xref: /openbmc/linux/fs/smb/server/auth.c (revision 6db6b729)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  *   Copyright (C) 2016 Namjae Jeon <linkinjeon@kernel.org>
4  *   Copyright (C) 2018 Samsung Electronics Co., Ltd.
5  */
6 
7 #include <linux/kernel.h>
8 #include <linux/fs.h>
9 #include <linux/uaccess.h>
10 #include <linux/backing-dev.h>
11 #include <linux/writeback.h>
12 #include <linux/uio.h>
13 #include <linux/xattr.h>
14 #include <crypto/hash.h>
15 #include <crypto/aead.h>
16 #include <linux/random.h>
17 #include <linux/scatterlist.h>
18 
19 #include "auth.h"
20 #include "glob.h"
21 
22 #include <linux/fips.h>
23 #include <crypto/des.h>
24 
25 #include "server.h"
26 #include "smb_common.h"
27 #include "connection.h"
28 #include "mgmt/user_session.h"
29 #include "mgmt/user_config.h"
30 #include "crypto_ctx.h"
31 #include "transport_ipc.h"
32 #include "../common/arc4.h"
33 
34 /*
35  * Fixed format data defining GSS header and fixed string
36  * "not_defined_in_RFC4178@please_ignore".
37  * So sec blob data in neg phase could be generated statically.
38  */
39 static char NEGOTIATE_GSS_HEADER[AUTH_GSS_LENGTH] = {
40 #ifdef CONFIG_SMB_SERVER_KERBEROS5
41 	0x60, 0x5e, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
42 	0x05, 0x02, 0xa0, 0x54, 0x30, 0x52, 0xa0, 0x24,
43 	0x30, 0x22, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86,
44 	0xf7, 0x12, 0x01, 0x02, 0x02, 0x06, 0x09, 0x2a,
45 	0x86, 0x48, 0x82, 0xf7, 0x12, 0x01, 0x02, 0x02,
46 	0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82,
47 	0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a, 0x30, 0x28,
48 	0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f, 0x74, 0x5f,
49 	0x64, 0x65, 0x66, 0x69, 0x6e, 0x65, 0x64, 0x5f,
50 	0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43, 0x34, 0x31,
51 	0x37, 0x38, 0x40, 0x70, 0x6c, 0x65, 0x61, 0x73,
52 	0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f, 0x72, 0x65
53 #else
54 	0x60, 0x48, 0x06, 0x06, 0x2b, 0x06, 0x01, 0x05,
55 	0x05, 0x02, 0xa0, 0x3e, 0x30, 0x3c, 0xa0, 0x0e,
56 	0x30, 0x0c, 0x06, 0x0a, 0x2b, 0x06, 0x01, 0x04,
57 	0x01, 0x82, 0x37, 0x02, 0x02, 0x0a, 0xa3, 0x2a,
58 	0x30, 0x28, 0xa0, 0x26, 0x1b, 0x24, 0x6e, 0x6f,
59 	0x74, 0x5f, 0x64, 0x65, 0x66, 0x69, 0x6e, 0x65,
60 	0x64, 0x5f, 0x69, 0x6e, 0x5f, 0x52, 0x46, 0x43,
61 	0x34, 0x31, 0x37, 0x38, 0x40, 0x70, 0x6c, 0x65,
62 	0x61, 0x73, 0x65, 0x5f, 0x69, 0x67, 0x6e, 0x6f,
63 	0x72, 0x65
64 #endif
65 };
66 
67 void ksmbd_copy_gss_neg_header(void *buf)
68 {
69 	memcpy(buf, NEGOTIATE_GSS_HEADER, AUTH_GSS_LENGTH);
70 }
71 
72 /**
73  * ksmbd_gen_sess_key() - function to generate session key
74  * @sess:	session of connection
75  * @hash:	source hash value to be used for find session key
76  * @hmac:	source hmac value to be used for finding session key
77  *
78  */
79 static int ksmbd_gen_sess_key(struct ksmbd_session *sess, char *hash,
80 			      char *hmac)
81 {
82 	struct ksmbd_crypto_ctx *ctx;
83 	int rc;
84 
85 	ctx = ksmbd_crypto_ctx_find_hmacmd5();
86 	if (!ctx) {
87 		ksmbd_debug(AUTH, "could not crypto alloc hmacmd5\n");
88 		return -ENOMEM;
89 	}
90 
91 	rc = crypto_shash_setkey(CRYPTO_HMACMD5_TFM(ctx),
92 				 hash,
93 				 CIFS_HMAC_MD5_HASH_SIZE);
94 	if (rc) {
95 		ksmbd_debug(AUTH, "hmacmd5 set key fail error %d\n", rc);
96 		goto out;
97 	}
98 
99 	rc = crypto_shash_init(CRYPTO_HMACMD5(ctx));
100 	if (rc) {
101 		ksmbd_debug(AUTH, "could not init hmacmd5 error %d\n", rc);
102 		goto out;
103 	}
104 
105 	rc = crypto_shash_update(CRYPTO_HMACMD5(ctx),
106 				 hmac,
107 				 SMB2_NTLMV2_SESSKEY_SIZE);
108 	if (rc) {
109 		ksmbd_debug(AUTH, "Could not update with response error %d\n", rc);
110 		goto out;
111 	}
112 
113 	rc = crypto_shash_final(CRYPTO_HMACMD5(ctx), sess->sess_key);
114 	if (rc) {
115 		ksmbd_debug(AUTH, "Could not generate hmacmd5 hash error %d\n", rc);
116 		goto out;
117 	}
118 
119 out:
120 	ksmbd_release_crypto_ctx(ctx);
121 	return rc;
122 }
123 
124 static int calc_ntlmv2_hash(struct ksmbd_conn *conn, struct ksmbd_session *sess,
125 			    char *ntlmv2_hash, char *dname)
126 {
127 	int ret, len, conv_len;
128 	wchar_t *domain = NULL;
129 	__le16 *uniname = NULL;
130 	struct ksmbd_crypto_ctx *ctx;
131 
132 	ctx = ksmbd_crypto_ctx_find_hmacmd5();
133 	if (!ctx) {
134 		ksmbd_debug(AUTH, "can't generate ntlmv2 hash\n");
135 		return -ENOMEM;
136 	}
137 
138 	ret = crypto_shash_setkey(CRYPTO_HMACMD5_TFM(ctx),
139 				  user_passkey(sess->user),
140 				  CIFS_ENCPWD_SIZE);
141 	if (ret) {
