Lines Matching refs:server

58 			  struct TCP_Server_Info *server, char *signature,
67 if (!is_smb1(server)) {
110 * should be called with the server->srv_mutex held.
113 struct TCP_Server_Info *server, char *signature)
117 if (!rqst->rq_iov || !signature || !server)
120 rc = cifs_alloc_hash("md5", &server->secmech.md5);
124 rc = crypto_shash_init(server->secmech.md5);
130 rc = crypto_shash_update(server->secmech.md5,
131 server->session_key.response, server->session_key.len);
137 return __cifs_calc_signature(rqst, server, signature, server->secmech.md5);
140 /* must be called with server->srv_mutex held */
141 int cifs_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server,
152 if ((cifs_pdu == NULL) || (server == NULL))
155 spin_lock(&server->srv_lock);
157 server->tcpStatus == CifsNeedNegotiate) {
158 spin_unlock(&server->srv_lock);
161 spin_unlock(&server->srv_lock);
163 if (!server->session_estab) {
169 cpu_to_le32(server->sequence_number);
172 *pexpected_response_sequence_number = ++server->sequence_number;
173 ++server->sequence_number;
175 rc = cifs_calc_signature(rqst, server, smb_signature);
184 int cifs_sign_smbv(struct kvec *iov, int n_vec, struct TCP_Server_Info *server,
190 return cifs_sign_rqst(&rqst, server, pexpected_response_sequence);
193 /* must be called with server->srv_mutex held */
194 int cifs_sign_smb(struct smb_hdr *cifs_pdu, struct TCP_Server_Info *server,
204 return cifs_sign_smbv(iov, 2, server,
209 struct TCP_Server_Info *server,
221 if (cifs_pdu == NULL || server == NULL)
224 if (!server->session_estab)
235 server does not send one? BB */
243 its signature against what the server sent */
250 cifs_server_lock(server);
251 rc = cifs_calc_signature(rqst, server, what_we_think_sig_should_be);
252 cifs_server_unlock(server);
352 * Check if server has provided av pair of @type in the NTLMSSP
389 * We parse that blob here to find the server given timestamp
415 wchar_t *server;
472 server = kmalloc(2 + (len * 2), GFP_KERNEL);
473 if (server == NULL)
476 len = cifs_strtoUTF16((__le16 *)server, ses->ip_addr, len, nls_cp);
477 rc = crypto_shash_update(hmacmd5, (char *)server, 2 * len);
478 kfree(server);
480 cifs_dbg(VFS, "%s: Could not update with server, rc=%d\n", __func__, rc);
516 if (ses->server->negflavor == CIFS_NEGFLAVOR_EXTENDED)
519 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE);
543 struct TCP_Server_Info *server = ses->server;
549 spnlen = strlen(server->hostname);
558 (int)spnlen, server->hostname);
602 if (ses->server->negflavor == CIFS_NEGFLAVOR_EXTENDED) {
636 /* Must be within 5 minutes of the server (or in range +/-2h
637 * in case of Mac OS X), so simply carry over server timestamp
643 cifs_server_lock(ses->server);
703 cifs_server_unlock(ses->server);
743 cifs_crypto_secmech_release(struct TCP_Server_Info *server)
745 cifs_free_hash(&server->secmech.aes_cmac);
746 cifs_free_hash(&server->secmech.hmacsha256);
747 cifs_free_hash(&server->secmech.md5);
748 cifs_free_hash(&server->secmech.sha512);
750 if (server->secmech.enc) {
751 crypto_free_aead(server->secmech.enc);
752 server->secmech.enc = NULL;
754 if (server->secmech.dec) {
755 crypto_free_aead(server->secmech.dec);
756 server->secmech.dec = NULL;