diff options
-rw-r--r-- | fs/cifs/connect.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c index 465ecad6d7cc..5c7f8450dbe0 100644 --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c | |||
@@ -2927,7 +2927,7 @@ CIFSTCon(unsigned int xid, struct cifsSesInfo *ses, | |||
2927 | bcc_ptr++; /* skip password */ | 2927 | bcc_ptr++; /* skip password */ |
2928 | /* already aligned so no need to do it below */ | 2928 | /* already aligned so no need to do it below */ |
2929 | } else { | 2929 | } else { |
2930 | pSMB->PasswordLength = cpu_to_le16(CIFS_SESS_KEY_SIZE); | 2930 | pSMB->PasswordLength = cpu_to_le16(CIFS_AUTH_RESP_SIZE); |
2931 | /* BB FIXME add code to fail this if NTLMv2 or Kerberos | 2931 | /* BB FIXME add code to fail this if NTLMv2 or Kerberos |
2932 | specified as required (when that support is added to | 2932 | specified as required (when that support is added to |
2933 | the vfs in the future) as only NTLM or the much | 2933 | the vfs in the future) as only NTLM or the much |
@@ -2945,7 +2945,7 @@ CIFSTCon(unsigned int xid, struct cifsSesInfo *ses, | |||
2945 | #endif /* CIFS_WEAK_PW_HASH */ | 2945 | #endif /* CIFS_WEAK_PW_HASH */ |
2946 | SMBNTencrypt(tcon->password, ses->server->cryptkey, bcc_ptr); | 2946 | SMBNTencrypt(tcon->password, ses->server->cryptkey, bcc_ptr); |
2947 | 2947 | ||
2948 | bcc_ptr += CIFS_SESS_KEY_SIZE; | 2948 | bcc_ptr += CIFS_AUTH_RESP_SIZE; |
2949 | if (ses->capabilities & CAP_UNICODE) { | 2949 | if (ses->capabilities & CAP_UNICODE) { |
2950 | /* must align unicode strings */ | 2950 | /* must align unicode strings */ |
2951 | *bcc_ptr = 0; /* null byte password */ | 2951 | *bcc_ptr = 0; /* null byte password */ |