142 		ksmbd_debug(AUTH, "Could not set NT Hash as a key\n");
143 		goto out;
144 	}
145 
146 	ret = crypto_shash_init(CRYPTO_HMACMD5(ctx));
147 	if (ret) {
148 		ksmbd_debug(AUTH, "could not init hmacmd5\n");
149 		goto out;
150 	}
151 
152 	/* convert user_name to unicode */
153 	len = strlen(user_name(sess->user));
154 	uniname = kzalloc(2 + UNICODE_LEN(len), GFP_KERNEL);
155 	if (!uniname) {
156 		ret = -ENOMEM;
157 		goto out;
158 	}
159 
160 	conv_len = smb_strtoUTF16(uniname, user_name(sess->user), len,
161 				  conn->local_nls);
162 	if (conv_len < 0 || conv_len > len) {
163 		ret = -EINVAL;
164 		goto out;
165 	}
166 	UniStrupr(uniname);
167 
168 	ret = crypto_shash_update(CRYPTO_HMACMD5(ctx),
169 				  (char *)uniname,
170 				  UNICODE_LEN(conv_len));
171 	if (ret) {
172 		ksmbd_debug(AUTH, "Could not update with user\n");
173 		goto out;
174 	}
175 
176 	/* Convert domain name or conn name to unicode and uppercase */
177 	len = strlen(dname);
178 	domain = kzalloc(2 + UNICODE_LEN(len), GFP_KERNEL);
179 	if (!domain) {
180 		ret = -ENOMEM;
181 		goto out;
182 	}
183 
184 	conv_len = smb_strtoUTF16((__le16 *)domain, dname, len,
185 				  conn->local_nls);
186 	if (conv_len < 0 || conv_len > len) {
187 		ret = -EINVAL;
188 		goto out;
189 	}
190 
191 	ret = crypto_shash_update(CRYPTO_HMACMD5(ctx),
192 				  (char *)domain,
193 				  UNICODE_LEN(conv_len));
194 	if (ret) {
195 		ksmbd_debug(AUTH, "Could not update with domain\n");
196 		goto out;
197 	}
198 
199 	ret = crypto_shash_final(CRYPTO_HMACMD5(ctx), ntlmv2_hash);
200 	if (ret)
201 		ksmbd_debug(AUTH, "Could not generate md5 hash\n");
202 out:
203 	kfree(uniname);
204 	kfree(domain);
205 	ksmbd_release_crypto_ctx(ctx);
206 	return ret;
207 }
208 
209 /**
210  * ksmbd_auth_ntlmv2() - NTLMv2 authentication handler
211  * @sess:	session of connection
212  * @ntlmv2:		NTLMv2 challenge response
213  * @blen:		NTLMv2 blob length
214  * @domain_name:	domain name
215  *
216  * Return:	0 on success, error number on error
217  */
218 int ksmbd_auth_ntlmv2(struct ksmbd_conn *conn, struct ksmbd_session *sess,
219 		      struct ntlmv2_resp *ntlmv2, int blen, char *domain_name,
220 		      char *cryptkey)
221 {
222 	char ntlmv2_hash[CIFS_ENCPWD_SIZE];
223 	char ntlmv2_rsp[CIFS_HMAC_MD5_HASH_SIZE];
224 	struct ksmbd_crypto_ctx *ctx = NULL;
225 	char *construct = NULL;
226 	int rc, len;
227 
228 	rc = calc_ntlmv2_hash(conn, sess, ntlmv2_hash, domain_name);
229 	if (rc) {
230 		ksmbd_debug(AUTH, "could not get v2 hash rc %d\n", rc);
231 		goto out;
232 	}
233 
234 	ctx = ksmbd_crypto_ctx_find_hmacmd5();
235 	if (!ctx) {
236 		ksmbd_debug(AUTH, "could not crypto alloc hmacmd5\n");
237 		return -ENOMEM;
238 	}
239 
240 	rc = crypto_shash_setkey(CRYPTO_HMACMD5_TFM(ctx),
241 				 ntlmv2_hash,
242 				 CIFS_HMAC_MD5_HASH_SIZE);
243 	if (rc) {
244 		ksmbd_debug(AUTH, "Could not set NTLMV2 Hash as a key\n");
245 		goto out;
246 	}
247 
248 	rc = crypto_shash_init(CRYPTO_HMACMD5(ctx));
249 	if (rc) {
250 		ksmbd_debug(AUTH, "Could not init hmacmd5\n");
251 		goto out;
252 	}
253 
254 	len = CIFS_CRYPTO_KEY_SIZE + blen;
255 	construct = kzalloc(len, GFP_KERNEL);
256 	if (!construct) {
257 		rc = -ENOMEM;
258 		goto out;
259 	}
260 
261 	memcpy(construct, cryptkey, CIFS_CRYPTO_KEY_SIZE);
262 	memcpy(construct + CIFS_CRYPTO_KEY_SIZE, &ntlmv2->blob_signature, blen);
263 
264 	rc = crypto_shash_update(CRYPTO_HMACMD5(ctx), construct, len);
265 	if (rc) {
266 		ksmbd_debug(AUTH, "Could not update with response\n");
267 		goto out;
268 	}
269 
270 	rc = crypto_shash_final(CRYPTO_HMACMD5(ctx), ntlmv2_rsp);
271 	if (rc) {
272 		ksmbd_debug(AUTH, "Could not generate md5 hash\n");
273 		goto out;
274 	}
275 	ksmbd_release_crypto_ctx(ctx);
276 	ctx = NULL;
277 
278 	rc = ksmbd_gen_sess_key(sess, ntlmv2_hash, ntlmv2_rsp);
279 	if (rc) {
280 		ksmbd_debug(AUTH, "Could not generate sess key\n");
281 		goto out;
282 	}
283 
284 	if (memcmp(ntlmv2->ntlmv2_hash, ntlmv2_rsp, CIFS_HMAC_MD5_HASH_SIZE) != 0)
285 		rc = -EINVAL;
286 out:
287 	if (ctx)
288 		ksmbd_release_crypto_ctx(ctx);
289 	kfree(construct);
290 	return rc;
291 }
292 
293 /**
294  * ksmbd_decode_ntlmssp_auth_blob() - helper function to construct
295  * authenticate blob
296  * @authblob:	authenticate blob source pointer
297  * @usr:	user details
298  * @sess:	session of connection
299  *
300  * Return:	0 on success, error number on error
301  */
302 int ksmbd_decode_ntlmssp_auth_blob(struct authenticate_message *authblob,
303 				   int blob_len, struct ksmbd_conn *conn,
304 				   struct ksmbd_session *sess)
