Lines Matching full:server

86 int __cifs_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server,  in __cifs_calc_signature()  argument
95 if (!is_smb1(server)) { in __cifs_calc_signature()
137 * should be called with the server->srv_mutex held.
140 struct TCP_Server_Info *server, char *signature) in cifs_calc_signature() argument
144 if (!rqst->rq_iov || !signature || !server) in cifs_calc_signature()
153 md5_update(&ctx, server->session_key.response, server->session_key.len); in cifs_calc_signature()
156 rqst, server, signature, in cifs_calc_signature()
160 /* must be called with server->srv_mutex held */
161 int cifs_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server, in cifs_sign_rqst() argument
172 if ((cifs_pdu == NULL) || (server == NULL)) in cifs_sign_rqst()
175 spin_lock(&server->srv_lock); in cifs_sign_rqst()
177 server->tcpStatus == CifsNeedNegotiate) { in cifs_sign_rqst()
178 spin_unlock(&server->srv_lock); in cifs_sign_rqst()
181 spin_unlock(&server->srv_lock); in cifs_sign_rqst()
183 if (!server->session_estab) { in cifs_sign_rqst()
189 cpu_to_le32(server->sequence_number); in cifs_sign_rqst()
192 *pexpected_response_sequence_number = ++server->sequence_number; in cifs_sign_rqst()
193 ++server->sequence_number; in cifs_sign_rqst()
195 rc = cifs_calc_signature(rqst, server, smb_signature); in cifs_sign_rqst()
204 int cifs_sign_smbv(struct kvec *iov, int n_vec, struct TCP_Server_Info *server, in cifs_sign_smbv() argument
210 return cifs_sign_rqst(&rqst, server, pexpected_response_sequence); in cifs_sign_smbv()
213 /* must be called with server->srv_mutex held */
214 int cifs_sign_smb(struct smb_hdr *cifs_pdu, struct TCP_Server_Info *server, in cifs_sign_smb() argument
224 return cifs_sign_smbv(iov, 2, server, in cifs_sign_smb()
229 struct TCP_Server_Info *server, in cifs_verify_signature() argument
241 if (cifs_pdu == NULL || server == NULL) in cifs_verify_signature()
244 if (!server->session_estab) in cifs_verify_signature()
255 server does not send one? BB */ in cifs_verify_signature()
263 its signature against what the server sent */ in cifs_verify_signature()
270 cifs_server_lock(server); in cifs_verify_signature()
271 rc = cifs_calc_signature(rqst, server, what_we_think_sig_should_be); in cifs_verify_signature()
272 cifs_server_unlock(server); in cifs_verify_signature()
372 * Check if server has provided av pair of @type in the NTLMSSP
407 /* Server has provided av pairs/target info in the type 2 challenge
409 * We parse that blob here to find the server given timestamp
435 wchar_t *server; in calc_ntlmv2_hash() local
474 server = kmalloc(2 + (len * 2), GFP_KERNEL); in calc_ntlmv2_hash()
475 if (server == NULL) in calc_ntlmv2_hash()
478 len = cifs_strtoUTF16((__le16 *)server, ses->ip_addr, len, nls_cp); in calc_ntlmv2_hash()
479 hmac_md5_update(&hmac_ctx, (const u8 *)server, 2 * len); in calc_ntlmv2_hash()
480 kfree(server); in calc_ntlmv2_hash()
497 if (ses->server->negflavor == CIFS_NEGFLAVOR_EXTENDED) in CalcNTLMv2_response()
500 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
516 struct TCP_Server_Info *server = ses->server; in set_auth_key_response() local
522 spnlen = strlen(server->hostname); in set_auth_key_response()
531 (int)spnlen, server->hostname); in set_auth_key_response()
574 if (ses->server->negflavor == CIFS_NEGFLAVOR_EXTENDED) { in setup_ntlmv2_rsp()
608 /* Must be within 5 minutes of the server (or in range +/-2h in setup_ntlmv2_rsp()
609 * in case of Mac OS X), so simply carry over server timestamp in setup_ntlmv2_rsp()
615 cifs_server_lock(ses->server); in setup_ntlmv2_rsp()
654 cifs_server_unlock(ses->server); in setup_ntlmv2_rsp()
693 cifs_crypto_secmech_release(struct TCP_Server_Info *server) in cifs_crypto_secmech_release() argument
695 cifs_free_hash(&server->secmech.aes_cmac); in cifs_crypto_secmech_release()
697 if (server->secmech.enc) { in cifs_crypto_secmech_release()
698 crypto_free_aead(server->secmech.enc); in cifs_crypto_secmech_release()
699 server->secmech.enc = NULL; in cifs_crypto_secmech_release()
701 if (server->secmech.dec) { in cifs_crypto_secmech_release()
702 crypto_free_aead(server->secmech.dec); in cifs_crypto_secmech_release()
703 server->secmech.dec = NULL; in cifs_crypto_secmech_release()