Loading fs/cifs/md5.c +4 −0 Original line number Diff line number Diff line Loading @@ -252,6 +252,7 @@ MD5Transform(__u32 buf[4], __u32 const in[16]) buf[3] += d; } #if 0 /* currently unused */ /*********************************************************************** the rfc 2104 version of hmac_md5 initialisation. ***********************************************************************/ Loading Loading @@ -289,6 +290,7 @@ hmac_md5_init_rfc2104(unsigned char *key, int key_len, MD5Init(&ctx->ctx); MD5Update(&ctx->ctx, ctx->k_ipad, 64); } #endif /*********************************************************************** the microsoft version of hmac_md5 initialisation. Loading Loading @@ -333,6 +335,7 @@ hmac_md5_update(const unsigned char *text, int text_len, /*********************************************************************** finish off hmac_md5 "inner" buffer and generate outer one. ***********************************************************************/ #if 0 /* currently unused */ void hmac_md5_final(unsigned char *digest, struct HMACMD5Context *ctx) { Loading Loading @@ -361,3 +364,4 @@ hmac_md5(unsigned char key[16], unsigned char *data, int data_len, } hmac_md5_final(digest, &ctx); } #endif fs/cifs/smbdes.c +1 −1 Original line number Diff line number Diff line Loading @@ -364,6 +364,7 @@ E_P24(unsigned char *p21, unsigned char *c8, unsigned char *p24) smbhash(p24 + 16, c8, p21 + 14, 1); } #if 0 /* currently unsued */ static void D_P16(unsigned char *p14, unsigned char *in, unsigned char *out) { Loading @@ -377,7 +378,6 @@ E_old_pw_hash(unsigned char *p14, unsigned char *in, unsigned char *out) smbhash(out, in, p14, 1); smbhash(out + 8, in + 8, p14 + 7, 1); } #if 0 /* these routines are currently unneeded, but may be needed later */ void Loading fs/cifs/smbencrypt.c +4 −0 Original line number Diff line number Diff line Loading @@ -141,6 +141,7 @@ E_md4hash(const unsigned char *passwd, unsigned char *p16) memset(wpwd,0,129 * 2); } #if 0 /* currently unused */ /* Does both the NT and LM owfs of a user's password */ static void nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16]) Loading Loading @@ -168,6 +169,7 @@ nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16]) /* clear out local copy of user's password (just being paranoid). */ memset(passwd, '\0', sizeof (passwd)); } #endif /* Does the NTLMv2 owfs of a user's password */ #if 0 /* function not needed yet - but will be soon */ Loading Loading @@ -220,6 +222,7 @@ SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8, } /* Does the des encryption from the FIRST 8 BYTES of the NT or LM MD4 hash. */ #if 0 /* currently unused */ static void NTLMSSPOWFencrypt(unsigned char passwd[8], unsigned char *ntlmchalresp, unsigned char p24[24]) Loading @@ -232,6 +235,7 @@ NTLMSSPOWFencrypt(unsigned char passwd[8], E_P24(p21, ntlmchalresp, p24); } #endif /* Does the NT MD4 hash then des encryption. */ Loading Loading
fs/cifs/md5.c +4 −0 Original line number Diff line number Diff line Loading @@ -252,6 +252,7 @@ MD5Transform(__u32 buf[4], __u32 const in[16]) buf[3] += d; } #if 0 /* currently unused */ /*********************************************************************** the rfc 2104 version of hmac_md5 initialisation. ***********************************************************************/ Loading Loading @@ -289,6 +290,7 @@ hmac_md5_init_rfc2104(unsigned char *key, int key_len, MD5Init(&ctx->ctx); MD5Update(&ctx->ctx, ctx->k_ipad, 64); } #endif /*********************************************************************** the microsoft version of hmac_md5 initialisation. Loading Loading @@ -333,6 +335,7 @@ hmac_md5_update(const unsigned char *text, int text_len, /*********************************************************************** finish off hmac_md5 "inner" buffer and generate outer one. ***********************************************************************/ #if 0 /* currently unused */ void hmac_md5_final(unsigned char *digest, struct HMACMD5Context *ctx) { Loading Loading @@ -361,3 +364,4 @@ hmac_md5(unsigned char key[16], unsigned char *data, int data_len, } hmac_md5_final(digest, &ctx); } #endif
fs/cifs/smbdes.c +1 −1 Original line number Diff line number Diff line Loading @@ -364,6 +364,7 @@ E_P24(unsigned char *p21, unsigned char *c8, unsigned char *p24) smbhash(p24 + 16, c8, p21 + 14, 1); } #if 0 /* currently unsued */ static void D_P16(unsigned char *p14, unsigned char *in, unsigned char *out) { Loading @@ -377,7 +378,6 @@ E_old_pw_hash(unsigned char *p14, unsigned char *in, unsigned char *out) smbhash(out, in, p14, 1); smbhash(out + 8, in + 8, p14 + 7, 1); } #if 0 /* these routines are currently unneeded, but may be needed later */ void Loading
fs/cifs/smbencrypt.c +4 −0 Original line number Diff line number Diff line Loading @@ -141,6 +141,7 @@ E_md4hash(const unsigned char *passwd, unsigned char *p16) memset(wpwd,0,129 * 2); } #if 0 /* currently unused */ /* Does both the NT and LM owfs of a user's password */ static void nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16]) Loading Loading @@ -168,6 +169,7 @@ nt_lm_owf_gen(char *pwd, unsigned char nt_p16[16], unsigned char p16[16]) /* clear out local copy of user's password (just being paranoid). */ memset(passwd, '\0', sizeof (passwd)); } #endif /* Does the NTLMv2 owfs of a user's password */ #if 0 /* function not needed yet - but will be soon */ Loading Loading @@ -220,6 +222,7 @@ SMBOWFencrypt(unsigned char passwd[16], unsigned char *c8, } /* Does the des encryption from the FIRST 8 BYTES of the NT or LM MD4 hash. */ #if 0 /* currently unused */ static void NTLMSSPOWFencrypt(unsigned char passwd[8], unsigned char *ntlmchalresp, unsigned char p24[24]) Loading @@ -232,6 +235,7 @@ NTLMSSPOWFencrypt(unsigned char passwd[8], E_P24(p21, ntlmchalresp, p24); } #endif /* Does the NT MD4 hash then des encryption. */ Loading