diff options
author | Steve French <sfrench@us.ibm.com> | 2010-09-08 16:57:05 -0400 |
---|---|---|
committer | Steve French <sfrench@us.ibm.com> | 2010-09-08 16:57:05 -0400 |
commit | 56234e2767496c125a858f880f1b3a62e04a3406 (patch) | |
tree | c83ff996256b7889d8e84d7b2a19eeb15467dad1 /fs | |
parent | 7100ae97266e387d25d0c8a5d9934931f0b07dbc (diff) |
Revert "Eliminate sparse warning - bad constant expression"
This reverts commit 2d20ca835867d93ead6ce61780d883a4b128106d.
The change to kernel crypto and fixes to ntlvm2 and ntlmssp
series, introduced a regression. Deferring this patch series
to 2.6.37 after Shirish fixes it.
Signed-off-by: Steve French <sfrench@us.ibm.com>
Acked-by: Jeff Layton <jlayton@redhat.com>
CC: Shirish Pargaonkar <shirishp@us.ibm.com>
Diffstat (limited to 'fs')
-rw-r--r-- | fs/cifs/cifsencrypt.c | 193 | ||||
-rw-r--r-- | fs/cifs/cifsglob.h | 7 |
2 files changed, 72 insertions, 128 deletions
diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c index 709f2296bdb4..eef78c24e0cc 100644 --- a/fs/cifs/cifsencrypt.c +++ b/fs/cifs/cifsencrypt.c | |||
@@ -45,38 +45,39 @@ extern void SMBencrypt(unsigned char *passwd, const unsigned char *c8, | |||
45 | static int cifs_calculate_signature(const struct smb_hdr *cifs_pdu, | 45 | static int cifs_calculate_signature(const struct smb_hdr *cifs_pdu, |
46 | struct TCP_Server_Info *server, char *signature) | 46 | struct TCP_Server_Info *server, char *signature) |
47 | { | 47 | { |
48 | int rc; | 48 | int rc = 0; |
49 | struct { | ||
50 | struct shash_desc shash; | ||
51 | char ctx[crypto_shash_descsize(server->ntlmssp.md5)]; | ||
52 | } sdesc; | ||
49 | 53 | ||
50 | if (cifs_pdu == NULL || server == NULL || signature == NULL) | 54 | if (cifs_pdu == NULL || server == NULL || signature == NULL) |
51 | return -EINVAL; | 55 | return -EINVAL; |
52 | 56 | ||
53 | if (!server->ntlmssp.sdescmd5) { | 57 | sdesc.shash.tfm = server->ntlmssp.md5; |
54 | cERROR(1, | 58 | sdesc.shash.flags = 0x0; |
55 | "cifs_calculate_signature: can't generate signature\n"); | ||
56 | return -1; | ||
57 | } | ||
58 | 59 | ||
59 | rc = crypto_shash_init(&server->ntlmssp.sdescmd5->shash); | 60 | rc = crypto_shash_init(&sdesc.shash); |
60 | if (rc) { | 61 | if (rc) { |
61 | cERROR(1, "cifs_calculate_signature: oould not init md5\n"); | 62 | cERROR(1, "could not initialize master crypto API hmacmd5\n"); |
62 | return rc; | 63 | return rc; |
63 | } | 64 | } |
64 | 65 | ||
65 | if (server->secType == RawNTLMSSP) | 66 | if (server->secType == RawNTLMSSP) |
66 | crypto_shash_update(&server->ntlmssp.sdescmd5->shash, | 67 | crypto_shash_update(&sdesc.shash, |
67 | server->session_key.data.ntlmv2.key, | 68 | server->session_key.data.ntlmv2.key, |
68 | CIFS_NTLMV2_SESSKEY_SIZE); | 69 | CIFS_NTLMV2_SESSKEY_SIZE); |
69 | else | 70 | else |
70 | crypto_shash_update(&server->ntlmssp.sdescmd5->shash, | 71 | crypto_shash_update(&sdesc.shash, |
71 | (char *)&server->session_key.data, | 72 | (char *)&server->session_key.data, |
72 | server->session_key.len); | 73 | server->session_key.len); |
73 | 74 | ||
