Lines Matching full:server

31 is_server_using_iface(struct TCP_Server_Info *server,  in is_server_using_iface()  argument
36 struct sockaddr_in *s4 = (struct sockaddr_in *)&server->dstaddr; in is_server_using_iface()
37 struct sockaddr_in6 *s6 = (struct sockaddr_in6 *)&server->dstaddr; in is_server_using_iface()
39 if (server->dstaddr.ss_family != iface->sockaddr.ss_family) in is_server_using_iface()
41 if (server->dstaddr.ss_family == AF_INET) { in is_server_using_iface()
44 } else if (server->dstaddr.ss_family == AF_INET6) { in is_server_using_iface()
74 struct TCP_Server_Info *server) in cifs_ses_get_chan_index() argument
79 if (ses->chans[i].server == server) in cifs_ses_get_chan_index()
84 if (server) in cifs_ses_get_chan_index()
85 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx", in cifs_ses_get_chan_index()
86 server->conn_id); in cifs_ses_get_chan_index()
93 struct TCP_Server_Info *server) in cifs_chan_set_in_reconnect() argument
95 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_set_in_reconnect()
102 struct TCP_Server_Info *server) in cifs_chan_clear_in_reconnect() argument
104 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_clear_in_reconnect()
111 struct TCP_Server_Info *server) in cifs_chan_in_reconnect() argument
113 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_in_reconnect()
120 struct TCP_Server_Info *server) in cifs_chan_set_need_reconnect() argument
122 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_set_need_reconnect()
131 struct TCP_Server_Info *server) in cifs_chan_clear_need_reconnect() argument
133 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_clear_need_reconnect()
142 struct TCP_Server_Info *server) in cifs_chan_needs_reconnect() argument
144 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_needs_reconnect()
151 struct TCP_Server_Info *server) in cifs_chan_is_iface_active() argument
153 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_is_iface_active()
162 struct TCP_Server_Info *server = ses->server; in cifs_try_adding_channels() local
182 if (server->dialect < SMB30_PROT_ID) { in cifs_try_adding_channels()
188 if (!(server->capabilities & SMB2_GLOBAL_CAP_MULTI_CHANNEL)) { in cifs_try_adding_channels()
264 cifs_chan_update_iface(struct cifs_ses *ses, struct TCP_Server_Info *server) in cifs_chan_update_iface() argument
272 chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_update_iface()
322 chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_update_iface()
326 if (!iface && SERVER_IS_CHAN(server)) in cifs_chan_update_iface()
327 ses->chans[chan_index].server = NULL; in cifs_chan_update_iface()
331 if (!iface && SERVER_IS_CHAN(server)) in cifs_chan_update_iface()
332 cifs_put_tcp_session(server, false); in cifs_chan_update_iface()
338 * If server is a channel of ses, return the corresponding enclosing
342 cifs_ses_find_chan(struct cifs_ses *ses, struct TCP_Server_Info *server) in cifs_ses_find_chan() argument
348 if (ses->chans[i].server == server) { in cifs_ses_find_chan()
388 * the session and server without caring about memory in cifs_ses_add_channel()
413 /* XXX: Use ses->server->hostname? */ in cifs_ses_add_channel()
424 ctx->vals = ses->server->vals; in cifs_ses_add_channel()
425 ctx->ops = ses->server->ops; in cifs_ses_add_channel()
427 ctx->noblocksnd = ses->server->noblocksnd; in cifs_ses_add_channel()
428 ctx->noautotune = ses->server->noautotune; in cifs_ses_add_channel()
429 ctx->sockopt_tcp_nodelay = ses->server->tcp_nodelay; in cifs_ses_add_channel()
430 ctx->echo_interval = ses->server->echo_interval / HZ; in cifs_ses_add_channel()
431 ctx->max_credits = ses->server->max_credits; in cifs_ses_add_channel()
444 memcpy(&ctx->client_guid, ses->server->client_guid, in cifs_ses_add_channel()
448 chan_server = cifs_get_tcp_session(ctx, ses->server); in cifs_ses_add_channel()
452 chan->server = chan_server; in cifs_ses_add_channel()
453 if (IS_ERR(chan->server)) { in cifs_ses_add_channel()
454 rc = PTR_ERR(chan->server); in cifs_ses_add_channel()
455 chan->server = NULL; in cifs_ses_add_channel()
464 cifs_chan_set_need_reconnect(ses, chan->server); in cifs_ses_add_channel()
470 * We need to allocate the server crypto now as we will need in cifs_ses_add_channel()
474 rc = smb311_crypto_shash_allocate(chan->server); in cifs_ses_add_channel()
481 rc = cifs_negotiate_protocol(xid, ses, chan->server); in cifs_ses_add_channel()
