Home
last modified time | relevance | path

Searched refs:pSMB (Results 1 – 7 of 7) sorted by relevance

/linux-4.19.296/fs/cifs/
Dcifssmb.c361 static int validate_t2(struct smb_t2_rsp *pSMB) in validate_t2() argument
366 if (pSMB->hdr.WordCount < 10) in validate_t2()
370 if (get_unaligned_le16(&pSMB->t2_rsp.ParameterOffset) > 1024 || in validate_t2()
371 get_unaligned_le16(&pSMB->t2_rsp.DataOffset) > 1024) in validate_t2()
374 total_size = get_unaligned_le16(&pSMB->t2_rsp.ParameterCount); in validate_t2()
381 total_size += get_unaligned_le16(&pSMB->t2_rsp.DataCount); in validate_t2()
382 if (total_size > get_bcc(&pSMB->hdr) || in validate_t2()
388 cifs_dump_mem("Invalid transact2 SMB: ", (char *)pSMB, in validate_t2()
577 NEGOTIATE_REQ *pSMB; in CIFSSMBNegotiate() local
591 (void **) &pSMB, (void **) &pSMBr); in CIFSSMBNegotiate()
[all …]
Dsess.c35 static __u32 cifs_ssetup_hdr(struct cifs_ses *ses, SESSION_SETUP_ANDX *pSMB) in cifs_ssetup_hdr() argument
44 pSMB->req.AndXCommand = 0xFF; in cifs_ssetup_hdr()
45 pSMB->req.MaxBufferSize = cpu_to_le16(min_t(u32, in cifs_ssetup_hdr()
48 pSMB->req.MaxMpxCount = cpu_to_le16(ses->server->maxReq); in cifs_ssetup_hdr()
49 pSMB->req.VcNumber = cpu_to_le16(1); in cifs_ssetup_hdr()
60 pSMB->req.hdr.Flags2 |= SMBFLG2_SECURITY_SIGNATURE; in cifs_ssetup_hdr()
63 pSMB->req.hdr.Flags2 |= SMBFLG2_UNICODE; in cifs_ssetup_hdr()
67 pSMB->req.hdr.Flags2 |= SMBFLG2_ERR_STATUS; in cifs_ssetup_hdr()
71 pSMB->req.hdr.Flags2 |= SMBFLG2_DFS; in cifs_ssetup_hdr()
689 SESSION_SETUP_ANDX *pSMB; in sess_auth_lanman() local
[all …]
Dmisc.c391 struct smb_com_lock_req *pSMB = (struct smb_com_lock_req *)buf; in is_valid_oplock_break() local
399 if ((pSMB->hdr.Command == SMB_COM_NT_TRANSACT) && in is_valid_oplock_break()
400 (pSMB->hdr.Flags & SMBFLG_RESPONSE)) { in is_valid_oplock_break()
431 if (pSMB->hdr.Command != SMB_COM_LOCKING_ANDX) in is_valid_oplock_break()
433 if (pSMB->hdr.Flags & SMBFLG_RESPONSE) { in is_valid_oplock_break()
439 le32_to_cpu(pSMB->hdr.Status.CifsError)) { in is_valid_oplock_break()
443 le16_to_cpu(pSMB->hdr.Status.DosError.Error)) { in is_valid_oplock_break()
449 if (pSMB->hdr.WordCount != 8) in is_valid_oplock_break()
453 pSMB->LockType, pSMB->OplockLevel); in is_valid_oplock_break()
454 if (!(pSMB->LockType & LOCKING_ANDX_OPLOCK_RELEASE)) in is_valid_oplock_break()
[all …]
Dsmb1ops.c251 struct smb_hdr *pSMB = (struct smb_hdr *)buf; in check2ndT2() local
256 if (pSMB->Command != SMB_COM_TRANSACTION2) in check2ndT2()
261 if (pSMB->WordCount != 10) { /* coalesce_t2 depends on this */ in check2ndT2()
266 pSMBt = (struct smb_t2_rsp *)pSMB; in check2ndT2()
Dtransport.c1160 LOCK_REQ *pSMB = (LOCK_REQ *)in_buf; in send_lock_cancel() local
1167 pSMB->LockType = LOCKING_ANDX_CANCEL_LOCK|LOCKING_ANDX_LARGE_FILES; in send_lock_cancel()
1168 pSMB->Timeout = 0; in send_lock_cancel()
1169 pSMB->hdr.Mid = get_next_mid(ses->server); in send_lock_cancel()
Dconnect.c4329 TCONX_REQ *pSMB; in CIFSTCon() local
4350 pSMB = (TCONX_REQ *) smb_buffer; in CIFSTCon()
4353 pSMB->AndXCommand = 0xFF; in CIFSTCon()
4354 pSMB->Flags = cpu_to_le16(TCON_EXTENDED_SECINFO); in CIFSTCon()
4355 bcc_ptr = &pSMB->Password[0]; in CIFSTCon()
4357 pSMB->PasswordLength = cpu_to_le16(1); /* minimum */ in CIFSTCon()
4362 pSMB->PasswordLength = cpu_to_le16(CIFS_AUTH_RESP_SIZE); in CIFSTCon()
4419 count = bcc_ptr - &pSMB->Password[0]; in CIFSTCon()
4420 pSMB->hdr.smb_buf_length = cpu_to_be32(be32_to_cpu( in CIFSTCon()
4421 pSMB->hdr.smb_buf_length) + count); in CIFSTCon()
[all …]
Dcifsencrypt.c225 struct smb_com_lock_req *pSMB = in cifs_verify_signature() local
227 if (pSMB->LockType & LOCKING_ANDX_OPLOCK_RELEASE) in cifs_verify_signature()