74 | crypto_shash_update(&server->ntlmssp.sdescmd5->shash, | 75 | crypto_shash_update(&sdesc.shash, |
75 | cifs_pdu->Protocol, cifs_pdu->smb_buf_length); | 76 | cifs_pdu->Protocol, cifs_pdu->smb_buf_length); |
76 | 77 | ||
77 | rc = crypto_shash_final(&server->ntlmssp.sdescmd5->shash, signature); | 78 | rc = crypto_shash_final(&sdesc.shash, signature); |
78 | 79 | ||
79 | return rc; | 80 | return 0; |
80 | } | 81 | } |
81 | 82 | ||
82 | 83 | ||
@@ -114,28 +115,30 @@ static int cifs_calc_signature2(const struct kvec *iov, int n_vec, | |||
114 | struct TCP_Server_Info *server, char *signature) | 115 | struct TCP_Server_Info *server, char *signature) |
115 | { | 116 | { |
116 | int i; | 117 | int i; |
117 | int rc; | 118 | int rc = 0; |
119 | struct { | ||
120 | struct shash_desc shash; | ||
121 | char ctx[crypto_shash_descsize(server->ntlmssp.md5)]; | ||
122 | } sdesc; | ||
118 | 123 | ||
119 | if (iov == NULL || server == NULL || signature == NULL) | 124 | if (iov == NULL || server == NULL || signature == NULL) |
120 | return -EINVAL; | 125 | return -EINVAL; |
121 | 126 | ||
122 | if (!server->ntlmssp.sdescmd5) { | 127 | sdesc.shash.tfm = server->ntlmssp.md5; |
123 | cERROR(1, "cifs_calc_signature2: can't generate signature\n"); | 128 | sdesc.shash.flags = 0x0; |
124 | return -1; | ||
125 | } | ||
126 | 129 | ||
127 | rc = crypto_shash_init(&server->ntlmssp.sdescmd5->shash); | 130 | rc = crypto_shash_init(&sdesc.shash); |
128 | if (rc) { | 131 | if (rc) { |
129 | cERROR(1, "cifs_calc_signature2: oould not init md5\n"); | 132 | cERROR(1, "could not initialize master crypto API hmacmd5\n"); |
130 | return rc; | 133 | return rc; |
131 | } | 134 | } |
132 | 135 | ||
133 | if (server->secType == RawNTLMSSP) | 136 | if (server->secType == RawNTLMSSP) |
134 | crypto_shash_update(&server->ntlmssp.sdescmd5->shash, | 137 | crypto_shash_update(&sdesc.shash, |
135 | server->session_key.data.ntlmv2.key, | 138 | server->session_key.data.ntlmv2.key, |
136 | CIFS_NTLMV2_SESSKEY_SIZE); | 139 | CIFS_NTLMV2_SESSKEY_SIZE); |
137 | else | 140 | else |
138 | crypto_shash_update(&server->ntlmssp.sdescmd5->shash, | 141 | crypto_shash_update(&sdesc.shash, |
139 | (char *)&server->session_key.data, | 142 | (char *)&server->session_key.data, |
140 | server->session_key.len); | 143 | server->session_key.len); |
141 | 144 | ||
@@ -143,7 +146,7 @@ static int cifs_calc_signature2(const struct kvec *iov, int n_vec, | |||
143 | if (iov[i].iov_len == 0) | 146 | if (iov[i].iov_len == 0) |
144 | continue; | 147 | continue; |
145 | if (iov[i].iov_base == NULL) { | 148 | if (iov[i].iov_base == NULL) { |
146 | cERROR(1, "cifs_calc_signature2: null iovec entry"); | 149 | cERROR(1, "null iovec entry"); |
147 | return -EIO; | 150 | return -EIO; |
148 | } | 151 | } |
149 | /* The first entry includes a length field (which does not get | 152 | /* The first entry includes a length field (which does not get |
@@ -151,16 +154,16 @@ static int cifs_calc_signature2(const struct kvec *iov, int n_vec, | |||
151 | if (i == 0) { | 154 | if (i == 0) { |
