Lines Matching full:server

31 smb3_crypto_shash_allocate(struct TCP_Server_Info *server)  in smb3_crypto_shash_allocate()  argument
33 struct cifs_secmech *p = &server->secmech; in smb3_crypto_shash_allocate()
53 smb311_crypto_shash_allocate(struct TCP_Server_Info *server) in smb311_crypto_shash_allocate() argument
55 struct cifs_secmech *p = &server->secmech; in smb311_crypto_shash_allocate()
82 int smb2_get_sign_key(__u64 ses_id, struct TCP_Server_Info *server, u8 *key) in smb2_get_sign_key() argument
120 if (chan->server == server) { in smb2_get_sign_key()
137 smb2_find_smb_ses_unlocked(struct TCP_Server_Info *server, __u64 ses_id) in smb2_find_smb_ses_unlocked() argument
141 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) { in smb2_find_smb_ses_unlocked()
152 smb2_find_smb_ses(struct TCP_Server_Info *server, __u64 ses_id) in smb2_find_smb_ses() argument
157 ses = smb2_find_smb_ses_unlocked(server, ses_id); in smb2_find_smb_ses()
184 smb2_find_smb_tcon(struct TCP_Server_Info *server, __u64 ses_id, __u32 tid) in smb2_find_smb_tcon() argument
190 ses = smb2_find_smb_ses_unlocked(server, ses_id); in smb2_find_smb_tcon()
209 smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server, in smb2_calc_signature() argument
223 ses = smb2_find_smb_ses(server, shdr->SessionId); in smb2_calc_signature()
241 hash = server->secmech.hmacsha256; in smb2_calc_signature()
242 shash = &server->secmech.sdeschmacsha256->shash; in smb2_calc_signature()
281 rc = __cifs_calc_signature(&drqst, server, sigptr, shash); in smb2_calc_signature()
303 struct TCP_Server_Info *server = ses->server; in generate_key() local
308 rc = smb3_crypto_shash_allocate(server); in generate_key()
314 rc = crypto_shash_setkey(server->secmech.hmacsha256, in generate_key()
321 rc = crypto_shash_init(&server->secmech.sdeschmacsha256->shash); in generate_key()
327 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash, in generate_key()
334 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash, in generate_key()
341 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash, in generate_key()
348 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash, in generate_key()
355 if ((server->cipher_type == SMB2_ENCRYPTION_AES256_CCM) || in generate_key()
356 (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM)) { in generate_key()
357 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash, in generate_key()
360 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash, in generate_key()
368 rc = crypto_shash_final(&server->secmech.sdeschmacsha256->shash, in generate_key()
398 struct TCP_Server_Info *server = ses->server; in generate_smb3signingkey() local
452 cifs_dbg(VFS, "Cipher type %d\n", server->cipher_type); in generate_smb3signingkey()
457 if ((server->cipher_type == SMB2_ENCRYPTION_AES256_CCM) || in generate_smb3signingkey()
458 (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM)) { in generate_smb3signingkey()
530 smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server, in smb3_calc_signature() argument
544 rc = smb2_get_sign_key(shdr->SessionId, server, key); in smb3_calc_signature()
555 hash = server->secmech.cmacaes; in smb3_calc_signature()
556 shash = &server->secmech.sdesccmacaes->shash; in smb3_calc_signature()
599 rc = __cifs_calc_signature(&drqst, server, sigptr, shash); in smb3_calc_signature()
609 /* must be called with server->srv_mutex held */
611 smb2_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server) in smb2_sign_rqst() argument
628 if (server->tcpStatus == CifsNeedNegotiate) in smb2_sign_rqst()
630 if (!is_binding && !server->session_estab) { in smb2_sign_rqst()
