Home
last modified time | relevance | path

Searched refs:response (Results 1 – 10 of 10) sorted by relevance

/fs/cifs/
Dcifsencrypt.c61 server->session_key.response, server->session_key.len); in cifs_calc_signature()
216 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); in setup_ntlm_response()
217 if (!ses->auth_key.response) { in setup_ntlm_response()
224 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); in setup_ntlm_response()
237 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); in setup_ntlm_response()
313 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob()
314 if (!ses->auth_key.response) { in build_avpair_blob()
320 blobptr = ses->auth_key.response; in build_avpair_blob()
355 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name()
358 blobptr = ses->auth_key.response; in find_domain_name()
[all …]
Dsess.c402 ses->auth_key.response = kmalloc(tilen, GFP_KERNEL); in decode_ntlmssp_challenge()
403 if (!ses->auth_key.response) { in decode_ntlmssp_challenge()
407 memcpy(ses->auth_key.response, bcc_ptr + tioffset, tilen); in decode_ntlmssp_challenge()
492 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob()
696 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in CIFS_SessSetup()
699 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in CIFS_SessSetup()
724 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in CIFS_SessSetup()
764 ses->auth_key.response = kmalloc(msg->sesskey_len, GFP_KERNEL); in CIFS_SessSetup()
765 if (!ses->auth_key.response) { in CIFS_SessSetup()
771 memcpy(ses->auth_key.response, msg->data, msg->sesskey_len); in CIFS_SessSetup()
Dconnect.c336 kfree(server->session_key.response); in cifs_reconnect()
337 server->session_key.response = NULL; in cifs_reconnect()
2129 kfree(server->session_key.response); in cifs_put_tcp_session()
2130 server->session_key.response = NULL; in cifs_put_tcp_session()
4096 server->session_key.response = ses->auth_key.response; in cifs_setup_session()
4100 ses->auth_key.response = NULL; in cifs_setup_session()
4111 kfree(ses->auth_key.response); in cifs_setup_session()
4112 ses->auth_key.response = NULL; in cifs_setup_session()
DCHANGES317 over GigE is better. Do not hang thread on illegal byte range lock response
374 Cleanup response processing so cifsd can not loop when abnormally
381 transact response for an SMB request and search entry split across two frames.
393 Reduce the number of large buffer allocations in cifs response processing
440 waiting on an SMB response) in SendReceive when session dies but
648 protocol response. Fix oops in reopen_file when dentry freed. Allow
749 code (distributed caching) to properly send response to oplock
Dcifsglob.h112 char *response; member
DREADME524 send an SMB flush request (and wait for a response) on every
/fs/notify/fanotify/
Dfanotify_user.c164 __u32 response = response_struct->response; in process_access_response() local
167 fd, response); in process_access_response()
173 switch (response) { in process_access_response()
188 re->event->response = response; in process_access_response()
218 event->response = FAN_ALLOW; in prepare_for_access_response()
296 event->response = FAN_DENY; in copy_event_to_user()
374 struct fanotify_response response = { .fd = -1, .response = -1 }; in fanotify_write() local
380 if (count > sizeof(response)) in fanotify_write()
381 count = sizeof(response); in fanotify_write()
385 if (copy_from_user(&response, buf, count)) in fanotify_write()
[all …]
Dfanotify.c102 wait_event(group->fanotify_data.access_waitq, event->response || in fanotify_get_response_from_access()
105 if (!event->response) /* bypass_perm set */ in fanotify_get_response_from_access()
110 switch (event->response) { in fanotify_get_response_from_access()
118 event->response = 0; in fanotify_get_response_from_access()
/fs/ocfs2/dlm/
Ddlmdomain.c818 union dlm_query_join_response response; in dlm_query_join_packet_to_wire() local
820 response.packet = *packet; in dlm_query_join_packet_to_wire()
821 *wire = cpu_to_be32(response.intval); in dlm_query_join_packet_to_wire()
827 union dlm_query_join_response response; in dlm_query_join_wire_to_packet() local
829 response.intval = cpu_to_be32(wire); in dlm_query_join_wire_to_packet()
830 *packet = response.packet; in dlm_query_join_wire_to_packet()
841 u32 response; in dlm_query_join_handler() local
949 dlm_query_join_packet_to_wire(&packet, &response); in dlm_query_join_handler()
950 return response; in dlm_query_join_handler()
1453 enum dlm_query_join_response_code *response) in dlm_request_join() argument
[all …]
Ddlmmaster.c1297 int ret, response=0, resend; in dlm_do_master_request() local
1309 sizeof(request), to, &response); in dlm_do_master_request()
1339 switch (response) { in dlm_do_master_request()
1360 response = 0; in dlm_do_master_request()
1363 mlog(ML_ERROR, "bad response! %u\n", response); in dlm_do_master_request()
1389 u8 response = DLM_MASTER_RESP_MAYBE; in dlm_master_request_handler() local
1404 response = DLM_MASTER_RESP_NO; in dlm_master_request_handler()
1413 response = DLM_IVBUFLEN; in dlm_master_request_handler()
1430 response = DLM_MASTER_RESP_ERROR; in dlm_master_request_handler()
1439 response = DLM_MASTER_RESP_YES; in dlm_master_request_handler()
[all …]