152 | if (iov[0].iov_len <= 8) /* cmd field at offset 9 */ | 155 | if (iov[0].iov_len <= 8) /* cmd field at offset 9 */ |
153 | break; /* nothing to sign or corrupt header */ | 156 | break; /* nothing to sign or corrupt header */ |
154 | crypto_shash_update(&server->ntlmssp.sdescmd5->shash, | 157 | crypto_shash_update(&sdesc.shash, |
155 | iov[i].iov_base + 4, iov[i].iov_len - 4); | 158 | iov[i].iov_base + 4, iov[i].iov_len - 4); |
156 | } else | 159 | } else |
157 | crypto_shash_update(&server->ntlmssp.sdescmd5->shash, | 160 | crypto_shash_update(&sdesc.shash, |
158 | iov[i].iov_base, iov[i].iov_len); | 161 | iov[i].iov_base, iov[i].iov_len); |
159 | } | 162 | } |
160 | 163 | ||
161 | rc = crypto_shash_final(&server->ntlmssp.sdescmd5->shash, signature); | 164 | rc = crypto_shash_final(&sdesc.shash, signature); |
162 | 165 | ||
163 | return rc; | 166 | return 0; |
164 | } | 167 | } |
165 | 168 | ||
166 | int cifs_sign_smb2(struct kvec *iov, int n_vec, struct TCP_Server_Info *server, | 169 | int cifs_sign_smb2(struct kvec *iov, int n_vec, struct TCP_Server_Info *server, |
@@ -310,48 +313,43 @@ static int calc_ntlmv2_hash(struct cifsSesInfo *ses, | |||
310 | wchar_t *user; | 313 | wchar_t *user; |
311 | wchar_t *domain; | 314 | wchar_t *domain; |
312 | wchar_t *server; | 315 | wchar_t *server; |
313 | 316 | struct { | |
314 | if (!ses->server->ntlmssp.sdeschmacmd5) { | 317 | struct shash_desc shash; |
315 | cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash\n"); | 318 | char ctx[crypto_shash_descsize(ses->server->ntlmssp.hmacmd5)]; |
316 | return -1; | 319 | } sdesc; |
317 | } | ||
318 | 320 | ||
319 | /* calculate md4 hash of password */ | 321 | /* calculate md4 hash of password */ |
320 | E_md4hash(ses->password, nt_hash); | 322 | E_md4hash(ses->password, nt_hash); |
321 | 323 | ||
324 | sdesc.shash.tfm = ses->server->ntlmssp.hmacmd5; | ||
325 | sdesc.shash.flags = 0x0; | ||
326 | |||
322 | crypto_shash_setkey(ses->server->ntlmssp.hmacmd5, nt_hash, | 327 | crypto_shash_setkey(ses->server->ntlmssp.hmacmd5, nt_hash, |
323 | CIFS_NTHASH_SIZE); | 328 | CIFS_NTHASH_SIZE); |
324 | 329 | ||
325 | rc = crypto_shash_init(&ses->server->ntlmssp.sdeschmacmd5->shash); | 330 | rc = crypto_shash_init(&sdesc.shash); |
326 | if (rc) { | 331 | if (rc) { |
327 | cERROR(1, "calc_ntlmv2_hash: could not init hmacmd5\n"); | 332 | cERROR(1, "could not initialize master crypto API hmacmd5\n"); |
328 | return rc; | 333 | return rc; |
329 | } | 334 | } |
330 | 335 | ||
331 | /* convert ses->userName to unicode and uppercase */ | 336 | /* convert ses->userName to unicode and uppercase */ |
332 | len = strlen(ses->userName); | 337 | len = strlen(ses->userName); |
333 | user = kmalloc(2 + (len * 2), GFP_KERNEL); | 338 | user = kmalloc(2 + (len * 2), GFP_KERNEL); |
334 | if (user == NULL) { | 339 | if (user == NULL) |
335 | cERROR(1, "calc_ntlmv2_hash: user mem alloc failure\n"); | ||
336 | rc = -ENOMEM; | ||
337 | goto calc_exit_2; | 340 | goto calc_exit_2; |
338 | } | ||
339 | len = cifs_strtoUCS((__le16 *)user, ses->userName, len, nls_cp); | 341 | len = cifs_strtoUCS((__le16 *)user, ses->userName, len, nls_cp); |
