Lines Matching refs:response
921 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n");
1034 * 3) Call smb_sendrcv2 (sends request on socket and waits for response)
1374 cifs_tcon_dbg(VFS, "Invalid protocol negotiate response size: %d\n",
1382 /* check validate negotiate info response matches what we got earlier */
1628 * sending us a response in an expected form
1643 kfree_sensitive(ses->auth_key.response);
1644 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len,
1646 if (!ses->auth_key.response) {
1674 kfree_sensitive(ses->auth_key.response);
1675 ses->auth_key.response = NULL;
1852 SMB2_NTLMV2_SESSKEY_SIZE, ses->auth_key.response);
1854 SMB3_SIGN_KEY_SIZE, ses->auth_key.response);
1946 struct smb2_logoff_req *req; /* response is also trivial struct */
2164 struct smb2_tree_disconnect_req *req; /* response is trivial */
2297 cifs_dbg(VFS, "bad owner sid in posix create response\n");
2305 cifs_dbg(VFS, "bad group sid in posix create response\n");
2941 /* resource #4: response buffer */
2969 /* Eventually save off posix specific response info and timestaps */
3347 * of previous versions) so response size must be specified as EXACTLY
3350 * response size smaller.
3614 /* check if need to ask server to return timestamps in close response */
3700 cifs_dbg(VFS, "Invalid server response, bad offset to data\n");