Lines Matching refs:server

44 smb3_crypto_shash_allocate(struct TCP_Server_Info *server)
46 struct cifs_secmech *p = &server->secmech;
66 smb311_crypto_shash_allocate(struct TCP_Server_Info *server)
68 struct cifs_secmech *p = &server->secmech;
95 int smb2_get_sign_key(__u64 ses_id, struct TCP_Server_Info *server, u8 *key)
133 if (chan->server == server) {
150 smb2_find_smb_ses_unlocked(struct TCP_Server_Info *server, __u64 ses_id)
154 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) {
164 smb2_find_smb_ses(struct TCP_Server_Info *server, __u64 ses_id)
169 ses = smb2_find_smb_ses_unlocked(server, ses_id);
196 smb2_find_smb_tcon(struct TCP_Server_Info *server, __u64 ses_id, __u32 tid)
202 ses = smb2_find_smb_ses_unlocked(server, ses_id);
214 smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server,
228 ses = smb2_find_smb_ses(server, shdr->SessionId);
246 hash = server->secmech.hmacsha256;
247 shash = &server->secmech.sdeschmacsha256->shash;
286 rc = __cifs_calc_signature(&drqst, server, sigptr, shash);
306 struct TCP_Server_Info *server = ses->server;
311 rc = smb3_crypto_shash_allocate(server);
317 rc = crypto_shash_setkey(server->secmech.hmacsha256,
324 rc = crypto_shash_init(&server->secmech.sdeschmacsha256->shash);
330 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
337 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
344 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
351 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
358 if ((server->cipher_type == SMB2_ENCRYPTION_AES256_CCM) ||
359 (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM)) {
360 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
363 rc = crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
371 rc = crypto_shash_final(&server->secmech.sdeschmacsha256->shash,
401 struct TCP_Server_Info *server = ses->server;
454 cifs_dbg(VFS, "Cipher type %d\n", server->cipher_type);
459 if ((server->cipher_type == SMB2_ENCRYPTION_AES256_CCM) ||
460 (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM)) {
532 smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server,
546 rc = smb2_get_sign_key(shdr->SessionId, server, key);
557 hash = server->secmech.cmacaes;
558 shash = &server->secmech.sdesccmacaes->shash;
601 rc = __cifs_calc_signature(&drqst, server, sigptr, shash);
611 /* must be called with server->srv_mutex held */
613 smb2_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server)
630 if (server->tcpStatus == CifsNeedNegotiate)
632 if (!is_binding && !server->session_estab) {
637 rc = server->ops->calc_signature(rqst, server, false);
643 smb2_verify_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
653 server->ignore_signature ||
654 (!server->session_estab))
659 * server does not send one? BB
669 * our calculated signature against what the server sent.
675 rc = server->ops->calc_signature(rqst, server, true);
693 smb2_seq_num_into_buf(struct TCP_Server_Info *server,
698 shdr->MessageId = get_next_mid64(server);
701 get_next_mid(server);
706 struct TCP_Server_Info *server)
711 if (server == NULL) {
724 temp->server = server;
743 smb2_get_mid_entry(struct cifs_ses *ses, struct TCP_Server_Info *server,
746 if (server->tcpStatus == CifsExiting)
749 if (server->tcpStatus == CifsNeedReconnect) {
754 if (server->tcpStatus == CifsNeedNegotiate &&
771 *mid = smb2_mid_entry_alloc(shdr, server);
775 list_add_tail(&(*mid)->qhead, &server->pending_mid_q);
782 smb2_check_receive(struct mid_q_entry *mid, struct TCP_Server_Info *server,
795 if (len > 24 && server->sign && !mid->decrypted) {
798 rc = smb2_verify_signature(&rqst, server);
808 smb2_setup_request(struct cifs_ses *ses, struct TCP_Server_Info *server,
816 smb2_seq_num_into_buf(server, shdr);
818 rc = smb2_get_mid_entry(ses, server, shdr, &mid);
820 revert_current_mid_from_hdr(server, shdr);
824 rc = smb2_sign_rqst(rqst, server);
826 revert_current_mid_from_hdr(server, shdr);
835 smb2_setup_async_request(struct TCP_Server_Info *server, struct smb_rqst *rqst)
842 if (server->tcpStatus == CifsNeedNegotiate &&
846 smb2_seq_num_into_buf(server, shdr);
848 mid = smb2_mid_entry_alloc(shdr, server);
850 revert_current_mid_from_hdr(server, shdr);
854 rc = smb2_sign_rqst(rqst, server);
856 revert_current_mid_from_hdr(server, shdr);
865 smb3_crypto_aead_allocate(struct TCP_Server_Info *server)
869 if (!server->secmech.ccmaesencrypt) {
870 if ((server->cipher_type == SMB2_ENCRYPTION_AES128_GCM) ||
871 (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM))
880 server->secmech.ccmaesencrypt = tfm;
883 if (!server->secmech.ccmaesdecrypt) {
884 if ((server->cipher_type == SMB2_ENCRYPTION_AES128_GCM) ||
885 (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM))
890 crypto_free_aead(server->secmech.ccmaesencrypt);
891 server->secmech.ccmaesencrypt = NULL;
896 server->secmech.ccmaesdecrypt = tfm;