340 | UniStrupr(user); | 342 | UniStrupr(user); |
341 | 343 | ||
342 | crypto_shash_update(&ses->server->ntlmssp.sdeschmacmd5->shash, | 344 | crypto_shash_update(&sdesc.shash, (char *)user, 2 * len); |
343 | (char *)user, 2 * len); | ||
344 | 345 | ||
345 | /* convert ses->domainName to unicode and uppercase */ | 346 | /* convert ses->domainName to unicode and uppercase */ |
346 | if (ses->domainName) { | 347 | if (ses->domainName) { |
347 | len = strlen(ses->domainName); | 348 | len = strlen(ses->domainName); |
348 | 349 | ||
349 | domain = kmalloc(2 + (len * 2), GFP_KERNEL); | 350 | domain = kmalloc(2 + (len * 2), GFP_KERNEL); |
350 | if (domain == NULL) { | 351 | if (domain == NULL) |
351 | cERROR(1, "calc_ntlmv2_hash: domain mem alloc failure"); | ||
352 | rc = -ENOMEM; | ||
353 | goto calc_exit_1; | 352 | goto calc_exit_1; |
354 | } | ||
355 | len = cifs_strtoUCS((__le16 *)domain, ses->domainName, len, | 353 | len = cifs_strtoUCS((__le16 *)domain, ses->domainName, len, |
356 | nls_cp); | 354 | nls_cp); |
357 | /* the following line was removed since it didn't work well | 355 | /* the following line was removed since it didn't work well |
@@ -359,19 +357,15 @@ static int calc_ntlmv2_hash(struct cifsSesInfo *ses, | |||
359 | Maybe converting the domain name earlier makes sense */ | 357 | Maybe converting the domain name earlier makes sense */ |
360 | /* UniStrupr(domain); */ | 358 | /* UniStrupr(domain); */ |
361 | 359 | ||
362 | crypto_shash_update(&ses->server->ntlmssp.sdeschmacmd5->shash, | 360 | crypto_shash_update(&sdesc.shash, (char *)domain, 2 * len); |
363 | (char *)domain, 2 * len); | ||
364 | 361 | ||
365 | kfree(domain); | 362 | kfree(domain); |
366 | } else if (ses->serverName) { | 363 | } else if (ses->serverName) { |
367 | len = strlen(ses->serverName); | 364 | len = strlen(ses->serverName); |
368 | 365 | ||
369 | server = kmalloc(2 + (len * 2), GFP_KERNEL); | 366 | server = kmalloc(2 + (len * 2), GFP_KERNEL); |
370 | if (server == NULL) { | 367 | if (server == NULL) |
371 | cERROR(1, "calc_ntlmv2_hash: server mem alloc failure"); | ||
372 | rc = -ENOMEM; | ||
373 | goto calc_exit_1; | 368 | goto calc_exit_1; |
374 | } | ||
375 | len = cifs_strtoUCS((__le16 *)server, ses->serverName, len, | 369 | len = cifs_strtoUCS((__le16 *)server, ses->serverName, len, |
376 | nls_cp); | 370 | nls_cp); |
377 | /* the following line was removed since it didn't work well | 371 | /* the following line was removed since it didn't work well |
@@ -379,20 +373,16 @@ static int calc_ntlmv2_hash(struct cifsSesInfo *ses, | |||
379 | Maybe converting the domain name earlier makes sense */ | 373 | Maybe converting the domain name earlier makes sense */ |
380 | /* UniStrupr(domain); */ | 374 | /* UniStrupr(domain); */ |
381 | 375 | ||
382 | crypto_shash_update(&ses->server->ntlmssp.sdeschmacmd5->shash, | 376 | crypto_shash_update(&sdesc.shash, (char *)server, 2 * len); |
383 | (char *)server, 2 * len); | ||
384 | 377 | ||
385 | kfree(server); | 378 | kfree(server); |
386 | } | 379 | } |
387 | |||
388 | rc = crypto_shash_final(&ses->server->ntlmssp.sdeschmacmd5->shash, | ||
