZE
);
/* BB calculate hash with password */
/* and copy into bcc */
calc_lanman_hash
(
ses
,
lnm_session_key
);
ses
->
flags
|=
CIFS_SES_LANMAN
;
ses
->
flags
|=
CIFS_SES_LANMAN
;
/* #ifdef CONFIG_CIFS_DEBUG2
cifs_dump_mem("cryptkey: ",ses->server->cryptKey,
CIFS_SESS_KEY_SIZE);
...
...
@@ -397,10 +400,10 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
changed to do higher than lanman dialect and
we reconnected would we ever calc signing_key? */
cFYI
(
1
,(
"Negotiating LANMAN setting up strings"
));
cFYI
(
1
,
(
"Negotiating LANMAN setting up strings"
));
/* Unicode not allowed for LANMAN dialects */
ascii_ssetup_strings
(
&
bcc_ptr
,
ses
,
nls_cp
);
#endif
#endif
}
else
if
(
type
==
NTLM
)
{
char
ntlm_session_key
[
CIFS_SESS_KEY_SIZE
];
...
...
@@ -414,33 +417,33 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
SMBNTencrypt
(
ses
->
password
,
ses
->
server
->
cryptKey
,
ntlm_session_key
);
if
(
first_time
)
/* should this be moved into common code
if
(
first_time
)
/* should this be moved into common code
with similar ntlmv2 path? */
cifs_calculate_mac_key
(
ses
->
server
->
mac_signing_key
,
ntlm_session_key
,
ses
->
password
);
/* copy session key */
memcpy
(
bcc_ptr
,
(
char
*
)
ntlm_session_key
,
CIFS_SESS_KEY_SIZE
);
memcpy
(
bcc_ptr
,
(
char
*
)
ntlm_session_key
,
CIFS_SESS_KEY_SIZE
);
bcc_ptr
+=
CIFS_SESS_KEY_SIZE
;
memcpy
(
bcc_ptr
,
(
char
*
)
ntlm_session_key
,
CIFS_SESS_KEY_SIZE
);
memcpy
(
bcc_ptr
,
(
char
*
)
ntlm_session_key
,
CIFS_SESS_KEY_SIZE
);
bcc_ptr
+=
CIFS_SESS_KEY_SIZE
;
if
(
ses
->
capabilities
&
CAP_UNICODE
)
{
if
(
ses
->
capabilities
&
CAP_UNICODE
)
{
/* unicode strings must be word aligned */
if
(
iov
[
0
].
iov_len
%
2
)
{
*
bcc_ptr
=
0
;
bcc_ptr
++
;
}
bcc_ptr
++
;
}
unicode_ssetup_strings
(
&
bcc_ptr
,
ses
,
nls_cp
);
}
else
ascii_ssetup_strings
(
&
bcc_ptr
,
ses
,
nls_cp
);
}
else
if
(
type
==
NTLMv2
)
{
char
*
v2_sess_key
=
char
*
v2_sess_key
=
kmalloc
(
sizeof
(
struct
ntlmv2_resp
),
GFP_KERNEL
);
/* BB FIXME change all users of v2_sess_key to
struct ntlmv2_resp */
if
(
v2_sess_key
==
NULL
)
{
if
(
v2_sess_key
==
NULL
)
{
cifs_small_buf_release
(
smb_buf
);
return
-
ENOMEM
;
}
...
...
@@ -456,8 +459,8 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
/* calculate session key */
setup_ntlmv2_rsp
(
ses
,
v2_sess_key
,
nls_cp
);
if
(
first_time
)
/* should this be moved into common code
with similar ntlmv2 path? */
if
(
first_time
)
/* should this be moved into common code
with similar ntlmv2 path? */
/* cifs_calculate_ntlmv2_mac_key(ses->server->mac_signing_key,
response BB FIXME, v2_sess_key); */
...
...
