Lines Matching defs:server
31 is_server_using_iface(struct TCP_Server_Info *server,
36 struct sockaddr_in *s4 = (struct sockaddr_in *)&server->dstaddr;
37 struct sockaddr_in6 *s6 = (struct sockaddr_in6 *)&server->dstaddr;
39 if (server->dstaddr.ss_family != iface->sockaddr.ss_family)
41 if (server->dstaddr.ss_family == AF_INET) {
44 } else if (server->dstaddr.ss_family == AF_INET6) {
74 struct TCP_Server_Info *server)
79 if (server && server->terminate)
83 if (ses->chans[i].server == server)
88 if (server)
89 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx",
90 server->conn_id);
96 struct TCP_Server_Info *server)
98 int chan_index = cifs_ses_get_chan_index(ses, server);
108 struct TCP_Server_Info *server)
110 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
119 struct TCP_Server_Info *server)
121 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
130 struct TCP_Server_Info *server)
132 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
143 struct TCP_Server_Info *server)
145 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
156 struct TCP_Server_Info *server)
158 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
167 struct TCP_Server_Info *server)
169 unsigned int chan_index = cifs_ses_get_chan_index(ses, server);
180 struct TCP_Server_Info *server = ses->server;
202 if (server->dialect < SMB30_PROT_ID) {
208 if (!(server->capabilities & SMB2_GLOBAL_CAP_MULTI_CHANNEL)) {
227 cifs_dbg(VFS, "server %s does not advertise interfaces\n",
228 ses->server->hostname);
242 if (iface->rdma_capable != ses->server->rdma)
299 * called when multichannel is disabled by the server.
307 struct TCP_Server_Info *server;
322 server = ses->chans[i].server;
329 ses->chans[i].server = NULL;
341 if (server) {
342 if (!server->terminate) {
343 server->terminate = true;
344 cifs_signal_cifsd_for_reconnect(server, false);
346 cifs_put_tcp_session(server, false);
362 cifs_chan_update_iface(struct cifs_ses *ses, struct TCP_Server_Info *server)
373 chan_index = cifs_ses_get_chan_index(ses, server);
388 spin_lock(&server->srv_lock);
389 ss = server->dstaddr;
390 spin_unlock(&server->srv_lock);
395 cifs_dbg(VFS, "server %s does not advertise interfaces\n", ses->server->hostname);
416 if (iface->rdma_capable != server->rdma)
483 chan_index = cifs_ses_get_chan_index(ses, server);
492 if (!iface && SERVER_IS_CHAN(server))
493 ses->chans[chan_index].server = NULL;
497 if (!iface && SERVER_IS_CHAN(server))
498 cifs_put_tcp_session(server, false);
504 * If server is a channel of ses, return the corresponding enclosing
508 cifs_ses_find_chan(struct cifs_ses *ses, struct TCP_Server_Info *server)
514 if (ses->chans[i].server == server) {
554 * the session and server without caring about memory
579 /* XXX: Use ses->server->hostname? */
590 ctx->vals = ses->server->vals;
591 ctx->ops = ses->server->ops;
593 ctx->noblocksnd = ses->server->noblocksnd;
594 ctx->noautotune = ses->server->noautotune;
595 ctx->sockopt_tcp_nodelay = ses->server->tcp_nodelay;
596 ctx->echo_interval = ses->server->echo_interval / HZ;
597 ctx->max_credits = ses->server->max_credits;
610 memcpy(&ctx->client_guid, ses->server->client_guid,
614 chan_server = cifs_get_tcp_session(ctx, ses->server);
618 chan->server = chan_server;
619 if (IS_ERR(chan->server)) {
620 rc = PTR_ERR(chan->server);
621 chan->server = NULL;
630 cifs_chan_set_need_reconnect(ses, chan->server);
636 * We need to allocate the server crypto now as we will need
640 rc = smb311_crypto_shash_allocate(chan->server);
647 rc = cifs_negotiate_protocol(xid, ses, chan->server);
649 rc = cifs_setup_session(xid, ses, chan->server, ses->local_nls);
654 if (rc && chan->server) {
655 cifs_put_tcp_session(chan->server, 0);
660 cifs_chan_clear_need_reconnect(ses, chan->server);
680 struct TCP_Server_Info *server,
694 pSMB->req.MaxMpxCount = cpu_to_le16(server->maxReq);
705 if (server->sign)
758 we did briefly in 2.6.18) since server will use its default */
824 so the server will default to its own domain */
895 cifs_dbg(FYI, "OS/2 server\n");
959 cifs_dbg(VFS, "%s: requested signing/encryption but server did not return either 56-bit or 128-bit session key size\n",
964 cifs_dbg(VFS, "%s: server does not seem to support either NTLMv1 or NTLMv2\n", __func__);
967 if (ses->server->sign && !(server_flags & NTLMSSP_NEGOTIATE_SIGN)) {
968 cifs_dbg(VFS, "%s: forced packet signing but server does not seem to support it\n",
974 pr_warn_once("%s: authentication has been weakened as server does not support key exchange\n",
1068 struct TCP_Server_Info *server,
1097 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
1130 struct TCP_Server_Info *server,
1159 if (!server->session_estab || ses->ntlmssp->sesskey_per_smbsess)
1194 struct TCP_Server_Info *server,
1273 (!ses->server->session_estab || ses->ntlmssp->sesskey_per_smbsess) &&
1293 cifs_select_sectype(struct TCP_Server_Info *server, enum securityEnum requested)
1295 switch (server->negflavor) {
1302 if (server->sec_ntlmssp &&
1305 if ((server->sec_kerberos || server->sec_mskerberos) &&
1332 struct TCP_Server_Info *server;
1408 struct TCP_Server_Info *server = sess_data->server;
1410 cifs_server_lock(server);
1411 if (!server->session_estab) {
1412 if (server->sign) {
1413 server->session_key.response =
1416 if (!server->session_key.response) {
1417 cifs_server_unlock(server);
1420 server->session_key.len =
1423 server->sequence_number = 0x2;
1424 server->session_estab = true;
1426 cifs_server_unlock(server);
1462 struct TCP_Server_Info *server = sess_data->server;
1474 capabilities = cifs_ssetup_hdr(ses, server, pSMB);
1572 struct TCP_Server_Info *server = sess_data->server;
1587 capabilities = cifs_ssetup_hdr(ses, server, pSMB);
1589 spnego_key = cifs_get_spnego_key(ses, server);
1713 struct TCP_Server_Info *server = sess_data->server;
1719 capabilities = cifs_ssetup_hdr(ses, server, pSMB);
1753 struct TCP_Server_Info *server = sess_data->server;
1781 &blob_len, ses, server,
1859 struct TCP_Server_Info *server = sess_data->server;
1876 &blob_len, ses, server,
1884 * Make sure that we tell the server that we are using
1965 struct TCP_Server_Info *server = sess_data->server;
1967 type = cifs_select_sectype(server, ses->sectype);
1998 struct TCP_Server_Info *server,
2015 sess_data->server = server;