Lines Matching full:server
49 struct TCP_Server_Info *server) in cifs_ses_get_chan_index() argument
54 if (server && server->terminate) in cifs_ses_get_chan_index()
58 if (ses->chans[i].server == server) in cifs_ses_get_chan_index()
63 if (server) in cifs_ses_get_chan_index()
64 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx", in cifs_ses_get_chan_index()
65 server->conn_id); in cifs_ses_get_chan_index()
71 struct TCP_Server_Info *server) in cifs_chan_set_in_reconnect() argument
73 int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_set_in_reconnect()
83 struct TCP_Server_Info *server) in cifs_chan_clear_in_reconnect() argument
85 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_clear_in_reconnect()
95 struct TCP_Server_Info *server) in cifs_chan_set_need_reconnect() argument
97 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_set_need_reconnect()
109 struct TCP_Server_Info *server) in cifs_chan_clear_need_reconnect() argument
111 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_clear_need_reconnect()
123 struct TCP_Server_Info *server) in cifs_chan_needs_reconnect() argument
125 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_needs_reconnect()
135 struct TCP_Server_Info *server) in cifs_chan_is_iface_active() argument
137 unsigned int chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_is_iface_active()
149 struct TCP_Server_Info *server = ses->server; in cifs_try_adding_channels() local
171 if (server->dialect < SMB30_PROT_ID) { in cifs_try_adding_channels()
177 if (!(server->capabilities & SMB2_GLOBAL_CAP_MULTI_CHANNEL)) { in cifs_try_adding_channels()
196 cifs_dbg(ONCE, "server %s does not advertise interfaces\n", in cifs_try_adding_channels()
197 ses->server->hostname); in cifs_try_adding_channels()
211 if (iface->rdma_capable != ses->server->rdma) in cifs_try_adding_channels()
268 * called when multichannel is disabled by the server.
276 struct TCP_Server_Info *server; in cifs_disable_secondary_channels() local
291 server = ses->chans[i].server; in cifs_disable_secondary_channels()
298 ses->chans[i].server = NULL; in cifs_disable_secondary_channels()
310 if (server) { in cifs_disable_secondary_channels()
311 if (!server->terminate) { in cifs_disable_secondary_channels()
312 server->terminate = true; in cifs_disable_secondary_channels()
313 cifs_signal_cifsd_for_reconnect(server, false); in cifs_disable_secondary_channels()
315 cifs_put_tcp_session(server, false); in cifs_disable_secondary_channels()
327 cifs_chan_update_iface(struct cifs_ses *ses, struct TCP_Server_Info *server) in cifs_chan_update_iface() argument
337 chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_update_iface()
352 spin_lock(&server->srv_lock); in cifs_chan_update_iface()
353 ss = server->dstaddr; in cifs_chan_update_iface()
354 spin_unlock(&server->srv_lock); in cifs_chan_update_iface()
359 cifs_dbg(ONCE, "server %s does not advertise interfaces\n", ses->server->hostname); in cifs_chan_update_iface()
380 if (iface->rdma_capable != server->rdma) in cifs_chan_update_iface()
440 chan_index = cifs_ses_get_chan_index(ses, server); in cifs_chan_update_iface()
481 * the session and server without caring about memory in cifs_ses_add_channel()
506 /* XXX: Use ses->server->hostname? */ in cifs_ses_add_channel()
517 ctx->vals = ses->server->vals; in cifs_ses_add_channel()
518 ctx->ops = ses->server->ops; in cifs_ses_add_channel()
520 ctx->noblocksnd = ses->server->noblocksnd; in cifs_ses_add_channel()
521 ctx->noautotune = ses->server->noautotune; in cifs_ses_add_channel()
522 ctx->sockopt_tcp_nodelay = ses->server->tcp_nodelay; in cifs_ses_add_channel()
523 ctx->echo_interval = ses->server->echo_interval / HZ; in cifs_ses_add_channel()
524 ctx->max_credits = ses->server->max_credits; in cifs_ses_add_channel()
525 ctx->min_offload = ses->server->min_offload; in cifs_ses_add_channel()
526 ctx->compress = ses->server->compression.requested; in cifs_ses_add_channel()
527 ctx->dfs_conn = ses->server->dfs_conn; in cifs_ses_add_channel()
528 ctx->ignore_signature = ses->server->ignore_signature; in cifs_ses_add_channel()
529 ctx->leaf_fullpath = ses->server->leaf_fullpath; in cifs_ses_add_channel()
530 ctx->rootfs = ses->server->noblockcnt; in cifs_ses_add_channel()
531 ctx->retrans = ses->server->retrans; in cifs_ses_add_channel()
544 memcpy(&ctx->client_guid, ses->server->client_guid, in cifs_ses_add_channel()
548 chan_server = cifs_get_tcp_session(ctx, ses->server); in cifs_ses_add_channel()
552 chan->server = chan_server; in cifs_ses_add_channel()
553 if (IS_ERR(chan->server)) { in cifs_ses_add_channel()
554 rc = PTR_ERR(chan->server); in cifs_ses_add_channel()
