Lines Matching refs:response
559 returned by old servers in the SMB negprot response */
604 ses->auth_key.response = kmemdup(bcc_ptr + tioffset, tilen,
606 if (!ses->auth_key.response) {
720 memcpy(tmp, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
916 ses->server->session_key.response =
917 kmemdup(ses->auth_key.response,
919 if (!ses->server->session_key.response) {
999 * security mode bit in Negotiate Protocol response states
1000 * to use challenge/response method (i.e. Password bit is 1).
1035 /* lanman response has a word count of 3 */
1104 /* calculate ntlm response and session key */
1112 /* copy ntlm response */
1113 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
1116 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
1182 kfree(ses->auth_key.response);
1183 ses->auth_key.response = NULL;
1213 /* calculate nlmv2 response and session key */
1220 memcpy(bcc_ptr, ses->auth_key.response + CIFS_SESS_KEY_SIZE,
1290 kfree(ses->auth_key.response);
1291 ses->auth_key.response = NULL;
1329 * sending us a response in an expected form
1338 ses->auth_key.response = kmemdup(msg->data, msg->sesskey_len,
1340 if (!ses->auth_key.response) {
1428 kfree(ses->auth_key.response);
1429 ses->auth_key.response = NULL;
1562 kfree(ses->auth_key.response);
1563 ses->auth_key.response = NULL;
1602 * the uid that it just gave us back on the response
1669 kfree(ses->auth_key.response);
1670 ses->auth_key.response = NULL;