389 | ses->server->ntlmv2_hash); | ||
390 | |||
391 | calc_exit_1: | 380 | calc_exit_1: |
392 | kfree(user); | 381 | kfree(user); |
393 | calc_exit_2: | 382 | calc_exit_2: |
394 | /* BB FIXME what about bytes 24 through 40 of the signing key? | 383 | /* BB FIXME what about bytes 24 through 40 of the signing key? |
395 | compare with the NTLM example */ | 384 | compare with the NTLM example */ |
385 | rc = crypto_shash_final(&sdesc.shash, ses->server->ntlmv2_hash); | ||
396 | 386 | ||
397 | return rc; | 387 | return rc; |
398 | } | 388 | } |
@@ -452,33 +442,34 @@ CalcNTLMv2_response(const struct TCP_Server_Info *server, | |||
452 | char *v2_session_response) | 442 | char *v2_session_response) |
453 | { | 443 | { |
454 | int rc; | 444 | int rc; |
445 | struct { | ||
446 | struct shash_desc shash; | ||
447 | char ctx[crypto_shash_descsize(server->ntlmssp.hmacmd5)]; | ||
448 | } sdesc; | ||
455 | 449 | ||
456 | if (!server->ntlmssp.sdeschmacmd5) { | 450 | sdesc.shash.tfm = server->ntlmssp.hmacmd5; |
457 | cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash\n"); | 451 | sdesc.shash.flags = 0x0; |
458 | return -1; | ||
459 | } | ||
460 | 452 | ||
461 | crypto_shash_setkey(server->ntlmssp.hmacmd5, server->ntlmv2_hash, | 453 | crypto_shash_setkey(server->ntlmssp.hmacmd5, server->ntlmv2_hash, |
462 | CIFS_HMAC_MD5_HASH_SIZE); | 454 | CIFS_HMAC_MD5_HASH_SIZE); |
463 | 455 | ||
464 | rc = crypto_shash_init(&server->ntlmssp.sdeschmacmd5->shash); | 456 | rc = crypto_shash_init(&sdesc.shash); |
465 | if (rc) { | 457 | if (rc) { |
466 | cERROR(1, "CalcNTLMv2_response: could not init hmacmd5"); | 458 | cERROR(1, "could not initialize master crypto API hmacmd5\n"); |
467 | return rc; | 459 | return rc; |
468 | } | 460 | } |
469 | 461 | ||
470 | memcpy(v2_session_response + CIFS_SERVER_CHALLENGE_SIZE, | 462 | memcpy(v2_session_response + CIFS_SERVER_CHALLENGE_SIZE, |
471 | server->cryptKey, CIFS_SERVER_CHALLENGE_SIZE); | 463 | server->cryptKey, CIFS_SERVER_CHALLENGE_SIZE); |
472 | crypto_shash_update(&server->ntlmssp.sdeschmacmd5->shash, | 464 | crypto_shash_update(&sdesc.shash, |
473 | v2_session_response + CIFS_SERVER_CHALLENGE_SIZE, | 465 | v2_session_response + CIFS_SERVER_CHALLENGE_SIZE, |
474 | sizeof(struct ntlmv2_resp) - CIFS_SERVER_CHALLENGE_SIZE); | 466 | sizeof(struct ntlmv2_resp) - CIFS_SERVER_CHALLENGE_SIZE); |
475 | 467 | ||
476 | if (server->tilen) | 468 | if (server->tilen) |
477 | crypto_shash_update(&server->ntlmssp.sdeschmacmd5->shash, | 469 | crypto_shash_update(&sdesc.shash, |
478 | server->tiblob, server->tilen); | 470 | server->tiblob, server->tilen); |
479 | 471 | ||
480 | rc = crypto_shash_final(&server->ntlmssp.sdeschmacmd5->shash, | 472 | rc = crypto_shash_final(&sdesc.shash, v2_session_response); |
481 | v2_session_response); | ||
482 | 473 | ||
483 | return rc; | 474 | return rc; |
484 | } | 475 | } |
@@ -489,6 +480,10 @@ setup_ntlmv2_rsp(struct cifsSesInfo *ses, char *resp_buf, | |||
489 | { | 480 | { |
490 | int rc = 0; | 481 | int rc = 0; |
