Handle big endianness in NTLM (ntlmv2) authentication
authorSteve French <smfrench@us.ibm.com>
Tue, 25 Jun 2013 19:03:16 +0000 (14:03 -0500)
committerBen Hutchings <ben@decadent.org.uk>
Sat, 27 Jul 2013 04:34:20 +0000 (05:34 +0100)
commit0922d9a16733658dd91a1aa9e543d9e03a4f3aa2
tree3da9a0a24baa1a4e4d0443ddb0f3e7db262f07e9
parent2235df8b82f6333f2f1a4c6e0acf80f19f591b55
Handle big endianness in NTLM (ntlmv2) authentication

commit fdf96a907c1fbb93c633e2b7ede3b8df26d6a4c0 upstream.

This is RH bug 970891
Uppercasing of username during calculation of ntlmv2 hash fails
because UniStrupr function does not handle big endian wchars.

Also fix a comment in the same code to reflect its correct usage.

[To make it easier for stable (rather than require 2nd patch) fixed
this patch of Shirish's to remove endian warning generated
by sparse -- steve f.]

Reported-by: steve <sanpatr1@in.ibm.com>
Signed-off-by: Shirish Pargaonkar <shirishpargaonkar@gmail.com>
Reviewed-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Steve French <smfrench@gmail.com>
[bwh: Backported to 3.2: adjust context, indentation]
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
fs/cifs/cifs_unicode.h
fs/cifs/cifsencrypt.c