/fs/cifs/ |
D | smbdirect.c | 20 struct smbd_response *response); 25 struct smbd_connection *info, struct smbd_response *response); 28 struct smbd_response *response, int data_length); 34 struct smbd_response *response); 261 static inline void *smbd_response_payload(struct smbd_response *response) in smbd_response_payload() argument 263 return (void *)response->packet; in smbd_response_payload() 312 struct smbd_response *response, int packet_length) in process_negotiation_response() argument 314 struct smbd_connection *info = response->info; in process_negotiation_response() 315 struct smbd_negotiate_resp *packet = smbd_response_payload(response); in process_negotiation_response() 386 struct smbd_response *response; in smbd_post_send_credits() local [all …]
|
D | cifsencrypt.c | 119 server->session_key.response, server->session_key.len); in cifs_calc_signature() 281 ses->auth_key.response = kzalloc(ses->auth_key.len, GFP_KERNEL); in build_avpair_blob() 282 if (!ses->auth_key.response) { in build_avpair_blob() 287 blobptr = ses->auth_key.response; in build_avpair_blob() 322 if (!ses->auth_key.len || !ses->auth_key.response) in find_domain_name() 325 blobptr = ses->auth_key.response; in find_domain_name() 375 if (!ses->auth_key.len || !ses->auth_key.response) in find_timestamp() 378 blobptr = ses->auth_key.response; in find_timestamp() 511 (ses->auth_key.response + CIFS_SESS_KEY_SIZE); in CalcNTLMv2_response() 604 tiblob = ses->auth_key.response; in setup_ntlmv2_rsp() [all …]
|
D | sess.c | 618 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen, in decode_ntlmssp_challenge() 620 if (!ses->auth_key.response) { in decode_ntlmssp_challenge() 734 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in build_ntlmssp_auth_blob() 917 ses->server->session_key.response = in sess_establish_session() 918 kmemdup(ses->auth_key.response, in sess_establish_session() 920 if (!ses->server->session_key.response) { in sess_establish_session() 997 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE, in sess_auth_ntlmv2() 1067 kfree(ses->auth_key.response); in sess_auth_ntlmv2() 1068 ses->auth_key.response = NULL; in sess_auth_ntlmv2() 1115 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in sess_auth_kerberos() [all …]
|
D | ioctl.c | 290 if (copy_to_user(end, ses->auth_key.response, out.session_key_length)) { in cifs_dump_full_key() 445 memcpy(pkey_inf.auth_key, tcon->ses->auth_key.response, in cifs_ioctl()
|
D | smb2transport.c | 245 rc = crypto_shash_setkey(hash, ses->auth_key.response, in smb2_calc_signature() 315 ses->auth_key.response, SMB2_NTLMV2_SESSKEY_SIZE); in generate_key() 453 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in generate_smb3signingkey()
|
D | connect.c | 215 kfree(server->session_key.response); in cifs_mark_tcp_ses_conns_for_reconnect() 216 server->session_key.response = NULL; in cifs_mark_tcp_ses_conns_for_reconnect() 1391 kfree(server->session_key.response); in cifs_put_tcp_session() 1392 server->session_key.response = NULL; in cifs_put_tcp_session() 3817 if (ses->auth_key.response) { in cifs_setup_session() 3819 ses->auth_key.response); in cifs_setup_session() 3820 kfree(ses->auth_key.response); in cifs_setup_session() 3821 ses->auth_key.response = NULL; in cifs_setup_session()
|
D | misc.c | 98 kfree_sensitive(buf_to_free->auth_key.response); in sesInfoFree()
|
D | smb2pdu.c | 1421 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len, in SMB2_auth_kerberos() 1423 if (!ses->auth_key.response) { in SMB2_auth_kerberos() 1616 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate() 1618 SMB3_SIGN_KEY_SIZE, ses->auth_key.response); in SMB2_sess_auth_rawntlmssp_authenticate()
|
D | cifsglob.h | 127 char *response; member
|
/fs/notify/fanotify/ |
D | fanotify_user.c | 259 unsigned int response) in finish_permission_event() argument 265 event->response = response; in finish_permission_event() 280 int response = response_struct->response; in process_access_response() local 283 fd, response); in process_access_response() 289 switch (response & ~FAN_AUDIT) { in process_access_response() 300 if ((response & FAN_AUDIT) && !FAN_GROUP_FLAG(group, FAN_ENABLE_AUDIT)) in process_access_response() 310 finish_permission_event(group, event, response); in process_access_response() 740 struct fanotify_response response = { .fd = -1, .response = -1 }; in fanotify_write() local 749 if (count < sizeof(response)) in fanotify_write() 752 count = sizeof(response); in fanotify_write() [all …]
|
D | fanotify.c | 229 switch (event->response & ~FAN_AUDIT) { in fanotify_get_response() 239 if (event->response & FAN_AUDIT) in fanotify_get_response() 240 audit_fanotify(event->response & ~FAN_AUDIT); in fanotify_get_response() 489 pevent->response = 0; in fanotify_alloc_perm_event()
|
D | fanotify.h | 268 unsigned short response; /* userspace answer to the event */ member
|
/fs/ocfs2/dlm/ |
D | dlmdomain.c | 774 union dlm_query_join_response response; in dlm_query_join_packet_to_wire() local 776 response.packet = *packet; in dlm_query_join_packet_to_wire() 777 *wire = be32_to_cpu(response.intval); in dlm_query_join_packet_to_wire() 783 union dlm_query_join_response response; in dlm_query_join_wire_to_packet() local 785 response.intval = cpu_to_be32(wire); in dlm_query_join_wire_to_packet() 786 *packet = response.packet; in dlm_query_join_wire_to_packet() 797 u32 response; in dlm_query_join_handler() local 905 dlm_query_join_packet_to_wire(&packet, &response); in dlm_query_join_handler() 906 return response; in dlm_query_join_handler() 1414 enum dlm_query_join_response_code *response) in dlm_request_join() argument [all …]
|
D | dlmmaster.c | 1311 int ret, response=0, resend; in dlm_do_master_request() local 1323 sizeof(request), to, &response); in dlm_do_master_request() 1353 switch (response) { in dlm_do_master_request() 1374 response = 0; in dlm_do_master_request() 1377 mlog(ML_ERROR, "bad response! %u\n", response); in dlm_do_master_request() 1403 u8 response = DLM_MASTER_RESP_MAYBE; in dlm_master_request_handler() local 1419 response = DLM_MASTER_RESP_NO; in dlm_master_request_handler() 1428 response = DLM_IVBUFLEN; in dlm_master_request_handler() 1457 response = DLM_MASTER_RESP_ERROR; in dlm_master_request_handler() 1466 response = DLM_MASTER_RESP_YES; in dlm_master_request_handler() [all …]
|
/fs/ksmbd/ |
D | transport_ipc.c | 67 void *response; member 260 entry->response = NULL; in handle_response() 270 entry->response = kvzalloc(sz, GFP_KERNEL); in handle_response() 271 if (!entry->response) { in handle_response() 276 memcpy(entry->response, payload, sz); in handle_response() 464 entry.response = NULL; in ipc_msg_send_request() 477 entry.response != NULL, in ipc_msg_send_request() 483 return entry.response; in ipc_msg_send_request()
|