@@ -37,7 +37,8 @@
sequence number before this function is called */
extern void mdfour(unsigned char *out, unsigned char *in, int n);
-extern void E_md4hash(const unsigned char *passwd, unsigned char *p16);
+extern void E_md4hash(const unsigned char *passwd, unsigned char *p16,
+ const struct nls_table *codepage);
extern void SMBencrypt(unsigned char *passwd, const unsigned char *c8,
unsigned char *p24);
@@ -210,13 +211,14 @@ int cifs_verify_signature(struct smb_hdr
/* We fill in key by putting in 40 byte array which was allocated by caller */
int cifs_calculate_mac_key(struct mac_key *key, const char *rn,
- const char *password)
+ const char *password,
+ const struct nls_table *codepage)
{
char temp_key[16];
if ((key == NULL) || (rn == NULL))
return -EINVAL;
- E_md4hash(password, temp_key);
+ E_md4hash(password, temp_key, codepage);
mdfour(key->data.ntlm, temp_key, 16);
memcpy(key->data.ntlm+16, rn, CIFS_SESS_KEY_SIZE);
key->len = 40;
@@ -235,7 +237,7 @@ int CalcNTLMv2_partial_mac_key(struct ci
if (ses == NULL)
return -EINVAL;
- E_md4hash(ses->password, temp_hash);
+ E_md4hash(ses->password, temp_hash, nls_info);
hmac_md5_init_limK_to_64(temp_hash, 16, &ctx);
user_name_len = strlen(ses->userName);
@@ -335,7 +337,7 @@ static int calc_ntlmv2_hash(struct cifsS
return -ENOMEM;
/* calculate md4 hash of password */
- E_md4hash(ses->password, nt_hash);
+ E_md4hash(ses->password, nt_hash, nls_cp);
/* convert Domainname to unicode and uppercase */
hmac_md5_init_limK_to_64(nt_hash, 16, pctxt);
@@ -362,7 +362,8 @@
const struct mac_key *mac_key,
__u32 expected_sequence_number);
extern int cifs_calculate_mac_key(struct mac_key *key, const char *rn,
- const char *pass);
+ const char *pass,
+ const struct nls_table *codepage);
extern int CalcNTLMv2_partial_mac_key(struct cifsSesInfo *,
const struct nls_table *);
extern void CalcNTLMv2_response(const struct cifsSesInfo *, char *);
@@ -53,7 +53,7 @@
#define RFC1001_PORT 139
extern void SMBNTencrypt(unsigned char *passwd, unsigned char *c8,
- unsigned char *p24);
+ unsigned char *p24, const struct nls_table *codepage);
extern mempool_t *cifs_req_poolp;
@@ -2767,7 +2767,7 @@ CIFSTCon(unsigned int xid, struct cifsSe
else
#endif /* CIFS_WEAK_PW_HASH */
SMBNTencrypt(tcon->password, ses->server->cryptKey,
- bcc_ptr);
+ bcc_ptr, nls_codepage);
bcc_ptr += CIFS_SESS_KEY_SIZE;
if (ses->capabilities & CAP_UNICODE) {
@@ -33,7 +33,8 @@
#include "cifs_spnego.h"
extern void SMBNTencrypt(unsigned char *passwd, unsigned char *c8,
- unsigned char *p24);
+ unsigned char *p24,
+ const struct nls_table *codepage);
/*
* Checks if this is the first smb session to be reconnected after
@@ -478,10 +479,12 @@ static int build_ntlmssp_auth_blob(unsig
sec_blob->LmChallengeResponse.MaximumLength = 0;
/* calculate session key, BB what about adding similar ntlmv2 path? */
- SMBNTencrypt(ses->password, ses->server->cryptKey, ntlm_session_key);
+ SMBNTencrypt(ses->password, ses->server->cryptKey, ntlm_session_key,
+ nls_cp);
if (first)
cifs_calculate_mac_key(&ses->server->mac_signing_key,
- ntlm_session_key, ses->password);
+ ntlm_session_key, ses->password,
+ nls_cp);
memcpy(tmp, ntlm_session_key, CIFS_SESS_KEY_SIZE);
sec_blob->NtChallengeResponse.BufferOffset = cpu_to_le32(tmp - pbuffer);
@@ -686,12 +689,12 @@ ssetup_ntlmssp_authenticate:
/* calculate session key */
