Lines Matching defs:server
37 is_server_using_iface(struct TCP_Server_Info *server,
42 struct sockaddr_in *s4 = (struct sockaddr_in *)&server->dstaddr;
43 struct sockaddr_in6 *s6 = (struct sockaddr_in6 *)&server->dstaddr;
45 if (server->dstaddr.ss_family != iface->sockaddr.ss_family)
47 if (server->dstaddr.ss_family == AF_INET) {
50 } else if (server->dstaddr.ss_family == AF_INET6) {
66 if (is_server_using_iface(ses->chans[i].server, iface))
90 if (ses->server->dialect < SMB30_PROT_ID) {
95 if (!(ses->server->capabilities & SMB2_GLOBAL_CAP_MULTI_CHANNEL)) {
96 cifs_dbg(VFS, "server %s does not support multichannel\n", ses->server->hostname);
160 * If server is a channel of ses, return the corresponding enclosing
164 cifs_ses_find_chan(struct cifs_ses *ses, struct TCP_Server_Info *server)
169 if (ses->chans[i].server == server)
204 * the session and server without caring about memory
220 /* XXX: Use ses->server->hostname? */
226 vol.vals = ses->server->vals;
227 vol.ops = ses->server->ops;
229 vol.noblocksnd = ses->server->noblocksnd;
230 vol.noautotune = ses->server->noautotune;
231 vol.sockopt_tcp_nodelay = ses->server->tcp_nodelay;
232 vol.echo_interval = ses->server->echo_interval / HZ;
233 vol.max_credits = ses->server->max_credits;
251 memcpy(&vol.client_guid, ses->server->client_guid,
258 chan->server = cifs_get_tcp_session(&vol);
259 if (IS_ERR(chan->server)) {
260 rc = PTR_ERR(chan->server);
261 chan->server = NULL;
265 chan->server->is_channel = true;
269 * We need to allocate the server crypto now as we will need
273 rc = smb311_crypto_shash_allocate(chan->server);
295 * ses to the new server.
305 if (rc && chan->server)
306 cifs_put_tcp_session(chan->server, 0);
326 pSMB->req.MaxMpxCount = cpu_to_le16(ses->server->maxReq);
337 if (ses->server->sign)
390 we did briefly in 2.6.18) since server will use its default */
462 so the server will default to its own domain */
533 cifs_dbg(FYI, "OS/2 server\n");
623 struct TCP_Server_Info *server = cifs_ses_server(ses);
636 if (server->sign)
638 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
704 if (ses->server->sign)
706 if (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
794 cifs_select_sectype(struct TCP_Server_Info *server, enum securityEnum requested)
796 switch (server->negflavor) {
803 if (server->sec_ntlmssp &&
806 if ((server->sec_kerberos || server->sec_mskerberos) &&
913 mutex_lock(&ses->server->srv_mutex);
914 if (!ses->server->session_estab) {
915 if (ses->server->sign) {
916 ses->server->session_key.response =
919 if (!ses->server->session_key.response) {
920 mutex_unlock(&ses->server->srv_mutex);
923 ses->server->session_key.len =
926 ses->server->sequence_number = 0x2;
927 ses->server->session_estab = true;
929 mutex_unlock(&ses->server->srv_mutex);
1002 rc = calc_lanman_hash(ses->password, ses->server->cryptkey,
1003 ses->server->sec_mode & SECMODE_PW_ENCRYPT ?
1016 * to calculate signing key? but what if server
1601 * Make sure that we tell the server that we are using
1682 type = cifs_select_sectype(ses->server, ses->sectype);