305 {
306 	char *domain_name;
307 	unsigned int nt_off, dn_off;
308 	unsigned short nt_len, dn_len;
309 	int ret;
310 
311 	if (blob_len < sizeof(struct authenticate_message)) {
312 		ksmbd_debug(AUTH, "negotiate blob len %d too small\n",
313 			    blob_len);
314 		return -EINVAL;
315 	}
316 
317 	if (memcmp(authblob->Signature, "NTLMSSP", 8)) {
318 		ksmbd_debug(AUTH, "blob signature incorrect %s\n",
319 			    authblob->Signature);
320 		return -EINVAL;
321 	}
322 
323 	nt_off = le32_to_cpu(authblob->NtChallengeResponse.BufferOffset);
324 	nt_len = le16_to_cpu(authblob->NtChallengeResponse.Length);
325 	dn_off = le32_to_cpu(authblob->DomainName.BufferOffset);
326 	dn_len = le16_to_cpu(authblob->DomainName.Length);
327 
328 	if (blob_len < (u64)dn_off + dn_len || blob_len < (u64)nt_off + nt_len ||
329 	    nt_len < CIFS_ENCPWD_SIZE)
330 		return -EINVAL;
331 
332 	/* TODO : use domain name that imported from configuration file */
333 	domain_name = smb_strndup_from_utf16((const char *)authblob + dn_off,
334 					     dn_len, true, conn->local_nls);
335 	if (IS_ERR(domain_name))
336 		return PTR_ERR(domain_name);
337 
338 	/* process NTLMv2 authentication */
339 	ksmbd_debug(AUTH, "decode_ntlmssp_authenticate_blob dname%s\n",
340 		    domain_name);
341 	ret = ksmbd_auth_ntlmv2(conn, sess,
342 				(struct ntlmv2_resp *)((char *)authblob + nt_off),
343 				nt_len - CIFS_ENCPWD_SIZE,
344 				domain_name, conn->ntlmssp.cryptkey);
345 	kfree(domain_name);
346 
347 	/* The recovered secondary session key */
348 	if (conn->ntlmssp.client_flags & NTLMSSP_NEGOTIATE_KEY_XCH) {
349 		struct arc4_ctx *ctx_arc4;
350 		unsigned int sess_key_off, sess_key_len;
351 
352 		sess_key_off = le32_to_cpu(authblob->SessionKey.BufferOffset);
353 		sess_key_len = le16_to_cpu(authblob->SessionKey.Length);
354 
355 		if (blob_len < (u64)sess_key_off + sess_key_len)
356 			return -EINVAL;
357 
358 		if (sess_key_len > CIFS_KEY_SIZE)
359 			return -EINVAL;
360 
361 		ctx_arc4 = kmalloc(sizeof(*ctx_arc4), GFP_KERNEL);
362 		if (!ctx_arc4)
363 			return -ENOMEM;
364 
365 		cifs_arc4_setkey(ctx_arc4, sess->sess_key,
366 				 SMB2_NTLMV2_SESSKEY_SIZE);
367 		cifs_arc4_crypt(ctx_arc4, sess->sess_key,
368 				(char *)authblob + sess_key_off, sess_key_len);
369 		kfree_sensitive(ctx_arc4);
370 	}
371 
372 	return ret;
373 }
374 
375 /**
376  * ksmbd_decode_ntlmssp_neg_blob() - helper function to construct
377  * negotiate blob
378  * @negblob: negotiate blob source pointer
379  * @rsp:     response header pointer to be updated
380  * @sess:    session of connection
381  *
382  */
383 int ksmbd_decode_ntlmssp_neg_blob(struct negotiate_message *negblob,
384 				  int blob_len, struct ksmbd_conn *conn)
385 {
386 	if (blob_len < sizeof(struct negotiate_message)) {
387 		ksmbd_debug(AUTH, "negotiate blob len %d too small\n",
388 			    blob_len);
389 		return -EINVAL;
390 	}
391 
392 	if (memcmp(negblob->Signature, "NTLMSSP", 8)) {
393 		ksmbd_debug(AUTH, "blob signature incorrect %s\n",
394 			    negblob->Signature);
395 		return -EINVAL;
396 	}
397 
398 	conn->ntlmssp.client_flags = le32_to_cpu(negblob->NegotiateFlags);
399 	return 0;
400 }
401 
402 /**
403  * ksmbd_build_ntlmssp_challenge_blob() - helper function to construct
404  * challenge blob
405  * @chgblob: challenge blob source pointer to initialize
406  * @rsp:     response header pointer to be updated
407  * @sess:    session of connection
408  *
409  */
410 unsigned int
411 ksmbd_build_ntlmssp_challenge_blob(struct challenge_message *chgblob,
412 				   struct ksmbd_conn *conn)
413 {
414 	struct target_info *tinfo;
415 	wchar_t *name;
416 	__u8 *target_name;
417 	unsigned int flags, blob_off, blob_len, type, target_info_len = 0;
418 	int len, uni_len, conv_len;
419 	int cflags = conn->ntlmssp.client_flags;
420 
421 	memcpy(chgblob->Signature, NTLMSSP_SIGNATURE, 8);
422 	chgblob->MessageType = NtLmChallenge;
423 
424 	flags = NTLMSSP_NEGOTIATE_UNICODE |
425 		NTLMSSP_NEGOTIATE_NTLM | NTLMSSP_TARGET_TYPE_SERVER |
426 		NTLMSSP_NEGOTIATE_TARGET_INFO;
427 
428 	if (cflags & NTLMSSP_NEGOTIATE_SIGN) {
429 		flags |= NTLMSSP_NEGOTIATE_SIGN;
430 		flags |= cflags & (NTLMSSP_NEGOTIATE_128 |
431 				   NTLMSSP_NEGOTIATE_56);
432 	}
433 
434 	if (cflags & NTLMSSP_NEGOTIATE_SEAL && smb3_encryption_negotiated(conn))
435 		flags |= NTLMSSP_NEGOTIATE_SEAL;
436 
437 	if (cflags & NTLMSSP_NEGOTIATE_ALWAYS_SIGN)
438 		flags |= NTLMSSP_NEGOTIATE_ALWAYS_SIGN;
439 
440 	if (cflags & NTLMSSP_REQUEST_TARGET)