@@ -468,8 +471,8 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
memcpy
(
bcc_ptr
,
(
char
*
)
v2_sess_key
,
sizeof
(
struct
ntlmv2_resp
));
bcc_ptr
+=
sizeof
(
struct
ntlmv2_resp
);
kfree
(
v2_sess_key
);
if
(
ses
->
capabilities
&
CAP_UNICODE
)
{
if
(
iov
[
0
].
iov_len
%
2
)
{
if
(
ses
->
capabilities
&
CAP_UNICODE
)
{
if
(
iov
[
0
].
iov_len
%
2
)
{
*
bcc_ptr
=
0
;
}
bcc_ptr
++
;
unicode_ssetup_strings
(
&
bcc_ptr
,
ses
,
nls_cp
);
...
...
@@ -488,20 +491,20 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
BCC_LE
(
smb_buf
)
=
cpu_to_le16
(
count
);
iov
[
1
].
iov_base
=
str_area
;
iov
[
1
].
iov_len
=
count
;
iov
[
1
].
iov_len
=
count
;
rc
=
SendReceive2
(
xid
,
ses
,
iov
,
2
/* num_iovecs */
,
&
resp_buf_type
,
0
);
/* SMB request buf freed in SendReceive2 */
cFYI
(
1
,
(
"ssetup rc from sendrecv2 is %d"
,
rc
));
if
(
rc
)
cFYI
(
1
,
(
"ssetup rc from sendrecv2 is %d"
,
rc
));
if
(
rc
)
goto
ssetup_exit
;
pSMB
=
(
SESSION_SETUP_ANDX
*
)
iov
[
0
].
iov_base
;
smb_buf
=
(
struct
smb_hdr
*
)
iov
[
0
].
iov_base
;
if
((
smb_buf
->
WordCount
!=
3
)
&&
(
smb_buf
->
WordCount
!=
4
))
{
if
((
smb_buf
->
WordCount
!=
3
)
&&
(
smb_buf
->
WordCount
!=
4
))
{
rc
=
-
EIO
;
cERROR
(
1
,(
"bad word count %d"
,
smb_buf
->
WordCount
));
cERROR
(
1
,
(
"bad word count %d"
,
smb_buf
->
WordCount
));
goto
ssetup_exit
;
}
action
=
le16_to_cpu
(
pSMB
->
resp
.
Action
);
...
...
@@ -514,20 +517,20 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
bytes_remaining
=
BCC
(
smb_buf
);
bcc_ptr
=
pByteArea
(
smb_buf
);
if
(
smb_buf
->
WordCount
==
4
)
{
if
(
smb_buf
->
WordCount
==
4
)
{
__u16
blob_len
;
blob_len
=
le16_to_cpu
(
pSMB
->
resp
.
SecurityBlobLength
);
bcc_ptr
+=
blob_len
;
if
(
blob_len
>
bytes_remaining
)
{
cERROR
(
1
,(
"bad security blob length %d"
,
blob_len
));
if
(
blob_len
>
bytes_remaining
)
{
cERROR
(
1
,
(
"bad security blob length %d"
,
blob_len
));
rc
=
-
EINVAL
;
goto
ssetup_exit
;
}
bytes_remaining
-=
blob_len
;
}
}
/* BB check if Unicode and decode strings */
if
(
smb_buf
->
Flags2
&
SMBFLG2_UNICODE
)
if
(
smb_buf
->
Flags2
&
SMBFLG2_UNICODE
)
rc
=
decode_unicode_ssetup
(
&
bcc_ptr
,
bytes_remaining
,
ses
,
nls_cp
);
else
...
...
@@ -535,10 +538,10 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time,
ssetup_exit:
kfree
(
str_area
);
if
(
resp_buf_type
==
CIFS_SMALL_BUFFER
)
{
cFYI
(
1
,(
"ssetup freeing small buf %p"
,
iov
[
0
].
iov_base
));
if
(
resp_buf_type
==
CIFS_SMALL_BUFFER
)
{
cFYI
(
1
,
(
"ssetup freeing small buf %p"
,
iov
[
0
].
iov_base
));
cifs_small_buf_release
(
iov
[
0
].
iov_base
);
}
else
if
(
resp_buf_type
==
CIFS_LARGE_BUFFER
)
}
else
if
(
resp_buf_type
==
CIFS_LARGE_BUFFER
)
cifs_buf_release
(
iov
[
0
].
iov_base
);
return
rc
;
...
...
fs/cifs/smbencrypt.c
浏览文件 @
790fe579
/*
/*
Unix SMB/Netbios implementation.