483 rc = cifs_setup_session(xid, ses, chan->server, cifs_sb->local_nls); in cifs_ses_add_channel()
488 if (rc && chan->server) { in cifs_ses_add_channel()
493 cancel_delayed_work_sync(&chan->server->echo); in cifs_ses_add_channel()
494 cancel_delayed_work_sync(&chan->server->reconnect); in cifs_ses_add_channel()
498 cifs_chan_clear_need_reconnect(ses, chan->server); in cifs_ses_add_channel()
507 cifs_put_tcp_session(chan->server, 0); in cifs_ses_add_channel()
520 struct TCP_Server_Info *server, in cifs_ssetup_hdr() argument
534 pSMB->req.MaxMpxCount = cpu_to_le16(server->maxReq); in cifs_ssetup_hdr()
545 if (server->sign) in cifs_ssetup_hdr()
598 we did briefly in 2.6.18) since server will use its default */ in unicode_domain_string()
664 so the server will default to its own domain */ in ascii_ssetup_strings()
735 cifs_dbg(FYI, "OS/2 server\n"); in decode_ascii_ssetup()
799 …cifs_dbg(VFS, "%s: requested signing/encryption but server did not return either 56-bit or 128-bit… in decode_ntlmssp_challenge()
804 cifs_dbg(VFS, "%s: server does not seem to support either NTLMv1 or NTLMv2\n", __func__); in decode_ntlmssp_challenge()
807 if (ses->server->sign && !(server_flags & NTLMSSP_NEGOTIATE_SIGN)) { in decode_ntlmssp_challenge()
808 cifs_dbg(VFS, "%s: forced packet signing but server does not seem to support it\n", in decode_ntlmssp_challenge()
814 pr_warn_once("%s: authentication has been weakened as server does not support key exchange\n", in decode_ntlmssp_challenge()
908 struct TCP_Server_Info *server, in build_ntlmssp_negotiate_blob() argument
937 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob()
970 struct TCP_Server_Info *server, in build_ntlmssp_smb3_negotiate_blob() argument
999 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_smb3_negotiate_blob()
1034 struct TCP_Server_Info *server, in build_ntlmssp_auth_blob() argument
1113 (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) && in build_ntlmssp_auth_blob()
1133 cifs_select_sectype(struct TCP_Server_Info *server, enum securityEnum requested) in cifs_select_sectype() argument
1135 switch (server->negflavor) { in cifs_select_sectype()
1142 if (server->sec_ntlmssp && in cifs_select_sectype()
1145 if ((server->sec_kerberos || server->sec_mskerberos) && in cifs_select_sectype()
1172 struct TCP_Server_Info *server; member
1248 struct TCP_Server_Info *server = sess_data->server; in sess_establish_session() local
1250 cifs_server_lock(server); in sess_establish_session()
1251 if (!server->session_estab) { in sess_establish_session()
1252 if (server->sign) { in sess_establish_session()
1253 server->session_key.response = in sess_establish_session()
1256 if (!server->session_key.response) { in sess_establish_session()
1257 cifs_server_unlock(server); in sess_establish_session()
1260 server->session_key.len = in sess_establish_session()
1263 server->sequence_number = 0x2; in sess_establish_session()
1264 server->session_estab = true; in sess_establish_session()
1266 cifs_server_unlock(server); in sess_establish_session()
1302 struct TCP_Server_Info *server = sess_data->server; in sess_auth_ntlmv2() local
1314 capabilities = cifs_ssetup_hdr(ses, server, pSMB); in sess_auth_ntlmv2()
1412 struct TCP_Server_Info *server = sess_data->server; in sess_auth_kerberos() local
1427 capabilities = cifs_ssetup_hdr(ses, server, pSMB); in sess_auth_kerberos()
1429 spnego_key = cifs_get_spnego_key(ses, server); in sess_auth_kerberos()
1553 struct TCP_Server_Info *server = sess_data->server; in _sess_auth_rawntlmssp_assemble_req() local
1559 capabilities = cifs_ssetup_hdr(ses, server, pSMB); in _sess_auth_rawntlmssp_assemble_req()
1593 struct TCP_Server_Info *server = sess_data->server; in sess_auth_rawntlmssp_negotiate() local
1621 &blob_len, ses, server, in sess_auth_rawntlmssp_negotiate()
1699 struct TCP_Server_Info *server = sess_data->server; in sess_auth_rawntlmssp_authenticate() local
1716 &blob_len, ses, server, in sess_auth_rawntlmssp_authenticate()
1724 * Make sure that we tell the server that we are using in sess_auth_rawntlmssp_authenticate()
1805 struct TCP_Server_Info *server = sess_data->server; in select_sec() local
1807 type = cifs_select_sectype(server, ses->sectype); in select_sec()
1838 struct TCP_Server_Info *server, in CIFS_SessSetup() argument
1855 sess_data->server = server; in CIFS_SessSetup()