441 		flags |= NTLMSSP_REQUEST_TARGET;
442 
443 	if (conn->use_spnego &&
444 	    (cflags & NTLMSSP_NEGOTIATE_EXTENDED_SEC))
445 		flags |= NTLMSSP_NEGOTIATE_EXTENDED_SEC;
446 
447 	if (cflags & NTLMSSP_NEGOTIATE_KEY_XCH)
448 		flags |= NTLMSSP_NEGOTIATE_KEY_XCH;
449 
450 	chgblob->NegotiateFlags = cpu_to_le32(flags);
451 	len = strlen(ksmbd_netbios_name());
452 	name = kmalloc(2 + UNICODE_LEN(len), GFP_KERNEL);
453 	if (!name)
454 		return -ENOMEM;
455 
456 	conv_len = smb_strtoUTF16((__le16 *)name, ksmbd_netbios_name(), len,
457 				  conn->local_nls);
458 	if (conv_len < 0 || conv_len > len) {
459 		kfree(name);
460 		return -EINVAL;
461 	}
462 
463 	uni_len = UNICODE_LEN(conv_len);
464 
465 	blob_off = sizeof(struct challenge_message);
466 	blob_len = blob_off + uni_len;
467 
468 	chgblob->TargetName.Length = cpu_to_le16(uni_len);
469 	chgblob->TargetName.MaximumLength = cpu_to_le16(uni_len);
470 	chgblob->TargetName.BufferOffset = cpu_to_le32(blob_off);
471 
472 	/* Initialize random conn challenge */
473 	get_random_bytes(conn->ntlmssp.cryptkey, sizeof(__u64));
474 	memcpy(chgblob->Challenge, conn->ntlmssp.cryptkey,
475 	       CIFS_CRYPTO_KEY_SIZE);
476 
477 	/* Add Target Information to security buffer */
478 	chgblob->TargetInfoArray.BufferOffset = cpu_to_le32(blob_len);
479 
480 	target_name = (__u8 *)chgblob + blob_off;
481 	memcpy(target_name, name, uni_len);
482 	tinfo = (struct target_info *)(target_name + uni_len);
483 
484 	chgblob->TargetInfoArray.Length = 0;
485 	/* Add target info list for NetBIOS/DNS settings */
486 	for (type = NTLMSSP_AV_NB_COMPUTER_NAME;
487 	     type <= NTLMSSP_AV_DNS_DOMAIN_NAME; type++) {
488 		tinfo->Type = cpu_to_le16(type);
489 		tinfo->Length = cpu_to_le16(uni_len);
490 		memcpy(tinfo->Content, name, uni_len);
491 		tinfo = (struct target_info *)((char *)tinfo + 4 + uni_len);
492 		target_info_len += 4 + uni_len;
493 	}
494 
495 	/* Add terminator subblock */
496 	tinfo->Type = 0;
497 	tinfo->Length = 0;
498 	target_info_len += 4;
499 
500 	chgblob->TargetInfoArray.Length = cpu_to_le16(target_info_len);
501 	chgblob->TargetInfoArray.MaximumLength = cpu_to_le16(target_info_len);
502 	blob_len += target_info_len;
503 	kfree(name);
504 	ksmbd_debug(AUTH, "NTLMSSP SecurityBufferLength %d\n", blob_len);
505 	return blob_len;
506 }
507 
508 #ifdef CONFIG_SMB_SERVER_KERBEROS5
509 int ksmbd_krb5_authenticate(struct ksmbd_session *sess, char *in_blob,
510 			    int in_len, char *out_blob, int *out_len)
511 {
512 	struct ksmbd_spnego_authen_response *resp;
513 	struct ksmbd_user *user = NULL;
514 	int retval;
515 
516 	resp = ksmbd_ipc_spnego_authen_request(in_blob, in_len);
517 	if (!resp) {
518 		ksmbd_debug(AUTH, "SPNEGO_AUTHEN_REQUEST failure\n");
519 		return -EINVAL;
520 	}
521 
522 	if (!(resp->login_response.status & KSMBD_USER_FLAG_OK)) {
523 		ksmbd_debug(AUTH, "krb5 authentication failure\n");
524 		retval = -EPERM;
525 		goto out;
526 	}
527 
528 	if (*out_len <= resp->spnego_blob_len) {
529 		ksmbd_debug(AUTH, "buf len %d, but blob len %d\n",
530 			    *out_len, resp->spnego_blob_len);
531 		retval = -EINVAL;
532 		goto out;
533 	}
534 
535 	if (resp->session_key_len > sizeof(sess->sess_key)) {
536 		ksmbd_debug(AUTH, "session key is too long\n");
537 		retval = -EINVAL;
538 		goto out;
539 	}
540 
541 	user = ksmbd_alloc_user(&resp->login_response);
542 	if (!user) {
543 		ksmbd_debug(AUTH, "login failure\n");
544 		retval = -ENOMEM;
545 		goto out;
546 	}
547 	sess->user = user;
548 
549 	memcpy(sess->sess_key, resp->payload, resp->session_key_len);
550 	memcpy(out_blob, resp->payload + resp->session_key_len,
551 	       resp->spnego_blob_len);
552 	*out_len = resp->spnego_blob_len;
553 	retval = 0;
554 out:
555 	kvfree(resp);
556 	return retval;
557 }
558 #else
559 int ksmbd_krb5_authenticate(struct ksmbd_session *sess, char *in_blob,
560 			    int in_len, char *out_blob, int *out_len)
561 {
562 	return -EOPNOTSUPP;
563 }
564 #endif
565 
566 /**
567  * ksmbd_sign_smb2_pdu() - function to generate packet signing
568  * @conn:	connection
569  * @key:	signing key
570  * @iov:        buffer iov array
571  * @n_vec:	number of iovecs
572  * @sig:	signature value generated for client request packet
573  *
574  */
575 int ksmbd_sign_smb2_pdu(struct ksmbd_conn *conn, char *key, struct kvec *iov,
576 			int n_vec, char *sig)
577 {
578 	struct ksmbd_crypto_ctx *ctx;
579 	int rc, i;
580 
581 	ctx = ksmbd_crypto_ctx_find_hmacsha256();
582 	if (!ctx) {
583 		ksmbd_debug(AUTH, "could not crypto alloc hmacmd5\n");
584 		return -ENOMEM;