635 rc = server->ops->calc_signature(rqst, server, false); in smb2_sign_rqst()
641 smb2_verify_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server) in smb2_verify_signature() argument
651 server->ignore_signature || in smb2_verify_signature()
652 (!server->session_estab)) in smb2_verify_signature()
657 * server does not send one? BB in smb2_verify_signature()
667 * our calculated signature against what the server sent. in smb2_verify_signature()
673 rc = server->ops->calc_signature(rqst, server, true); in smb2_verify_signature()
691 smb2_seq_num_into_buf(struct TCP_Server_Info *server, in smb2_seq_num_into_buf() argument
696 shdr->MessageId = get_next_mid64(server); in smb2_seq_num_into_buf()
699 get_next_mid(server); in smb2_seq_num_into_buf()
704 struct TCP_Server_Info *server) in smb2_mid_entry_alloc() argument
709 if (server == NULL) { in smb2_mid_entry_alloc()
722 temp->server = server; in smb2_mid_entry_alloc()
741 smb2_get_mid_entry(struct cifs_ses *ses, struct TCP_Server_Info *server, in smb2_get_mid_entry() argument
744 if (server->tcpStatus == CifsExiting) in smb2_get_mid_entry()
747 if (server->tcpStatus == CifsNeedReconnect) { in smb2_get_mid_entry()
752 if (server->tcpStatus == CifsNeedNegotiate && in smb2_get_mid_entry()
769 *mid = smb2_mid_entry_alloc(shdr, server); in smb2_get_mid_entry()
773 list_add_tail(&(*mid)->qhead, &server->pending_mid_q); in smb2_get_mid_entry()
780 smb2_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server, in smb2_check_receive() argument
793 if (len > 24 && server->sign && !mid->decrypted) { in smb2_check_receive()
796 rc = smb2_verify_signature(&rqst, server); in smb2_check_receive()
806 smb2_setup_request(struct cifs_ses *ses, struct TCP_Server_Info *server, in smb2_setup_request() argument
814 smb2_seq_num_into_buf(server, shdr); in smb2_setup_request()
816 rc = smb2_get_mid_entry(ses, server, shdr, &mid); in smb2_setup_request()
818 revert_current_mid_from_hdr(server, shdr); in smb2_setup_request()
822 rc = smb2_sign_rqst(rqst, server); in smb2_setup_request()
824 revert_current_mid_from_hdr(server, shdr); in smb2_setup_request()
833 smb2_setup_async_request(struct TCP_Server_Info *server, struct smb_rqst *rqst) in smb2_setup_async_request() argument
840 if (server->tcpStatus == CifsNeedNegotiate && in smb2_setup_async_request()
844 smb2_seq_num_into_buf(server, shdr); in smb2_setup_async_request()
846 mid = smb2_mid_entry_alloc(shdr, server); in smb2_setup_async_request()
848 revert_current_mid_from_hdr(server, shdr); in smb2_setup_async_request()
852 rc = smb2_sign_rqst(rqst, server); in smb2_setup_async_request()
854 revert_current_mid_from_hdr(server, shdr); in smb2_setup_async_request()
863 smb3_crypto_aead_allocate(struct TCP_Server_Info *server) in smb3_crypto_aead_allocate() argument
867 if (!server->secmech.ccmaesencrypt) { in smb3_crypto_aead_allocate()
868 if ((server->cipher_type == SMB2_ENCRYPTION_AES128_GCM) || in smb3_crypto_aead_allocate()
869 (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM)) in smb3_crypto_aead_allocate()
878 server->secmech.ccmaesencrypt = tfm; in smb3_crypto_aead_allocate()
881 if (!server->secmech.ccmaesdecrypt) { in smb3_crypto_aead_allocate()
882 if ((server->cipher_type == SMB2_ENCRYPTION_AES128_GCM) || in smb3_crypto_aead_allocate()
883 (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM)) in smb3_crypto_aead_allocate()
888 crypto_free_aead(server->secmech.ccmaesencrypt); in smb3_crypto_aead_allocate()
889 server->secmech.ccmaesencrypt = NULL; in smb3_crypto_aead_allocate()
894 server->secmech.ccmaesdecrypt = tfm; in smb3_crypto_aead_allocate()