Version 1.9.
SMB parameters and setup
...
...
@@ -57,7 +57,7 @@ void SMBNTencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24);
/*
This implements the X/Open SMB password encryption
It takes a password, a 8 byte "crypt key" and puts 24 bytes of
It takes a password, a 8 byte "crypt key" and puts 24 bytes of
encrypted password into p24 */
/* Note that password must be uppercased and null terminated */
void
...
...
@@ -74,8 +74,8 @@ SMBencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24)
SMBOWFencrypt
(
p21
,
c8
,
p24
);
memset
(
p14
,
0
,
15
);
memset
(
p21
,
0
,
21
);
memset
(
p14
,
0
,
15
);
memset
(
p21
,
0
,
21
);
}
/* Routines for Windows NT MD4 Hash functions. */
...
...
@@ -90,14 +90,14 @@ _my_wcslen(__u16 * str)
/*
* Convert a string into an NT UNICODE string.
* Note that regardless of processor type
* Note that regardless of processor type
* this must be in intel (little-endian)
* format.
*/
static
int
_my_mbstowcs
(
__u16
*
dst
,
const
unsigned
char
*
src
,
int
len
)
{
/*
not a very good conversion routine - change/fix */
{
/* BB
not a very good conversion routine - change/fix */
int
i
;
__u16
val
;
...
...
@@ -112,7 +112,7 @@ _my_mbstowcs(__u16 * dst, const unsigned char *src, int len)
return
i
;
}
/*
/*
* Creates the MD4 Hash of the users password in NT UNICODE.
*/
...
...
@@ -123,7 +123,7 @@ E_md4hash(const unsigned char *passwd, unsigned char *p16)
__u16
wpwd
[
129
];
/* Password cannot be longer than 128 characters */
if
(
passwd
)
{
if
(
passwd
)
{
len
=
strlen
((
char
*
)
passwd
);
if
(
len
>
128
)
{
len
=
128
;
...
...
@@ -138,7 +138,7 @@ E_md4hash(const unsigned char *passwd, unsigned char *p16)
len
=
_my_wcslen
(
wpwd
)
*
sizeof
(
__u16
);
mdfour
(
p16
,
(
unsigned
char
*
)
wpwd
,
len
);
memset
(
wpwd
,
0
,
129
*
2
);
memset
(
wpwd
,
0
,
129
*
2
);
}
#if 0 /* currently unused */
...
...
@@ -184,8 +184,8 @@ ntv2_owf_gen(const unsigned char owf[16], const char *user_n,
struct HMACMD5Context ctx;
/* might as well do one alloc to hold both (user_u and dom_u) */
user_u = kmalloc(2048 * sizeof(wchar_t),
GFP_KERNEL);
if(user_u == NULL)
user_u = kmalloc(2048 * sizeof(wchar_t),
GFP_KERNEL);
if
(user_u == NULL)
return;
dom_u = user_u + 1024;
...
...
@@ -206,7 +206,7 @@ ntv2_owf_gen(const unsigned char owf[16], const char *user_n,
kfree(user_u);
}
#endif
#endif
/* Does the des encryption from the NT or LM MD4 hash. */
static
void
...
...
@@ -256,15 +256,15 @@ SMBNTencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24)
#if 0
static void
SMBOWFencrypt_ntv2(const unsigned char kr[16],
const struct data_blob *
srv_chal,
const struct data_blob *
cli_chal, unsigned char resp_buf[16])
const struct data_blob *
srv_chal,
const struct data_blob *
cli_chal, unsigned char resp_buf[16])
{
struct HMACMD5Context ctx;
struct HMACMD5Context ctx;
hmac_md5_init_limK_to_64(kr, 16, &ctx);
hmac_md5_update(srv_chal->data, srv_chal->length, &ctx);
hmac_md5_update(cli_chal->data, cli_chal->length, &ctx);
hmac_md5_final(resp_buf, &ctx);
hmac_md5_init_limK_to_64(kr, 16, &ctx);
hmac_md5_update(srv_chal->data, srv_chal->length, &ctx);
hmac_md5_update(cli_chal->data, cli_chal->length, &ctx);
hmac_md5_final(resp_buf, &ctx);
}
static void
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录