/fs/cifs/ |
D | smbdirect.c | 20 struct smbd_response *response); 25 struct smbd_connection *info, struct smbd_response *response); 28 struct smbd_response *response, int data_length); 34 struct smbd_response *response); 260 static inline void *smbd_response_payload(struct smbd_response *response) in smbd_response_payload() argument 262 return (void *)response->packet; in smbd_response_payload() 317 struct smbd_response *response, int packet_length) in process_negotiation_response() argument 319 struct smbd_connection *info = response->info; in process_negotiation_response() 320 struct smbd_negotiate_resp *packet = smbd_response_payload(response); in process_negotiation_response() 412 struct smbd_response *response; in smbd_post_send_credits() local [all …]
|
D | cifsencrypt.c | 132 server->session_key.response, server->session_key.len); in cifs_calc_signature() 275 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); in setup_ntlm_response() 276 if (!ses->auth_key.response) in setup_ntlm_response() 282 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); in setup_ntlm_response() 296 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); in setup_ntlm_response() 375 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 376 if (!ses->auth_key.response) { in build_avpair_blob() 381 blobptr = ses->auth_key.response; in build_avpair_blob() 416 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name() 419 blobptr = ses->auth_key.response; in find_domain_name() [all …]
|
D | sess.c | 326 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge() 328 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 441 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob() 637 ses->server->session_key.response = in sess_establish_session() 638 kmemdup(ses->auth_key.response, in sess_establish_session() 640 if (!ses->server->session_key.response) { in sess_establish_session() 835 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in sess_auth_ntlm() 838 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in sess_auth_ntlm() 904 kfree(ses->auth_key.response); in sess_auth_ntlm() 905 ses->auth_key.response = NULL; in sess_auth_ntlm() [all …]
|
D | smb2transport.c | 193 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in smb2_calc_signature() 254 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key() 359 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
|
D | ioctl.c | 290 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
|
D | connect.c | 580 kfree(server->session_key.response); in cifs_reconnect() 581 server->session_key.response = NULL; in cifs_reconnect() 2742 kfree(server->session_key.response); in cifs_put_tcp_session() 2743 server->session_key.response = NULL; in cifs_put_tcp_session() 5240 if (ses->auth_key.response) { in cifs_setup_session() 5242 ses->auth_key.response); in cifs_setup_session() 5243 kfree(ses->auth_key.response); in cifs_setup_session() 5244 ses->auth_key.response = NULL; in cifs_setup_session()
|
D | misc.c | 105 kzfree(buf_to_free->auth_key.response); in sesInfoFree()
|
D | cifsglob.h | 134 char *response; member
|
D | smb2pdu.c | 1358 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos() 1360 if (!ses->auth_key.response) { in SMB2_auth_kerberos()
|
/fs/notify/fanotify/ |
D | fanotify_user.c | 147 unsigned int response) in finish_permission_event() argument 153 event->response = response; in finish_permission_event() 168 int response = response_struct->response; in process_access_response() local 171 fd, response); in process_access_response() 177 switch (response & ~FAN_AUDIT) { in process_access_response() 188 if ((response & FAN_AUDIT) && !FAN_GROUP_FLAG(group, FAN_ENABLE_AUDIT)) in process_access_response() 198 finish_permission_event(group, event, response); in process_access_response() 416 struct fanotify_response response = { .fd = -1, .response = -1 }; in fanotify_write() local 425 if (count > sizeof(response)) in fanotify_write() 426 count = sizeof(response); in fanotify_write() [all …]
|
D | fanotify.c | 120 switch (event->response & ~FAN_AUDIT) { in fanotify_get_response() 130 if (event->response & FAN_AUDIT) in fanotify_get_response() 131 audit_fanotify(event->response & ~FAN_AUDIT); in fanotify_get_response() 315 pevent->response = 0; in fanotify_alloc_event()
|
D | fanotify.h | 120 unsigned short response; /* userspace answer to the event */ member
|
/fs/ocfs2/dlm/ |
D | dlmdomain.c | 776 union dlm_query_join_response response; in dlm_query_join_packet_to_wire() local 778 response.packet = *packet; in dlm_query_join_packet_to_wire() 779 *wire = be32_to_cpu(response.intval); in dlm_query_join_packet_to_wire() 785 union dlm_query_join_response response; in dlm_query_join_wire_to_packet() local 787 response.intval = cpu_to_be32(wire); in dlm_query_join_wire_to_packet() 788 *packet = response.packet; in dlm_query_join_wire_to_packet() 799 u32 response; in dlm_query_join_handler() local 907 dlm_query_join_packet_to_wire(&packet, &response); in dlm_query_join_handler() 908 return response; in dlm_query_join_handler() 1416 enum dlm_query_join_response_code *response) in dlm_request_join() argument [all …]
|
D | dlmmaster.c | 1313 int ret, response=0, resend; in dlm_do_master_request() local 1325 sizeof(request), to, &response); in dlm_do_master_request() 1355 switch (response) { in dlm_do_master_request() 1376 response = 0; in dlm_do_master_request() 1379 mlog(ML_ERROR, "bad response! %u\n", response); in dlm_do_master_request() 1405 u8 response = DLM_MASTER_RESP_MAYBE; in dlm_master_request_handler() local 1421 response = DLM_MASTER_RESP_NO; in dlm_master_request_handler() 1430 response = DLM_IVBUFLEN; in dlm_master_request_handler() 1459 response = DLM_MASTER_RESP_ERROR; in dlm_master_request_handler() 1468 response = DLM_MASTER_RESP_YES; in dlm_master_request_handler() [all …]
|