Home
last modified time | relevance | path

Searched refs:sign (Results 1 – 25 of 28) sorted by relevance

12

/fs/ksmbd/
Dauth.c1031 u8 *sign) in ksmbd_init_sg() argument
1097 smb2_sg_set_buf(&sg[sg_idx], sign, SMB2_SIGNATURE_SIZE); in ksmbd_init_sg()
1110 u8 sign[SMB2_SIGNATURE_SIZE] = {}; in ksmbd_crypt_message() local
1167 memcpy(sign, &tr_hdr->Signature, SMB2_SIGNATURE_SIZE); in ksmbd_crypt_message()
1171 sg = ksmbd_init_sg(iov, nvec, sign); in ksmbd_crypt_message()
1205 memcpy(&tr_hdr->Signature, sign, SMB2_SIGNATURE_SIZE); in ksmbd_crypt_message()
Dconnection.h83 bool sign; member
Dserver.c238 (work->sess->sign || smb3_11_final_sess_setup_resp(work) || in __handle_ksmbd_work()
Dsmb2pdu.c1250 conn->sign = true; in smb2_handle_negotiate()
1254 conn->sign = true; in smb2_handle_negotiate()
1535 (conn->sign || server_conf.enforced_signing)) || in ntlm_authenticate()
1537 sess->sign = true; in ntlm_authenticate()
1554 sess->sign = false; in ntlm_authenticate()
1622 if ((conn->sign || server_conf.enforced_signing) || in krb5_authenticate()
1624 sess->sign = true; in krb5_authenticate()
1636 sess->sign = false; in krb5_authenticate()
/fs/btrfs/
Dqgroup.c1329 struct btrfs_qgroup *src, int sign) in __qgroup_excl_accounting() argument
1342 qgroup->rfer += sign * num_bytes; in __qgroup_excl_accounting()
1343 qgroup->rfer_cmpr += sign * num_bytes; in __qgroup_excl_accounting()
1345 WARN_ON(sign < 0 && qgroup->excl < num_bytes); in __qgroup_excl_accounting()
1346 qgroup->excl += sign * num_bytes; in __qgroup_excl_accounting()
1347 qgroup->excl_cmpr += sign * num_bytes; in __qgroup_excl_accounting()
1349 if (sign > 0) in __qgroup_excl_accounting()
1368 qgroup->rfer += sign * num_bytes; in __qgroup_excl_accounting()
1369 qgroup->rfer_cmpr += sign * num_bytes; in __qgroup_excl_accounting()
1370 WARN_ON(sign < 0 && qgroup->excl < num_bytes); in __qgroup_excl_accounting()
[all …]
DMakefile18 subdir-ccflags-y += -Wno-sign-compare
/fs/cifs/
Dfs_context.c204 ctx->sign = false; in cifs_parse_security_flavors()
211 ctx->sign = true; in cifs_parse_security_flavors()
217 ctx->sign = true; in cifs_parse_security_flavors()
223 ctx->sign = true; in cifs_parse_security_flavors()
1385 ctx->sign = true; in smb3_fs_context_parse_param()
1388 ctx->sign = true; in smb3_fs_context_parse_param()
Dsess.c229 ctx.sign = ses->sign; in cifs_ses_add_channel()
351 if (ses->server->sign) in cifs_ssetup_hdr()
650 if (server->sign) in build_ntlmssp_negotiate_blob()
718 if (ses->server->sign) in build_ntlmssp_auth_blob()
916 if (ses->server->sign) { in sess_establish_session()
Dfs_context.h184 bool sign; /* was signing requested via mnt opts? */ member
Dsmb2pdu.c136 if (server && server->sign && !smb3_encryption_required(tcon)) in smb2_hdr_assemble()
900 if (ses->sign) in SMB2_negotiate()
1048 rc = cifs_enable_signing(server, ses->sign); in SMB2_negotiate()
1116 if (tcon->ses->sign) in smb3_validate_negotiate()
1286 if (server->sign) in SMB2_sess_alloc_buffer()
1694 if ((ses->session_flags & SMB2_SESSION_FLAG_IS_GUEST) && (ses->sign)) in SMB2_sess_setup()
1736 else if (server->sign) in SMB2_logoff()
3962 if (server->rdma && rdata && !server->sign && in smb2_new_read_req()