491 | struct ntlmv2_resp *buf = (struct ntlmv2_resp *)resp_buf; | 482 | struct ntlmv2_resp *buf = (struct ntlmv2_resp *)resp_buf; |
483 | struct { | ||
484 | struct shash_desc shash; | ||
485 | char ctx[crypto_shash_descsize(ses->server->ntlmssp.hmacmd5)]; | ||
486 | } sdesc; | ||
492 | 487 | ||
493 | buf->blob_signature = cpu_to_le32(0x00000101); | 488 | buf->blob_signature = cpu_to_le32(0x00000101); |
494 | buf->reserved = 0; | 489 | buf->reserved = 0; |
@@ -516,24 +511,21 @@ setup_ntlmv2_rsp(struct cifsSesInfo *ses, char *resp_buf, | |||
516 | return rc; | 511 | return rc; |
517 | } | 512 | } |
518 | 513 | ||
519 | if (!ses->server->ntlmssp.sdeschmacmd5) { | ||
520 | cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash\n"); | ||
521 | return -1; | ||
522 | } | ||
523 | |||
524 | crypto_shash_setkey(ses->server->ntlmssp.hmacmd5, | 514 | crypto_shash_setkey(ses->server->ntlmssp.hmacmd5, |
525 | ses->server->ntlmv2_hash, CIFS_HMAC_MD5_HASH_SIZE); | 515 | ses->server->ntlmv2_hash, CIFS_HMAC_MD5_HASH_SIZE); |
526 | 516 | ||
527 | rc = crypto_shash_init(&ses->server->ntlmssp.sdeschmacmd5->shash); | 517 | sdesc.shash.tfm = ses->server->ntlmssp.hmacmd5; |
518 | sdesc.shash.flags = 0x0; | ||
519 | |||
520 | rc = crypto_shash_init(&sdesc.shash); | ||
528 | if (rc) { | 521 | if (rc) { |
529 | cERROR(1, "setup_ntlmv2_rsp: could not init hmacmd5\n"); | 522 | cERROR(1, "could not initialize master crypto API hmacmd5\n"); |
530 | return rc; | 523 | return rc; |
531 | } | 524 | } |
532 | 525 | ||
533 | crypto_shash_update(&ses->server->ntlmssp.sdeschmacmd5->shash, | 526 | crypto_shash_update(&sdesc.shash, resp_buf, CIFS_HMAC_MD5_HASH_SIZE); |
534 | resp_buf, CIFS_HMAC_MD5_HASH_SIZE); | ||
535 | 527 | ||
536 | rc = crypto_shash_final(&ses->server->ntlmssp.sdeschmacmd5->shash, | 528 | rc = crypto_shash_final(&sdesc.shash, |
537 | ses->server->session_key.data.ntlmv2.key); | 529 | ses->server->session_key.data.ntlmv2.key); |
538 | 530 | ||
539 | memcpy(&ses->server->session_key.data.ntlmv2.resp, resp_buf, | 531 | memcpy(&ses->server->session_key.data.ntlmv2.resp, resp_buf, |
@@ -586,65 +578,24 @@ cifs_crypto_shash_release(struct TCP_Server_Info *server) | |||
586 | 578 | ||
587 | if (server->ntlmssp.hmacmd5) | 579 | if (server->ntlmssp.hmacmd5) |
588 | crypto_free_shash(server->ntlmssp.hmacmd5); | 580 | crypto_free_shash(server->ntlmssp.hmacmd5); |
589 | |||
590 | kfree(server->ntlmssp.sdeschmacmd5); | ||
591 | |||
592 | kfree(server->ntlmssp.sdescmd5); | ||
593 | } | 581 | } |
594 | 582 | ||
595 | int | 583 | int |
596 | cifs_crypto_shash_allocate(struct TCP_Server_Info *server) | 584 | cifs_crypto_shash_allocate(struct TCP_Server_Info *server) |
597 | { | 585 | { |
598 | int rc; | ||
599 | unsigned int size; | ||
600 | |||
601 | server->ntlmssp.hmacmd5 = crypto_alloc_shash("hmac(md5)", 0, 0); | 586 | server->ntlmssp.hmacmd5 = crypto_alloc_shash("hmac(md5)", 0, 0); |
602 | if (!server->ntlmssp.hmacmd5 || | 587 | if (!server->ntlmssp.hmacmd5 || |
603 | IS_ERR(server->ntlmssp.hmacmd5)) { | 588 | IS_ERR(server->ntlmssp.hmacmd5)) { |