585 	}
586 
587 	rc = crypto_shash_setkey(CRYPTO_HMACSHA256_TFM(ctx),
588 				 key,
589 				 SMB2_NTLMV2_SESSKEY_SIZE);
590 	if (rc)
591 		goto out;
592 
593 	rc = crypto_shash_init(CRYPTO_HMACSHA256(ctx));
594 	if (rc) {
595 		ksmbd_debug(AUTH, "hmacsha256 init error %d\n", rc);
596 		goto out;
597 	}
598 
599 	for (i = 0; i < n_vec; i++) {
600 		rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx),
601 					 iov[i].iov_base,
602 					 iov[i].iov_len);
603 		if (rc) {
604 			ksmbd_debug(AUTH, "hmacsha256 update error %d\n", rc);
605 			goto out;
606 		}
607 	}
608 
609 	rc = crypto_shash_final(CRYPTO_HMACSHA256(ctx), sig);
610 	if (rc)
611 		ksmbd_debug(AUTH, "hmacsha256 generation error %d\n", rc);
612 out:
613 	ksmbd_release_crypto_ctx(ctx);
614 	return rc;
615 }
616 
617 /**
618  * ksmbd_sign_smb3_pdu() - function to generate packet signing
619  * @conn:	connection
620  * @key:	signing key
621  * @iov:        buffer iov array
622  * @n_vec:	number of iovecs
623  * @sig:	signature value generated for client request packet
624  *
625  */
626 int ksmbd_sign_smb3_pdu(struct ksmbd_conn *conn, char *key, struct kvec *iov,
627 			int n_vec, char *sig)
628 {
629 	struct ksmbd_crypto_ctx *ctx;
630 	int rc, i;
631 
632 	ctx = ksmbd_crypto_ctx_find_cmacaes();
633 	if (!ctx) {
634 		ksmbd_debug(AUTH, "could not crypto alloc cmac\n");
635 		return -ENOMEM;
636 	}
637 
638 	rc = crypto_shash_setkey(CRYPTO_CMACAES_TFM(ctx),
639 				 key,
640 				 SMB2_CMACAES_SIZE);
641 	if (rc)
642 		goto out;
643 
644 	rc = crypto_shash_init(CRYPTO_CMACAES(ctx));
645 	if (rc) {
646 		ksmbd_debug(AUTH, "cmaces init error %d\n", rc);
647 		goto out;
648 	}
649 
650 	for (i = 0; i < n_vec; i++) {
651 		rc = crypto_shash_update(CRYPTO_CMACAES(ctx),
652 					 iov[i].iov_base,
653 					 iov[i].iov_len);
654 		if (rc) {
655 			ksmbd_debug(AUTH, "cmaces update error %d\n", rc);
656 			goto out;
657 		}
658 	}
659 
660 	rc = crypto_shash_final(CRYPTO_CMACAES(ctx), sig);
661 	if (rc)
662 		ksmbd_debug(AUTH, "cmaces generation error %d\n", rc);
663 out:
664 	ksmbd_release_crypto_ctx(ctx);
665 	return rc;
666 }
667 
668 struct derivation {
669 	struct kvec label;
670 	struct kvec context;
671 	bool binding;
672 };
673 
674 static int generate_key(struct ksmbd_conn *conn, struct ksmbd_session *sess,
675 			struct kvec label, struct kvec context, __u8 *key,
676 			unsigned int key_size)
677 {
678 	unsigned char zero = 0x0;
679 	__u8 i[4] = {0, 0, 0, 1};
680 	__u8 L128[4] = {0, 0, 0, 128};
681 	__u8 L256[4] = {0, 0, 1, 0};
682 	int rc;
683 	unsigned char prfhash[SMB2_HMACSHA256_SIZE];
684 	unsigned char *hashptr = prfhash;
685 	struct ksmbd_crypto_ctx *ctx;
686 
687 	memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE);
688 	memset(key, 0x0, key_size);
689 
690 	ctx = ksmbd_crypto_ctx_find_hmacsha256();
691 	if (!ctx) {
692 		ksmbd_debug(AUTH, "could not crypto alloc hmacmd5\n");
693 		return -ENOMEM;
694 	}
695 
696 	rc = crypto_shash_setkey(CRYPTO_HMACSHA256_TFM(ctx),
697 				 sess->sess_key,
698 				 SMB2_NTLMV2_SESSKEY_SIZE);
699 	if (rc)
700 		goto smb3signkey_ret;
701 
702 	rc = crypto_shash_init(CRYPTO_HMACSHA256(ctx));
703 	if (rc) {
704 		ksmbd_debug(AUTH, "hmacsha256 init error %d\n", rc);
705 		goto smb3signkey_ret;
706 	}
707 
708 	rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx), i, 4);
709 	if (rc) {
710 		ksmbd_debug(AUTH, "could not update with n\n");
711 		goto smb3signkey_ret;
712 	}
713 
714 	rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx),
715 				 label.iov_base,
716 				 label.iov_len);
717 	if (rc) {
718 		ksmbd_debug(AUTH, "could not update with label\n");
719 		goto smb3signkey_ret;
720 	}
721 
722 	rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx), &zero, 1);
723 	if (rc) {
724 		ksmbd_debug(AUTH, "could not update with zero\n");
725 		goto smb3signkey_ret;
726 	}
727 
728 	rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx),
729 				 context.iov_base,
730 				 context.iov_len);
731 	if (rc) {
732 		ksmbd_debug(AUTH, "could not update with context\n");
733 		goto smb3signkey_ret;
734 	}
735 
736 	if (key_size == SMB3_ENC_DEC_KEY_SIZE &&
737 	    (conn->cipher_type == SMB2_ENCRYPTION_AES256_CCM ||
738 	     conn->cipher_type == SMB2_ENCRYPTION_AES256_GCM))
739 		rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx), L256, 4);
740 	else
741 		rc = crypto_shash_update(CRYPTO_HMACSHA256(ctx), L128, 4);
742 	if (rc) {
743 		ksmbd_debug(AUTH, "could not update with L\n");
744 		goto smb3signkey_ret;
745 	}
746 
