Searched refs:response (Results 1 – 10 of 10) sorted by relevance
/fs/cifs/ |
D | cifsencrypt.c | 61 server->session_key.response, server->session_key.len); in cifs_calc_signature() 216 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); in setup_ntlm_response() 217 if (!ses->auth_key.response) { in setup_ntlm_response() 224 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); in setup_ntlm_response() 237 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); in setup_ntlm_response() 313 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 314 if (!ses->auth_key.response) { in build_avpair_blob() 320 blobptr = ses->auth_key.response; in build_avpair_blob() 355 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name() 358 blobptr = ses->auth_key.response; in find_domain_name() [all …]
|
D | sess.c | 402 ses->auth_key.response = kmalloc(tilen, GFP_KERNEL); in decode_ntlmssp_challenge() 403 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 407 memcpy(ses->auth_key.response, bcc_ptr + tioffset, tilen); in decode_ntlmssp_challenge() 492 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob() 696 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in CIFS_SessSetup() 699 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in CIFS_SessSetup() 724 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in CIFS_SessSetup() 764 ses->auth_key.response = kmalloc(msg->sesskey_len, GFP_KERNEL); in CIFS_SessSetup() 765 if (!ses->auth_key.response) { in CIFS_SessSetup() 771 memcpy(ses->auth_key.response, msg->data, msg->sesskey_len); in CIFS_SessSetup()
|
D | connect.c | 336 kfree(server->session_key.response); in cifs_reconnect() 337 server->session_key.response = NULL; in cifs_reconnect() 2129 kfree(server->session_key.response); in cifs_put_tcp_session() 2130 server->session_key.response = NULL; in cifs_put_tcp_session() 4096 server->session_key.response = ses->auth_key.response; in cifs_setup_session() 4100 ses->auth_key.response = NULL; in cifs_setup_session() 4111 kfree(ses->auth_key.response); in cifs_setup_session() 4112 ses->auth_key.response = NULL; in cifs_setup_session()
|
D | CHANGES | 317 over GigE is better. Do not hang thread on illegal byte range lock response 374 Cleanup response processing so cifsd can not loop when abnormally 381 transact response for an SMB request and search entry split across two frames. 393 Reduce the number of large buffer allocations in cifs response processing 440 waiting on an SMB response) in SendReceive when session dies but 648 protocol response. Fix oops in reopen_file when dentry freed. Allow 749 code (distributed caching) to properly send response to oplock
|
D | cifsglob.h | 112 char *response; member
|
D | README | 524 send an SMB flush request (and wait for a response) on every
|
/fs/notify/fanotify/ |
D | fanotify_user.c | 164 __u32 response = response_struct->response; in process_access_response() local 167 fd, response); in process_access_response() 173 switch (response) { in process_access_response() 188 re->event->response = response; in process_access_response() 218 event->response = FAN_ALLOW; in prepare_for_access_response() 296 event->response = FAN_DENY; in copy_event_to_user() 374 struct fanotify_response response = { .fd = -1, .response = -1 }; in fanotify_write() local 380 if (count > sizeof(response)) in fanotify_write() 381 count = sizeof(response); in fanotify_write() 385 if (copy_from_user(&response, buf, count)) in fanotify_write() [all …]
|
D | fanotify.c | 102 wait_event(group->fanotify_data.access_waitq, event->response || in fanotify_get_response_from_access() 105 if (!event->response) /* bypass_perm set */ in fanotify_get_response_from_access() 110 switch (event->response) { in fanotify_get_response_from_access() 118 event->response = 0; in fanotify_get_response_from_access()
|
/fs/ocfs2/dlm/ |
D | dlmdomain.c | 818 union dlm_query_join_response response; in dlm_query_join_packet_to_wire() local 820 response.packet = *packet; in dlm_query_join_packet_to_wire() 821 *wire = cpu_to_be32(response.intval); in dlm_query_join_packet_to_wire() 827 union dlm_query_join_response response; in dlm_query_join_wire_to_packet() local 829 response.intval = cpu_to_be32(wire); in dlm_query_join_wire_to_packet() 830 *packet = response.packet; in dlm_query_join_wire_to_packet() 841 u32 response; in dlm_query_join_handler() local 949 dlm_query_join_packet_to_wire(&packet, &response); in dlm_query_join_handler() 950 return response; in dlm_query_join_handler() 1453 enum dlm_query_join_response_code *response) in dlm_request_join() argument [all …]
|
D | dlmmaster.c | 1297 int ret, response=0, resend; in dlm_do_master_request() local 1309 sizeof(request), to, &response); in dlm_do_master_request() 1339 switch (response) { in dlm_do_master_request() 1360 response = 0; in dlm_do_master_request() 1363 mlog(ML_ERROR, "bad response! %u\n", response); in dlm_do_master_request() 1389 u8 response = DLM_MASTER_RESP_MAYBE; in dlm_master_request_handler() local 1404 response = DLM_MASTER_RESP_NO; in dlm_master_request_handler() 1413 response = DLM_IVBUFLEN; in dlm_master_request_handler() 1430 response = DLM_MASTER_RESP_ERROR; in dlm_master_request_handler() 1439 response = DLM_MASTER_RESP_YES; in dlm_master_request_handler() [all …]
|