4051 if (server->sign && !mid->decrypted) { in smb2_readv_callback()
4066 if (server->sign && rdata->got_bytes) in smb2_readv_callback()
[all …]
Dconnect.c1270 if (ctx->sign && !server->sign) in match_security()
2041 ses->sign = ctx->sign; in cifs_get_smb_ses()
3666 if (ses->server->sign) in CIFSTCon()
3889 ctx->sign = master_tcon->ses->sign; in cifs_construct_tcon()
Dcifs_debug.c358 if (server->sign) in cifs_debug_data_proc_show()
411 if (ses->sign) in cifs_debug_data_proc_show()
Dtransport.c784 if (server->sign) in cifs_setup_async_request()
961 if (server->sign) { in cifs_check_receive()
Dcifsglob.h609 bool sign; /* is signing enabled on this connection? */ member
931 bool sign; /* is signing required? */ member
Dcifssmb.c443 server->sign = true; in cifs_enable_signing()
452 server->sign = true; in cifs_enable_signing()
455 if (cifs_rdma_enabled(server) && server->sign) in cifs_enable_signing()
577 rc = cifs_enable_signing(server, ses->sign); in CIFSSMBNegotiate()
710 if (ses->server->sign) in CIFSSMBLogoff()
1527 if (server->sign) { in cifs_readv_callback()
1543 if (server->sign && rdata->got_bytes) in cifs_readv_callback()
4786 if (ses->server->sign) in CIFSGetDFSRefer()
Dsmb2transport.c794 if (len > 24 && server->sign && !mid->decrypted) { in smb2_check_receive()
Dsmb2ops.c428 if (server->sign) in smb3_negotiate_wsize()
476 if (server->sign) in smb3_negotiate_rsize()
4537 u8 sign[SMB2_SIGNATURE_SIZE] = {}; in crypt_message() local
4579 creq = smb2_get_aead_req(tfm, rqst, num_rqst, sign, &iv, &req, &sg); in crypt_message()
4584 memcpy(sign, &tr_hdr->Signature, SMB2_SIGNATURE_SIZE); in crypt_message()
4607 memcpy(&tr_hdr->Signature, sign, SMB2_SIGNATURE_SIZE); in crypt_message()
Dmisc.c273 if (treeCon->ses->server->sign) in header_assemble()
/fs/ntfs3/
Dfslog.c1150 if (page_buf->rhdr.sign != NTFS_FFFF_SIGNATURE) in read_log_page()
1156 bBAAD = page_buf->rhdr.sign == NTFS_BAAD_SIGNATURE; in read_log_page()
1210 if (r_page->rhdr.sign == NTFS_RCRD_SIGNATURE) { in log_read_rst()
1215 brst = r_page->rhdr.sign == NTFS_RSTR_SIGNATURE; in log_read_rst()
1216 bchk = r_page->rhdr.sign == NTFS_CHKD_SIGNATURE; in log_read_rst()
1219 if (r_page->rhdr.sign != NTFS_FFFF_SIGNATURE) { in log_read_rst()
1262 if (r_page->rhdr.sign == NTFS_CHKD_SIGNATURE) { in log_read_rst()
1556 if (rhdr->sign == NTFS_FFFF_SIGNATURE || !rhdr->sign) in check_subseq_log_page()
1629 usa_error || second_tail->rhdr.sign != NTFS_RCRD_SIGNATURE) { in last_log_lsn()
1641 usa_error || first_tail->rhdr.sign != NTFS_RCRD_SIGNATURE) { in last_log_lsn()
[all …]
Dntfs.h252 enum NTFS_SIGNATURE sign; // 0x00: member
262 return hdr->sign == NTFS_BAAD_SIGNATURE; in is_baad()
Drecord.c376 } else if (rec->rhdr.sign == NTFS_FILE_SIGNATURE) { in mi_format_new()
Dindex.c641 rhdr->sign != NTFS_INDX_SIGNATURE || in index_buf_check()
965 index->rhdr.sign = NTFS_INDX_SIGNATURE; in indx_new()
/fs/nfsd/
Dnfsctl.c568 char *vers, *minorp, sign; in __write_versions() local
591 sign = *vers; in __write_versions()
592 if (sign == '+' || sign == '-') in __write_versions()
603 cmd = sign == '-' ? NFSD_CLEAR : NFSD_SET; in __write_versions()
/fs/ksmbd/mgmt/
Duser_session.h42 bool sign; member
/fs/affs/
DChanges52 - wrong sign in __affs_hash_dentry

12