summaryrefslogtreecommitdiffstats
path: root/fs/cifs/smb2transport.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* cifs: avoid race conditions with parallel reconnectsShyam Prasad N2023-03-241-3/+14
* cifs: generate signkey for the channel that's reconnectingShyam Prasad N2023-03-141-1/+1
* cifs: avoid unnecessary iteration of tcp sessionsShyam Prasad N2022-11-051-6/+7
* cifs: always iterate smb sessions using primary channelShyam Prasad N2022-11-051-1/+5
* smb3: fix oops in calculating shash_setkeySteve French2022-10-081-2/+2
* cifs: secmech: use shash_desc directly, remove sdescEnzo Matsumiya2022-10-081-46/+26
* smb3: rename encryption/decryption TFMsEnzo Matsumiya2022-10-081-6/+6
* cifs: return correct error in ->calc_signature()Enzo Matsumiya2022-09-261-4/+6
* cifs: remove useless DeleteMidQEntry()Enzo Matsumiya2022-08-051-2/+2
* cifs: avoid use of global locks for high contention dataShyam Prasad N2022-08-011-15/+17
* cifs: remove some camelCase and also some static build warningsSteve French2022-08-011-1/+1
* cifs: use new enum for ses_statusShyam Prasad N2022-05-241-2/+2
* cifs: do not use tcpStatus after negotiate completesShyam Prasad N2022-05-241-1/+2
* cifs: protect all accesses to chan_* with chan_lockShyam Prasad N2022-01-191-0/+6
* cifs: take cifs_tcp_ses_lock for status checksShyam Prasad N2022-01-081-6/+25
* cifs: use the chans_need_reconnect bitmap for reconnect statusShyam Prasad N2022-01-031-10/+20
* cifs: Create a new shared file holding smb2 pdu definitionsRonnie Sahlberg2021-11-051-18/+18
* cifs: remove pathname for file from SPDX headerSteve French2021-09-131-1/+0
* cifs: use SPDX-Licence-IdentifierSteve French2021-06-211-13/+1
* cifs: missed ref-counting smb session in findShyam Prasad N2021-06-211-1/+11
* cifs: Adjust key sizes and key generation routines for AES256 encryptionShyam Prasad N2021-03-261-9/+28
* smb3.1.1: set gcm256 when requestedSteve French2020-10-191-3/+5
* smb3: remove overly noisy debug line in signing errorsSteve French2020-04-161-2/+2
* cifs: Allocate crypto structures on the fly for calculating signatures of inc...Long Li2020-04-071-33/+54
* cifs: update internal module version numberSteve French2020-03-291-2/+4
* smb3: use SMB2_SIGNATURE_SIZE defineSteve French2020-03-271-1/+1
* cifs: fix channel signingAurelien Aptel2020-02-061-2/+3
* CIFS: Fix task struct use-after-free on reconnectVincent Whitchurch2020-01-271-0/+2
* cifs: Always update signing key of first channelPaulo Alcantara (SUSE)2019-11-251-0/+4
* cifs: try opening channels after mountingAurelien Aptel2019-11-251-27/+109
* cifs: add server paramAurelien Aptel2019-11-251-13/+14
* smb3: allow skipping signature verification for perf sensitive configurationsSteve French2019-09-161-0/+1
* cifs: add new debugging macro cifs_server_dbgRonnie Sahlberg2019-09-161-30/+31
* SMB3.1.1: Add GCM crypto to the encrypt and decrypt functionsSteve French2019-07-081-2/+8
* CIFS: Only send SMB2_NEGOTIATE command on new TCP connectionsPavel Shilovsky2019-03-061-0/+8
* smb3: add dynamic trace point for smb3_cmd_enterSteve French2019-03-061-0/+3
* CIFS: Do not skip SMB2 message IDs on send failuresPavel Shilovsky2019-03-051-2/+12
* CIFS: fix uninitialized ptr deref in smb2 signingAurelien Aptel2018-08-071-2/+3
* smb3: simplify code by removing CONFIG_CIFS_SMB311Steve French2018-08-071-4/+0
* cifs: Fix validation of signed data in smb2Paulo Alcantara2018-07-051-4/+24
* cifs: Fix validation of signed data in smb3+Paulo Alcantara2018-07-051-6/+25
* cifs: Fix use after free of a mid_q_entryLars Persson2018-07-051-0/+1
* cifs: push rfc1002 generation down the stackRonnie Sahlberg2018-06-151-11/+7
* CIFS: Fix signing for SMB2/3Aurelien Aptel2018-06-051-4/+8
* cifs: remove rfc1002 header from all SMB2 response structuresRonnie Sahlberg2018-06-011-6/+4
* cifs: add resp_buf_size to the mid_q_entry structureRonnie Sahlberg2018-04-131-1/+1
* CIFS: add sha512 secmechAurelien Aptel2018-04-021-0/+30
* CIFS: refactor crypto shash/sdesc allocation&freeAurelien Aptel2018-04-021-60/+15
* Fix encryption labels and lengths for SMB3.1.1Steve French2017-10-181-12/+14
* CIFS: add CONFIG_CIFS_DEBUG_KEYS to dump encryption keysAurélien Aptel2017-07-061-3/+25