747 	rc = crypto_shash_final(CRYPTO_HMACSHA256(ctx), hashptr);
748 	if (rc) {
749 		ksmbd_debug(AUTH, "Could not generate hmacmd5 hash error %d\n",
750 			    rc);
751 		goto smb3signkey_ret;
752 	}
753 
754 	memcpy(key, hashptr, key_size);
755 
756 smb3signkey_ret:
757 	ksmbd_release_crypto_ctx(ctx);
758 	return rc;
759 }
760 
761 static int generate_smb3signingkey(struct ksmbd_session *sess,
762 				   struct ksmbd_conn *conn,
763 				   const struct derivation *signing)
764 {
765 	int rc;
766 	struct channel *chann;
767 	char *key;
768 
769 	chann = lookup_chann_list(sess, conn);
770 	if (!chann)
771 		return 0;
772 
773 	if (conn->dialect >= SMB30_PROT_ID && signing->binding)
774 		key = chann->smb3signingkey;
775 	else
776 		key = sess->smb3signingkey;
777 
778 	rc = generate_key(conn, sess, signing->label, signing->context, key,
779 			  SMB3_SIGN_KEY_SIZE);
780 	if (rc)
781 		return rc;
782 
783 	if (!(conn->dialect >= SMB30_PROT_ID && signing->binding))
784 		memcpy(chann->smb3signingkey, key, SMB3_SIGN_KEY_SIZE);
785 
786 	ksmbd_debug(AUTH, "dumping generated AES signing keys\n");
787 	ksmbd_debug(AUTH, "Session Id    %llu\n", sess->id);
788 	ksmbd_debug(AUTH, "Session Key   %*ph\n",
789 		    SMB2_NTLMV2_SESSKEY_SIZE, sess->sess_key);
790 	ksmbd_debug(AUTH, "Signing Key   %*ph\n",
791 		    SMB3_SIGN_KEY_SIZE, key);
792 	return 0;
793 }
794 
795 int ksmbd_gen_smb30_signingkey(struct ksmbd_session *sess,
796 			       struct ksmbd_conn *conn)
797 {
798 	struct derivation d;
799 
800 	d.label.iov_base = "SMB2AESCMAC";
801 	d.label.iov_len = 12;
802 	d.context.iov_base = "SmbSign";
803 	d.context.iov_len = 8;
804 	d.binding = conn->binding;
805 
806 	return generate_smb3signingkey(sess, conn, &d);
807 }
808 
809 int ksmbd_gen_smb311_signingkey(struct ksmbd_session *sess,
810 				struct ksmbd_conn *conn)
811 {
812 	struct derivation d;
813 
814 	d.label.iov_base = "SMBSigningKey";
815 	d.label.iov_len = 14;
816 	if (conn->binding) {
817 		struct preauth_session *preauth_sess;
818 
819 		preauth_sess = ksmbd_preauth_session_lookup(conn, sess->id);
820 		if (!preauth_sess)
821 			return -ENOENT;
822 		d.context.iov_base = preauth_sess->Preauth_HashValue;
823 	} else {
824 		d.context.iov_base = sess->Preauth_HashValue;
825 	}
826 	d.context.iov_len = 64;
827 	d.binding = conn->binding;
828 
829 	return generate_smb3signingkey(sess, conn, &d);
830 }
831 
832 struct derivation_twin {
833 	struct derivation encryption;
834 	struct derivation decryption;
835 };
836 
837 static int generate_smb3encryptionkey(struct ksmbd_conn *conn,
838 				      struct ksmbd_session *sess,
839 				      const struct derivation_twin *ptwin)
840 {
841 	int rc;
842 
843 	rc = generate_key(conn, sess, ptwin->encryption.label,
844 			  ptwin->encryption.context, sess->smb3encryptionkey,
845 			  SMB3_ENC_DEC_KEY_SIZE);
846 	if (rc)
847 		return rc;
848 
849 	rc = generate_key(conn, sess, ptwin->decryption.label,
850 			  ptwin->decryption.context,
851 			  sess->smb3decryptionkey, SMB3_ENC_DEC_KEY_SIZE);
852 	if (rc)
853 		return rc;
854 
855 	ksmbd_debug(AUTH, "dumping generated AES encryption keys\n");
856 	ksmbd_debug(AUTH, "Cipher type   %d\n", conn->cipher_type);
857 	ksmbd_debug(AUTH, "Session Id    %llu\n", sess->id);
858 	ksmbd_debug(AUTH, "Session Key   %*ph\n",
859 		    SMB2_NTLMV2_SESSKEY_SIZE, sess->sess_key);
860 	if (conn->cipher_type == SMB2_ENCRYPTION_AES256_CCM ||
861 	    conn->cipher_type == SMB2_ENCRYPTION_AES256_GCM) {
862 		ksmbd_debug(AUTH, "ServerIn Key  %*ph\n",
863 			    SMB3_GCM256_CRYPTKEY_SIZE, sess->smb3encryptionkey);
864 		ksmbd_debug(AUTH, "ServerOut Key %*ph\n",
865 			    SMB3_GCM256_CRYPTKEY_SIZE, sess->smb3decryptionkey);
866 	} else {
867 		ksmbd_debug(AUTH, "ServerIn Key  %*ph\n",
868 			    SMB3_GCM128_CRYPTKEY_SIZE, sess->smb3encryptionkey);
869 		ksmbd_debug(AUTH, "ServerOut Key %*ph\n",
870 			    SMB3_GCM128_CRYPTKEY_SIZE, sess->smb3decryptionkey);
871 	}
872 	return 0;
873 }
874 
875 int ksmbd_gen_smb30_encryptionkey(struct ksmbd_conn *conn,
876 				  struct ksmbd_session *sess)
877 {
878 	struct derivation_twin twin;
879 	struct derivation *d;
880 
881 	d = &twin.encryption;
882 	d->label.iov_base = "SMB2AESCCM";
883 	d->label.iov_len = 11;
884 	d->context.iov_base = "ServerOut";
885 	d->context.iov_len = 10;
886 
887 	d = &twin.decryption;
888 	d->label.iov_base = "SMB2AESCCM";
889 	d->label.iov_len = 11;
890 	d->context.iov_base = "ServerIn ";
891 	d->context.iov_len = 10;
892 
893 	return generate_smb3encryptionkey(conn, sess, &twin);
