Lines Matching refs:server
49 struct TCP_Server_Info *server)
54 if (server && server->terminate)
58 if (ses->chans[i].server == server)
63 if (server)
64 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx",
65 server->conn_id);
71 struct TCP_Server_Info *server)
73 int chan_index = cifs_ses_get_chan_index(ses, server);
83 struct TCP_Server_Info *server)
85 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
95 struct TCP_Server_Info *server)
97 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
109 struct TCP_Server_Info *server)
111 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
123 struct TCP_Server_Info *server)
125 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
135 struct TCP_Server_Info *server)
137 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
149 struct TCP_Server_Info *server = ses->server;
171 if (server->dialect < SMB30_PROT_ID) {
177 if (!(server->capabilities & SMB2_GLOBAL_CAP_MULTI_CHANNEL)) {
196 cifs_dbg(ONCE, "server %s does not advertise interfaces\n",
197 ses->server->hostname);
211 if (iface->rdma_capable != ses->server->rdma)
268 * called when multichannel is disabled by the server.
276 struct TCP_Server_Info *server;
291 server = ses->chans[i].server;
298 ses->chans[i].server = NULL;
310 if (server) {
311 if (!server->terminate) {
312 server->terminate = true;
313 cifs_signal_cifsd_for_reconnect(server, false);
315 cifs_put_tcp_session(server, false);
327 cifs_chan_update_iface(struct cifs_ses *ses, struct TCP_Server_Info *server)
338 chan_index = cifs_ses_get_chan_index(ses, server);
353 spin_lock(&server->srv_lock);
354 ss = server->dstaddr;
355 spin_unlock(&server->srv_lock);
360 cifs_dbg(ONCE, "server %s does not advertise interfaces\n", ses->server->hostname);
382 if (iface->rdma_capable != server->rdma)
449 chan_index = cifs_ses_get_chan_index(ses, server);
458 spin_lock(&server->srv_lock);
459 memcpy(&server->dstaddr, &iface->sockaddr, sizeof(server->dstaddr));
460 spin_unlock(&server->srv_lock);
494 * the session and server without caring about memory
510 ctx->server_hostname = ses->server->hostname;
519 /* XXX: Use ses->server->hostname? */
530 ctx->vals = ses->server->vals;
531 ctx->ops = ses->server->ops;
533 ctx->noblocksnd = ses->server->noblocksnd;
534 ctx->noautotune = ses->server->noautotune;
535 ctx->sockopt_tcp_nodelay = ses->server->tcp_nodelay;
536 ctx->echo_interval = ses->server->echo_interval / HZ;
537 ctx->max_credits = ses->server->max_credits;
538 ctx->min_offload = ses->server->min_offload;
539 ctx->compress = ses->server->compression.requested;
540 ctx->dfs_conn = ses->server->dfs_conn;
541 ctx->ignore_signature = ses->server->ignore_signature;
542 ctx->leaf_fullpath = ses->server->leaf_fullpath;
543 ctx->rootfs = ses->server->noblockcnt;
544 ctx->retrans = ses->server->retrans;
557 memcpy(&ctx->client_guid, ses->server->client_guid,
561 chan_server = cifs_get_tcp_session(ctx, ses->server);
565 chan->server = chan_server;
566 if (IS_ERR(chan->server)) {
567 rc = PTR_ERR(chan->server);
568 chan->server = NULL;
577 cifs_chan_set_need_reconnect(ses, chan->server);
583 * We need to allocate the server crypto now as we will need
587 rc = smb311_crypto_shash_allocate(chan->server);
594 rc = cifs_negotiate_protocol(xid, ses, chan->server);
596 rc = cifs_setup_session(xid, ses, chan->server, ses->local_nls);
601 if (rc && chan->server) {
602 cifs_put_tcp_session(chan->server, 0);
607 cifs_chan_clear_need_reconnect(ses, chan->server);
627 struct TCP_Server_Info *server,
641 pSMB->req.MaxMpxCount = cpu_to_le16(server->maxReq);
643 pSMB->req.SessionKey = server->session_key_id;
652 if (server->sign)
722 * we did briefly in 2.6.18) since server will use its default
748 } /* else we send a null domain name so server will default to its own domain */
862 cifs_dbg(FYI, "OS/2 server\n");
929 cifs_dbg(VFS, "%s: requested signing/encryption but server did not return either 56-bit or 128-bit session key size\n",
934 cifs_dbg(VFS, "%s: server does not seem to support either NTLMv1 or NTLMv2\n", __func__);
937 if (ses->server->sign && !(server_flags & NTLMSSP_NEGOTIATE_SIGN)) {
938 cifs_dbg(VFS, "%s: forced packet signing but server does not seem to support it\n",
944 pr_warn_once("%s: authentication has been weakened as server does not support key exchange\n",
1041 struct TCP_Server_Info *server,
1070 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
1103 struct TCP_Server_Info *server,
1132 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
1167 struct TCP_Server_Info *server,
1252 (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) &&
1272 cifs_select_sectype(struct TCP_Server_Info *server, enum securityEnum requested)
1274 switch (server->negflavor) {
1282 if (server->sec_ntlmssp &&
1285 if ((server->sec_kerberos || server->sec_mskerberos || server->sec_iakerb) &&
1312 struct TCP_Server_Info *server;
1388 struct TCP_Server_Info *server = sess_data->server;
1390 cifs_server_lock(server);
1391 if (!server->session_estab) {
1392 if (server->sign) {
1393 server->session_key.response =
1396 if (!server->session_key.response) {
1397 cifs_server_unlock(server);
1400 server->session_key.len =
1403 server->sequence_number = 0x2;
1404 server->session_estab = true;
1406 cifs_server_unlock(server);
1442 struct TCP_Server_Info *server = sess_data->server;
1454 capabilities = cifs_ssetup_hdr(ses, server, pSMB);
1552 struct TCP_Server_Info *server = sess_data->server;
1567 capabilities = cifs_ssetup_hdr(ses, server, pSMB);
1569 spnego_key = cifs_get_spnego_key(ses, server);
1693 struct TCP_Server_Info *server = sess_data->server;
1699 capabilities = cifs_ssetup_hdr(ses, server, pSMB);
1733 struct TCP_Server_Info *server = sess_data->server;
1761 &blob_len, ses, server,
1839 struct TCP_Server_Info *server = sess_data->server;
1856 &blob_len, ses, server,
1864 * Make sure that we tell the server that we are using
1945 struct TCP_Server_Info *server = sess_data->server;
1947 type = cifs_select_sectype(server, ses->sectype);
1978 struct TCP_Server_Info *server,
1995 sess_data->server = server;