summaryrefslogtreecommitdiffstats
path: root/fs/cifs/cifsencrypt.c
diff options
context:
space:
mode:
authorSteve French <sfrench@us.ibm.com>2006-06-05 16:26:05 +0000
committerSteve French <sfrench@us.ibm.com>2006-06-05 16:26:05 +0000
commit6d027cfdb19c26df3151a519ed55acfe2c4cb7c3 (patch)
treec40004c2518013409bd0f701eca868fd14c74e7f /fs/cifs/cifsencrypt.c
parentf64b23ae4aef9f69d71ea41529a188acd5ab4930 (diff)
downloadblackbird-op-linux-6d027cfdb19c26df3151a519ed55acfe2c4cb7c3.tar.gz
blackbird-op-linux-6d027cfdb19c26df3151a519ed55acfe2c4cb7c3.zip
[CIFS] NTLMv2 support part 3
Response struct filled in exacty for 16 byte hash which we need to check more to make sure it works. Signed-off-by: Steve French <sfrench@us.ibm.com>
Diffstat (limited to 'fs/cifs/cifsencrypt.c')
-rw-r--r--fs/cifs/cifsencrypt.c17
1 files changed, 15 insertions, 2 deletions
diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
index 24ab770f60dc..09f94617e534 100644
--- a/fs/cifs/cifsencrypt.c
+++ b/fs/cifs/cifsencrypt.c
@@ -27,6 +27,7 @@
#include "cifs_unicode.h"
#include "cifsproto.h"
#include <linux/ctype.h>
+#include <linux/random.h>
/* Calculate and return the CIFS signature based on the mac key and the smb pdu */
/* the 16 byte signature must be allocated by the caller */
@@ -304,10 +305,22 @@ void calc_lanman_hash(struct cifsSesInfo * ses, char * lnm_session_key)
}
#endif /* CIFS_WEAK_PW_HASH */
+void setup_ntlmv2_rsp(const struct cifsSesInfo * ses, char * resp_buf)
+{
+ struct ntlmv2_resp * buf = (struct ntlmv2_resp *)resp_buf;
+
+ buf->blob_signature = cpu_to_le32(0x00000101);
+ buf->reserved = 0;
+ buf->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
+ get_random_bytes(&buf->client_chal, sizeof(buf->client_chal));
+ buf->reserved2 = 0;
+ buf->names[0].type = 0;
+ buf->names[0].length = 0;
+ /* calculate buf->ntlmv2_hash */
+}
+
void CalcNTLMv2_response(const struct cifsSesInfo * ses,char * v2_session_response)
{
- /* BB FIXME - update struct ntlmv2_response and change calling convention
- of this function */
struct HMACMD5Context context;
memcpy(v2_session_response + 8, ses->server->cryptKey,8);
/* gen_blob(v2_session_response + 16); */
OpenPOWER on IntegriCloud