894 }
895 
896 int ksmbd_gen_smb311_encryptionkey(struct ksmbd_conn *conn,
897 				   struct ksmbd_session *sess)
898 {
899 	struct derivation_twin twin;
900 	struct derivation *d;
901 
902 	d = &twin.encryption;
903 	d->label.iov_base = "SMBS2CCipherKey";
904 	d->label.iov_len = 16;
905 	d->context.iov_base = sess->Preauth_HashValue;
906 	d->context.iov_len = 64;
907 
908 	d = &twin.decryption;
909 	d->label.iov_base = "SMBC2SCipherKey";
910 	d->label.iov_len = 16;
911 	d->context.iov_base = sess->Preauth_HashValue;
912 	d->context.iov_len = 64;
913 
914 	return generate_smb3encryptionkey(conn, sess, &twin);
915 }
916 
917 int ksmbd_gen_preauth_integrity_hash(struct ksmbd_conn *conn, char *buf,
918 				     __u8 *pi_hash)
919 {
920 	int rc;
921 	struct smb2_hdr *rcv_hdr = smb2_get_msg(buf);
922 	char *all_bytes_msg = (char *)&rcv_hdr->ProtocolId;
923 	int msg_size = get_rfc1002_len(buf);
924 	struct ksmbd_crypto_ctx *ctx = NULL;
925 
926 	if (conn->preauth_info->Preauth_HashId !=
927 	    SMB2_PREAUTH_INTEGRITY_SHA512)
928 		return -EINVAL;
929 
930 	ctx = ksmbd_crypto_ctx_find_sha512();
931 	if (!ctx) {
932 		ksmbd_debug(AUTH, "could not alloc sha512\n");
933 		return -ENOMEM;
934 	}
935 
936 	rc = crypto_shash_init(CRYPTO_SHA512(ctx));
937 	if (rc) {
938 		ksmbd_debug(AUTH, "could not init shashn");
939 		goto out;
940 	}
941 
942 	rc = crypto_shash_update(CRYPTO_SHA512(ctx), pi_hash, 64);
943 	if (rc) {
944 		ksmbd_debug(AUTH, "could not update with n\n");
945 		goto out;
946 	}
947 
948 	rc = crypto_shash_update(CRYPTO_SHA512(ctx), all_bytes_msg, msg_size);
949 	if (rc) {
950 		ksmbd_debug(AUTH, "could not update with n\n");
951 		goto out;
952 	}
953 
954 	rc = crypto_shash_final(CRYPTO_SHA512(ctx), pi_hash);
955 	if (rc) {
956 		ksmbd_debug(AUTH, "Could not generate hash err : %d\n", rc);
957 		goto out;
958 	}
959 out:
960 	ksmbd_release_crypto_ctx(ctx);
961 	return rc;
962 }
963 
964 int ksmbd_gen_sd_hash(struct ksmbd_conn *conn, char *sd_buf, int len,
965 		      __u8 *pi_hash)
966 {
967 	int rc;
968 	struct ksmbd_crypto_ctx *ctx = NULL;
969 
970 	ctx = ksmbd_crypto_ctx_find_sha256();
971 	if (!ctx) {
972 		ksmbd_debug(AUTH, "could not alloc sha256\n");
973 		return -ENOMEM;
974 	}
975 
976 	rc = crypto_shash_init(CRYPTO_SHA256(ctx));
977 	if (rc) {
978 		ksmbd_debug(AUTH, "could not init shashn");
979 		goto out;
980 	}
981 
982 	rc = crypto_shash_update(CRYPTO_SHA256(ctx), sd_buf, len);
983 	if (rc) {
984 		ksmbd_debug(AUTH, "could not update with n\n");
985 		goto out;
986 	}
987 
988 	rc = crypto_shash_final(CRYPTO_SHA256(ctx), pi_hash);
989 	if (rc) {
990 		ksmbd_debug(AUTH, "Could not generate hash err : %d\n", rc);
991 		goto out;
992 	}
993 out:
994 	ksmbd_release_crypto_ctx(ctx);
995 	return rc;
996 }
997 
998 static int ksmbd_get_encryption_key(struct ksmbd_work *work, __u64 ses_id,
999 				    int enc, u8 *key)
1000 {
1001 	struct ksmbd_session *sess;
1002 	u8 *ses_enc_key;
1003 
1004 	if (enc)
1005 		sess = work->sess;
1006 	else
1007 		sess = ksmbd_session_lookup_all(work->conn, ses_id);
1008 	if (!sess)
1009 		return -EINVAL;
1010 
1011 	ses_enc_key = enc ? sess->smb3encryptionkey :
1012 		sess->smb3decryptionkey;
1013 	memcpy(key, ses_enc_key, SMB3_ENC_DEC_KEY_SIZE);
1014 
1015 	return 0;
1016 }
1017 
1018 static inline void smb2_sg_set_buf(struct scatterlist *sg, const void *buf,
1019 				   unsigned int buflen)
1020 {
1021 	void *addr;
1022 
1023 	if (is_vmalloc_addr(buf))
1024 		addr = vmalloc_to_page(buf);
1025 	else
1026 		addr = virt_to_page(buf);
1027 	sg_set_page(sg, addr, buflen, offset_in_page(buf));
1028 }
1029 
1030 static struct scatterlist *ksmbd_init_sg(struct kvec *iov, unsigned int nvec,
1031 					 u8 *sign)
1032 {
1033 	struct scatterlist *sg;
1034 	unsigned int assoc_data_len = sizeof(struct smb2_transform_hdr) - 20;
1035 	int i, *nr_entries, total_entries = 0, sg_idx = 0;
1036 
1037 	if (!nvec)
1038 		return NULL;
1039 
1040 	nr_entries = kcalloc(nvec, sizeof(int), GFP_KERNEL);
1041 	if (!nr_entries)
1042 		return NULL;
1043 
1044 	for (i = 0; i < nvec - 1; i++) {
1045 		unsigned long kaddr = (unsigned long)iov[i + 1].iov_base;
1046 
1047 		if (is_vmalloc_addr(iov[i + 1].iov_base)) {
1048 			nr_entries[i] = ((kaddr + iov[i + 1].iov_len +
1049 					PAGE_SIZE - 1) >> PAGE_SHIFT) -
1050 				(kaddr >> PAGE_SHIFT);
1051 		} else {
1052 			nr_entries[i]++;
1053 		}
1054 		total_entries += nr_entries[i];
1055 	}
1056 
1057 	/* Add two entries for transform header and signature */
1058 	total_entries += 2;