555 chan->server = NULL; in cifs_ses_add_channel()
564 cifs_chan_set_need_reconnect(ses, chan->server); in cifs_ses_add_channel()
570 * We need to allocate the server crypto now as we will need in cifs_ses_add_channel()
574 rc = smb311_crypto_shash_allocate(chan->server); in cifs_ses_add_channel()
581 rc = cifs_negotiate_protocol(xid, ses, chan->server); in cifs_ses_add_channel()
583 rc = cifs_setup_session(xid, ses, chan->server, ses->local_nls); in cifs_ses_add_channel()
588 if (rc && chan->server) { in cifs_ses_add_channel()
589 cifs_put_tcp_session(chan->server, 0); in cifs_ses_add_channel()
594 cifs_chan_clear_need_reconnect(ses, chan->server); in cifs_ses_add_channel()
614 struct TCP_Server_Info *server, in cifs_ssetup_hdr() argument
628 pSMB->req.MaxMpxCount = cpu_to_le16(server->maxReq); in cifs_ssetup_hdr()
638 if (server->sign) in cifs_ssetup_hdr()
692 * we did briefly in 2.6.18) since server will use its default in unicode_domain_string()
757 } /* else we send a null domain name so server will default to its own domain */ in ascii_ssetup_strings()
828 cifs_dbg(FYI, "OS/2 server\n"); in decode_ascii_ssetup()
895 …cifs_dbg(VFS, "%s: requested signing/encryption but server did not return either 56-bit or 128-bit… in decode_ntlmssp_challenge()
900 cifs_dbg(VFS, "%s: server does not seem to support either NTLMv1 or NTLMv2\n", __func__); in decode_ntlmssp_challenge()
903 if (ses->server->sign && !(server_flags & NTLMSSP_NEGOTIATE_SIGN)) { in decode_ntlmssp_challenge()
904 cifs_dbg(VFS, "%s: forced packet signing but server does not seem to support it\n", in decode_ntlmssp_challenge()
910 pr_warn_once("%s: authentication has been weakened as server does not support key exchange\n", in decode_ntlmssp_challenge()
1007 struct TCP_Server_Info *server, in build_ntlmssp_negotiate_blob() argument
1036 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_negotiate_blob()
1069 struct TCP_Server_Info *server, in build_ntlmssp_smb3_negotiate_blob() argument
1098 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess) in build_ntlmssp_smb3_negotiate_blob()
1133 struct TCP_Server_Info *server, in build_ntlmssp_auth_blob() argument
1218 (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) && in build_ntlmssp_auth_blob()
1238 cifs_select_sectype(struct TCP_Server_Info *server, enum securityEnum requested) in cifs_select_sectype() argument
1240 switch (server->negflavor) { in cifs_select_sectype()
1248 if (server->sec_ntlmssp && in cifs_select_sectype()
1251 if ((server->sec_kerberos || server->sec_mskerberos || server->sec_iakerb) && in cifs_select_sectype()
1278 struct TCP_Server_Info *server; member
1354 struct TCP_Server_Info *server = sess_data->server; in sess_establish_session() local
1356 cifs_server_lock(server); in sess_establish_session()
1357 if (!server->session_estab) { in sess_establish_session()
1358 if (server->sign) { in sess_establish_session()
1359 server->session_key.response = in sess_establish_session()
1362 if (!server->session_key.response) { in sess_establish_session()
1363 cifs_server_unlock(server); in sess_establish_session()
1366 server->session_key.len = in sess_establish_session()
1369 server->sequence_number = 0x2; in sess_establish_session()
1370 server->session_estab = true; in sess_establish_session()
1372 cifs_server_unlock(server); in sess_establish_session()
1408 struct TCP_Server_Info *server = sess_data->server; in sess_auth_ntlmv2() local
1420 capabilities = cifs_ssetup_hdr(ses, server, pSMB); in sess_auth_ntlmv2()
1518 struct TCP_Server_Info *server = sess_data->server; in sess_auth_kerberos() local
1533 capabilities = cifs_ssetup_hdr(ses, server, pSMB); in sess_auth_kerberos()
1535 spnego_key = cifs_get_spnego_key(ses, server); in sess_auth_kerberos()
1659 struct TCP_Server_Info *server = sess_data->server; in _sess_auth_rawntlmssp_assemble_req() local
1665 capabilities = cifs_ssetup_hdr(ses, server, pSMB); in _sess_auth_rawntlmssp_assemble_req()
1699 struct TCP_Server_Info *server = sess_data->server; in sess_auth_rawntlmssp_negotiate() local
1727 &blob_len, ses, server, in sess_auth_rawntlmssp_negotiate()
1805 struct TCP_Server_Info *server = sess_data->server; in sess_auth_rawntlmssp_authenticate() local
1822 &blob_len, ses, server, in sess_auth_rawntlmssp_authenticate()
1830 * Make sure that we tell the server that we are using in sess_auth_rawntlmssp_authenticate()
1911 struct TCP_Server_Info *server = sess_data->server; in select_sec() local
1913 type = cifs_select_sectype(server, ses->sectype); in select_sec()
1944 struct TCP_Server_Info *server, in CIFS_SessSetup() argument
1961 sess_data->server = server; in CIFS_SessSetup()