SMBNTencrypt(ses->password, ses->server->cryptKey,
- ntlm_session_key);
+ ntlm_session_key, nls_cp);
if (first_time) /* should this be moved into common code
with similar ntlmv2 path? */
cifs_calculate_mac_key(&ses->server->mac_signing_key,
- ntlm_session_key, ses->password);
+ ntlm_session_key, ses->password, nls_cp);
/* copy session key */
memcpy(bcc_ptr, (char *)ntlm_session_key, CIFS_SESS_KEY_SIZE);
@@ -52,10 +52,12 @@
void SMBencrypt(unsigned char *passwd, const unsigned char *c8,
unsigned char *p24);
-void E_md4hash(const unsigned char *passwd, unsigned char *p16);
+void E_md4hash(const unsigned char *passwd, unsigned char *p16,
+ const struct nls_table *codepage);
static void SMBOWFencrypt(unsigned char passwd[16], const unsigned char *c8,
unsigned char p24[24]);
-void SMBNTencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24);
+void SMBNTencrypt(unsigned char *passwd, unsigned char *c8,
+ unsigned char *p24, const struct nls_table *codepage);
/*
This implements the X/Open SMB password encryption
@@ -80,66 +82,27 @@ SMBencrypt(unsigned char *passwd, const
memset(p21, 0, 21);
}
-/* Routines for Windows NT MD4 Hash functions. */
-static int
-_my_wcslen(__u16 *str)
-{
- int len = 0;
- while (*str++ != 0)
- len++;
- return len;
-}
-
-/*
- * Convert a string into an NT UNICODE string.
- * Note that regardless of processor type
- * this must be in intel (little-endian)
- * format.
- */
-
-static int
-_my_mbstowcs(__u16 *dst, const unsigned char *src, int len)
-{ /* BB not a very good conversion routine - change/fix */
- int i;
- __u16 val;
-
- for (i = 0; i < len; i++) {
- val = *src;
- SSVAL(dst, 0, val);
- dst++;
- src++;
- if (val == 0)
- break;
- }
- return i;
-}
-
/*
* Creates the MD4 Hash of the users password in NT UNICODE.
*/
void
-E_md4hash(const unsigned char *passwd, unsigned char *p16)
+E_md4hash(const unsigned char *passwd, unsigned char *p16,
+ const struct nls_table *codepage)
{
int len;
__u16 wpwd[129];
/* Password cannot be longer than 128 characters */
if (passwd) {
- len = strlen((char *) passwd);
- if (len > 128)
- len = 128;
-
/* Password must be converted to NT unicode */
- _my_mbstowcs(wpwd, passwd, len);
- } else
+ len = cifs_strtoUCS(wpwd, passwd, 128, codepage);
+ } else {
len = 0;
+ *wpwd = 0; /* Ensure string is null terminated */
+ }
- wpwd[len] = 0; /* Ensure string is null terminated */
- /* Calculate length in bytes */
- len = _my_wcslen(wpwd) * sizeof(__u16);
-
- mdfour(p16, (unsigned char *) wpwd, len);
+ mdfour(p16, (unsigned char *) wpwd, len * sizeof(__u16));
memset(wpwd, 0, 129 * 2);
}
@@ -157,7 +120,7 @@ nt_lm_owf_gen(char *pwd, unsigned char n
memcpy(passwd, pwd, 512);
/* Calculate the MD4 hash (NT compatible) of the password */
memset(nt_p16, '\0', 16);
- E_md4hash(passwd, nt_p16);
+ E_md4hash(passwd, nt_p16, /* put codepage here */);
/* Mangle the passwords into Lanman format */
passwd[14] = '\0';
@@ -244,13 +207,14 @@ NTLMSSPOWFencrypt(unsigned char passwd[8
/* Does the NT MD4 hash then des encryption. */
void
-SMBNTencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24)
+SMBNTencrypt(unsigned char *passwd, unsigned char *c8, unsigned char *p24,
+ const struct nls_table *codepage)
{
unsigned char p21[21];
memset(p21, '\0', 21);
- E_md4hash(passwd, p21);
+ E_md4hash(passwd, p21, codepage);
SMBOWFencrypt(p21, c8, p24);
}