1059 
1060 	sg = kmalloc_array(total_entries, sizeof(struct scatterlist), GFP_KERNEL);
1061 	if (!sg) {
1062 		kfree(nr_entries);
1063 		return NULL;
1064 	}
1065 
1066 	sg_init_table(sg, total_entries);
1067 	smb2_sg_set_buf(&sg[sg_idx++], iov[0].iov_base + 24, assoc_data_len);
1068 	for (i = 0; i < nvec - 1; i++) {
1069 		void *data = iov[i + 1].iov_base;
1070 		int len = iov[i + 1].iov_len;
1071 
1072 		if (is_vmalloc_addr(data)) {
1073 			int j, offset = offset_in_page(data);
1074 
1075 			for (j = 0; j < nr_entries[i]; j++) {
1076 				unsigned int bytes = PAGE_SIZE - offset;
1077 
1078 				if (!len)
1079 					break;
1080 
1081 				if (bytes > len)
1082 					bytes = len;
1083 
1084 				sg_set_page(&sg[sg_idx++],
1085 					    vmalloc_to_page(data), bytes,
1086 					    offset_in_page(data));
1087 
1088 				data += bytes;
1089 				len -= bytes;
1090 				offset = 0;
1091 			}
1092 		} else {
1093 			sg_set_page(&sg[sg_idx++], virt_to_page(data), len,
1094 				    offset_in_page(data));
1095 		}
1096 	}
1097 	smb2_sg_set_buf(&sg[sg_idx], sign, SMB2_SIGNATURE_SIZE);
1098 	kfree(nr_entries);
1099 	return sg;
1100 }
1101 
1102 int ksmbd_crypt_message(struct ksmbd_work *work, struct kvec *iov,
1103 			unsigned int nvec, int enc)
1104 {
1105 	struct ksmbd_conn *conn = work->conn;
1106 	struct smb2_transform_hdr *tr_hdr = smb2_get_msg(iov[0].iov_base);
1107 	unsigned int assoc_data_len = sizeof(struct smb2_transform_hdr) - 20;
1108 	int rc;
1109 	struct scatterlist *sg;
1110 	u8 sign[SMB2_SIGNATURE_SIZE] = {};
1111 	u8 key[SMB3_ENC_DEC_KEY_SIZE];
1112 	struct aead_request *req;
1113 	char *iv;
1114 	unsigned int iv_len;
1115 	struct crypto_aead *tfm;
1116 	unsigned int crypt_len = le32_to_cpu(tr_hdr->OriginalMessageSize);
1117 	struct ksmbd_crypto_ctx *ctx;
1118 
1119 	rc = ksmbd_get_encryption_key(work,
1120 				      le64_to_cpu(tr_hdr->SessionId),
1121 				      enc,
1122 				      key);
1123 	if (rc) {
1124 		pr_err("Could not get %scryption key\n", enc ? "en" : "de");
1125 		return rc;
1126 	}
1127 
1128 	if (conn->cipher_type == SMB2_ENCRYPTION_AES128_GCM ||
1129 	    conn->cipher_type == SMB2_ENCRYPTION_AES256_GCM)
1130 		ctx = ksmbd_crypto_ctx_find_gcm();
1131 	else
1132 		ctx = ksmbd_crypto_ctx_find_ccm();
1133 	if (!ctx) {
1134 		pr_err("crypto alloc failed\n");
1135 		return -ENOMEM;
1136 	}
1137 
1138 	if (conn->cipher_type == SMB2_ENCRYPTION_AES128_GCM ||
1139 	    conn->cipher_type == SMB2_ENCRYPTION_AES256_GCM)
1140 		tfm = CRYPTO_GCM(ctx);
1141 	else
1142 		tfm = CRYPTO_CCM(ctx);
1143 
1144 	if (conn->cipher_type == SMB2_ENCRYPTION_AES256_CCM ||
1145 	    conn->cipher_type == SMB2_ENCRYPTION_AES256_GCM)
1146 		rc = crypto_aead_setkey(tfm, key, SMB3_GCM256_CRYPTKEY_SIZE);
1147 	else
1148 		rc = crypto_aead_setkey(tfm, key, SMB3_GCM128_CRYPTKEY_SIZE);
1149 	if (rc) {
1150 		pr_err("Failed to set aead key %d\n", rc);
1151 		goto free_ctx;
1152 	}
1153 
1154 	rc = crypto_aead_setauthsize(tfm, SMB2_SIGNATURE_SIZE);
1155 	if (rc) {
1156 		pr_err("Failed to set authsize %d\n", rc);
1157 		goto free_ctx;
1158 	}
1159 
1160 	req = aead_request_alloc(tfm, GFP_KERNEL);
1161 	if (!req) {
1162 		rc = -ENOMEM;
1163 		goto free_ctx;
1164 	}
1165 
1166 	if (!enc) {
1167 		memcpy(sign, &tr_hdr->Signature, SMB2_SIGNATURE_SIZE);
1168 		crypt_len += SMB2_SIGNATURE_SIZE;
1169 	}
1170 
1171 	sg = ksmbd_init_sg(iov, nvec, sign);
1172 	if (!sg) {
1173 		pr_err("Failed to init sg\n");
1174 		rc = -ENOMEM;
1175 		goto free_req;
1176 	}
1177 
1178 	iv_len = crypto_aead_ivsize(tfm);
1179 	iv = kzalloc(iv_len, GFP_KERNEL);
1180 	if (!iv) {
1181 		rc = -ENOMEM;
1182 		goto free_sg;
1183 	}
1184 
1185 	if (conn->cipher_type == SMB2_ENCRYPTION_AES128_GCM ||
1186 	    conn->cipher_type == SMB2_ENCRYPTION_AES256_GCM) {
1187 		memcpy(iv, (char *)tr_hdr->Nonce, SMB3_AES_GCM_NONCE);
1188 	} else {
1189 		iv[0] = 3;
1190 		memcpy(iv + 1, (char *)tr_hdr->Nonce, SMB3_AES_CCM_NONCE);
1191 	}
1192 
1193 	aead_request_set_crypt(req, sg, sg, crypt_len, iv);
1194 	aead_request_set_ad(req, assoc_data_len);
1195 	aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_SLEEP, NULL, NULL);
1196 
1197 	if (enc)
1198 		rc = crypto_aead_encrypt(req);
1199 	else
1200 		rc = crypto_aead_decrypt(req);
1201 	if (rc)
1202 		goto free_iv;
1203 
1204 	if (enc)
1205 		memcpy(&tr_hdr->Signature, sign, SMB2_SIGNATURE_SIZE);
1206 
1207 free_iv:
1208 	kfree(iv);
1209 free_sg:
1210 	kfree(sg);
1211 free_req:
1212 	kfree(req);
1213 free_ctx:
1214 	ksmbd_release_crypto_ctx(ctx);
1215 	return rc;
1216 }
1217