604 | cERROR(1, "could not allocate crypto hmacmd5\n"); | 589 | cERROR(1, "could not allocate master crypto API hmacmd5\n"); |
605 | return 1; | 590 | return 1; |
606 | } | 591 | } |
607 | 592 | ||
608 | server->ntlmssp.md5 = crypto_alloc_shash("md5", 0, 0); | 593 | server->ntlmssp.md5 = crypto_alloc_shash("md5", 0, 0); |
609 | if (!server->ntlmssp.md5 || IS_ERR(server->ntlmssp.md5)) { | 594 | if (!server->ntlmssp.md5 || IS_ERR(server->ntlmssp.md5)) { |
610 | cERROR(1, "could not allocate crypto md5\n"); | 595 | crypto_free_shash(server->ntlmssp.hmacmd5); |
611 | rc = 1; | 596 | cERROR(1, "could not allocate master crypto API md5\n"); |
612 | goto cifs_crypto_shash_allocate_ret1; | 597 | return 1; |
613 | } | ||
614 | |||
615 | size = sizeof(struct shash_desc) + | ||
616 | crypto_shash_descsize(server->ntlmssp.hmacmd5); | ||
617 | server->ntlmssp.sdeschmacmd5 = kmalloc(size, GFP_KERNEL); | ||
618 | if (!server->ntlmssp.sdeschmacmd5) { | ||
619 | cERROR(1, "cifs_crypto_shash_allocate: can't alloc hmacmd5\n"); | ||
620 | rc = -ENOMEM; | ||
621 | goto cifs_crypto_shash_allocate_ret2; | ||
622 | } | ||
623 | server->ntlmssp.sdeschmacmd5->shash.tfm = server->ntlmssp.hmacmd5; | ||
624 | server->ntlmssp.sdeschmacmd5->shash.flags = 0x0; | ||
625 | |||
626 | |||
627 | size = sizeof(struct shash_desc) + | ||
628 | crypto_shash_descsize(server->ntlmssp.md5); | ||
629 | server->ntlmssp.sdescmd5 = kmalloc(size, GFP_KERNEL); | ||
630 | if (!server->ntlmssp.sdescmd5) { | ||
631 | cERROR(1, "cifs_crypto_shash_allocate: can't alloc md5\n"); | ||
632 | rc = -ENOMEM; | ||
633 | goto cifs_crypto_shash_allocate_ret3; | ||
634 | } | 598 | } |
635 | server->ntlmssp.sdescmd5->shash.tfm = server->ntlmssp.md5; | ||
636 | server->ntlmssp.sdescmd5->shash.flags = 0x0; | ||
637 | 599 | ||
638 | return 0; | 600 | return 0; |
639 | |||
640 | cifs_crypto_shash_allocate_ret3: | ||
641 | kfree(server->ntlmssp.sdeschmacmd5); | ||
642 | |||
643 | cifs_crypto_shash_allocate_ret2: | ||
644 | crypto_free_shash(server->ntlmssp.md5); | ||
645 | |||
646 | cifs_crypto_shash_allocate_ret1: | ||
647 | crypto_free_shash(server->ntlmssp.hmacmd5); | ||
648 | |||
649 | return rc; | ||
650 | } | 601 | } |
diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h index c9d0cfc086eb..49563e0c1725 100644 --- a/fs/cifs/cifsglob.h +++ b/fs/cifs/cifsglob.h | |||
@@ -123,19 +123,12 @@ struct cifs_cred { | |||
123 | struct cifs_ace *aces; | 123 | struct cifs_ace *aces; |
124 | }; | 124 | }; |
125 | 125 | ||
126 | struct sdesc { | ||
127 | struct shash_desc shash; | ||
128 | char ctx[]; | ||
129 | }; | ||
130 | |||
131 | struct ntlmssp_auth { | 126 | struct ntlmssp_auth { |
132 | __u32 client_flags; | 127 | __u32 client_flags; |
133 | __u32 server_flags; | 128 | __u32 server_flags; |
134 | unsigned char ciphertext[CIFS_CPHTXT_SIZE]; | 129 | unsigned char ciphertext[CIFS_CPHTXT_SIZE]; |
135 | struct crypto_shash *hmacmd5; | 130 | struct crypto_shash *hmacmd5; |
136 | struct crypto_shash *md5; | 131 | struct crypto_shash *md5; |
137 | struct sdesc *sdeschmacmd5; | ||
138 | struct sdesc *sdescmd5; | ||
139 | }; | 132 | }; |
140 | 133 | ||
141 | /* | 134 | /* |