Home
last modified time | relevance | path

Searched refs:response (Results 1 – 14 of 14) sorted by relevance

/fs/cifs/
Dsmbdirect.c20 struct smbd_response *response);
25 struct smbd_connection *info, struct smbd_response *response);
28 struct smbd_response *response, int data_length);
34 struct smbd_response *response);
260 static inline void *smbd_response_payload(struct smbd_response *response) in smbd_response_payload() argument
262 return (void *)response->packet; in smbd_response_payload()
317 struct smbd_response *response, int packet_length) in process_negotiation_response() argument
319 struct smbd_connection *info = response->info; in process_negotiation_response()
320 struct smbd_negotiate_resp *packet = smbd_response_payload(response); in process_negotiation_response()
412 struct smbd_response *response; in smbd_post_send_credits() local
[all …]
Dcifsencrypt.c132 server->session_key.response, server->session_key.len); in cifs_calc_signature()
275 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); in setup_ntlm_response()
276 if (!ses->auth_key.response) in setup_ntlm_response()
282 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); in setup_ntlm_response()
296 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); in setup_ntlm_response()
375 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob()
376 if (!ses->auth_key.response) { in build_avpair_blob()
381 blobptr = ses->auth_key.response; in build_avpair_blob()
416 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name()
419 blobptr = ses->auth_key.response; in find_domain_name()
[all …]
Dsess.c326 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge()
328 if (!ses->auth_key.response) { in decode_ntlmssp_challenge()
441 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob()
637 ses->server->session_key.response = in sess_establish_session()
638 kmemdup(ses->auth_key.response, in sess_establish_session()
640 if (!ses->server->session_key.response) { in sess_establish_session()
835 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in sess_auth_ntlm()
838 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in sess_auth_ntlm()
904 kfree(ses->auth_key.response); in sess_auth_ntlm()
905 ses->auth_key.response = NULL; in sess_auth_ntlm()
[all …]
Dsmb2transport.c193 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in smb2_calc_signature()
254 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key()
359 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
Dioctl.c290 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
Dconnect.c580 kfree(server->session_key.response); in cifs_reconnect()
581 server->session_key.response = NULL; in cifs_reconnect()
2742 kfree(server->session_key.response); in cifs_put_tcp_session()
2743 server->session_key.response = NULL; in cifs_put_tcp_session()
5240 if (ses->auth_key.response) { in cifs_setup_session()
5242 ses->auth_key.response); in cifs_setup_session()
5243 kfree(ses->auth_key.response); in cifs_setup_session()
5244 ses->auth_key.response = NULL; in cifs_setup_session()
Dmisc.c105 kzfree(buf_to_free->auth_key.response); in sesInfoFree()
Dcifsglob.h134 char *response; member
Dsmb2pdu.c1358 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos()
1360 if (!ses->auth_key.response) { in SMB2_auth_kerberos()
/fs/notify/fanotify/
Dfanotify_user.c147 unsigned int response) in finish_permission_event() argument
153 event->response = response; in finish_permission_event()
168 int response = response_struct->response; in process_access_response() local
171 fd, response); in process_access_response()
177 switch (response & ~FAN_AUDIT) { in process_access_response()
188 if ((response & FAN_AUDIT) && !FAN_GROUP_FLAG(group, FAN_ENABLE_AUDIT)) in process_access_response()
198 finish_permission_event(group, event, response); in process_access_response()
416 struct fanotify_response response = { .fd = -1, .response = -1 }; in fanotify_write() local
425 if (count > sizeof(response)) in fanotify_write()
426 count = sizeof(response); in fanotify_write()
[all …]
Dfanotify.c120 switch (event->response & ~FAN_AUDIT) { in fanotify_get_response()
130 if (event->response & FAN_AUDIT) in fanotify_get_response()
131 audit_fanotify(event->response & ~FAN_AUDIT); in fanotify_get_response()
315 pevent->response = 0; in fanotify_alloc_event()
Dfanotify.h120 unsigned short response; /* userspace answer to the event */ member
/fs/ocfs2/dlm/
Ddlmdomain.c776 union dlm_query_join_response response; in dlm_query_join_packet_to_wire() local
778 response.packet = *packet; in dlm_query_join_packet_to_wire()
779 *wire = be32_to_cpu(response.intval); in dlm_query_join_packet_to_wire()
785 union dlm_query_join_response response; in dlm_query_join_wire_to_packet() local
787 response.intval = cpu_to_be32(wire); in dlm_query_join_wire_to_packet()
788 *packet = response.packet; in dlm_query_join_wire_to_packet()
799 u32 response; in dlm_query_join_handler() local
907 dlm_query_join_packet_to_wire(&packet, &response); in dlm_query_join_handler()
908 return response; in dlm_query_join_handler()
1416 enum dlm_query_join_response_code *response) in dlm_request_join() argument
[all …]
Ddlmmaster.c1313 int ret, response=0, resend; in dlm_do_master_request() local
1325 sizeof(request), to, &response); in dlm_do_master_request()
1355 switch (response) { in dlm_do_master_request()
1376 response = 0; in dlm_do_master_request()
1379 mlog(ML_ERROR, "bad response! %u\n", response); in dlm_do_master_request()
1405 u8 response = DLM_MASTER_RESP_MAYBE; in dlm_master_request_handler() local
1421 response = DLM_MASTER_RESP_NO; in dlm_master_request_handler()
1430 response = DLM_IVBUFLEN; in dlm_master_request_handler()
1459 response = DLM_MASTER_RESP_ERROR; in dlm_master_request_handler()
1468 response = DLM_MASTER_RESP_YES; in dlm_master_request_handler()
[all …]