Lines Matching defs:server

75 	struct TCP_Server_Info *server;
87 server = ses->server;
105 rc = cifs_wait_for_server_reconnect(server, tcon->retry);
110 if (!cifs_chan_needs_reconnect(ses, server) && !tcon->need_reconnect) {
119 * and the server never sends an answer the socket will be closed
122 spin_lock(&server->srv_lock);
123 if (server->tcpStatus == CifsNeedReconnect) {
124 spin_unlock(&server->srv_lock);
132 spin_unlock(&server->srv_lock);
142 if (!cifs_chan_needs_reconnect(ses, server) &&
157 rc = cifs_negotiate_protocol(0, ses, server);
159 rc = cifs_setup_session(0, ses, server, nls_codepage);
180 /* tell server Unix caps we support */
248 buffer->Mid = get_next_mid(ses->server);
307 if (cifs_chan_needs_reconnect(tcon->ses, tcon->ses->server) ||
355 struct TCP_Server_Info *server = ses->server;
362 if (server->srv_count > 1) {
364 if (memcmp(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE) != 0) {
365 cifs_dbg(FYI, "server UID changed\n");
366 memcpy(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE);
370 memcpy(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE);
374 server->sec_ntlmssp = true;
378 pSMBr->u.extended_response.SecurityBlob, count, server);
406 struct TCP_Server_Info *server)
415 if (!server) {
416 WARN(1, "%s: server is NULL!\n", __func__);
425 pSMB->hdr.Mid = get_next_mid(server);
452 server->dialect = le16_to_cpu(pSMBr->DialectIndex);
453 cifs_dbg(FYI, "Dialect: %d\n", server->dialect);
455 if ((pSMBr->hdr.WordCount <= 13) || (server->dialect == BAD_PROT)) {
468 server->sec_mode = pSMBr->SecurityMode;
469 if ((server->sec_mode & SECMODE_USER) == 0)
474 server->maxReq = min_t(unsigned int, le16_to_cpu(pSMBr->MaxMpxCount),
476 set_credits(server, server->maxReq);
478 server->maxBuf = le32_to_cpu(pSMBr->MaxBufferSize);
480 server->max_read = server->maxBuf;
481 server->max_rw = le32_to_cpu(pSMBr->MaxRawSize);
482 cifs_dbg(NOISY, "Max buf = %d\n", ses->server->maxBuf);
483 server->capabilities = le32_to_cpu(pSMBr->Capabilities);
484 server->timeAdj = (int)(__s16)le16_to_cpu(pSMBr->ServerTimeZone);
485 server->timeAdj *= 60;
488 server->negflavor = CIFS_NEGFLAVOR_UNENCAP;
489 memcpy(ses->server->cryptkey, pSMBr->u.EncryptionKey,
492 server->capabilities & CAP_EXTENDED_SECURITY) {
493 server->negflavor = CIFS_NEGFLAVOR_EXTENDED;
495 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
498 server->negflavor = CIFS_NEGFLAVOR_UNENCAP;
499 server->capabilities &= ~CAP_EXTENDED_SECURITY;
503 rc = cifs_enable_signing(server, ses->sign);
520 if ((tcon->ses == NULL) || (tcon->ses->server == NULL))
525 * closed on server already e.g. due to tcp session crashing. Also,
547 closed on server already e.g. due to tcp session crashing */
556 * rather in the fact that the server sent one and that server->lstrp
564 struct TCP_Server_Info *server = mid->callback_data;
568 add_credits(server, &credits, CIFS_ECHO_OP);
572 CIFSSMBEcho(struct TCP_Server_Info *server)
586 if (server->capabilities & CAP_UNICODE)
602 rc = cifs_call_async(server, &rqst, NULL, cifs_echo_callback, NULL,
603 server, CIFS_NON_BLOCKING | CIFS_ECHO_OP, NULL);
621 * BB: do we need to check validity of ses and server? They should
625 if (!ses || !ses->server)
643 pSMB->hdr.Mid = get_next_mid(ses->server);
645 if (ses->server->sign)
657 since server closed smb session, no sense reporting
1080 as fifo and server expecting SFU style and
1196 * Set file as system file if special file such as fifo and server
1269 struct TCP_Server_Info *server = tcon->ses->server;
1282 if (server->sign) {
1285 rc = cifs_verify_signature(&rqst, server,
1298 if (server->sign && rdata->got_bytes)
1317 add_credits(server, &credits, 0);
1374 rc = cifs_call_async(tcon->ses->server, &rqst, cifs_readv_receive,
1421 if (tcon->ses->server == NULL)
1534 if (tcon->ses->server == NULL)
1548 can send more if LARGE_WRITE_X capability returned by the server and if
1554 bytes_sent = (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE)
1599 * server is greater than bytes requested by the client. Some
1630 result = cifs_check_receive(mid, tcon->ses->server, 0);
1639 * by the server is greater than bytes requested by the
1663 add_credits(tcon->ses->server, &credits, 0);
1736 rc = cifs_call_async(tcon->ses->server, &rqst, NULL,
1746 add_credits_and_wake_if(wdata->server, &wdata->credits, 0);
1788 if (tcon->ses->server == NULL)
1841 * server is greater than bytes requested by the client. OS/2
2129 /* Since session is dead, file will be closed on server already */
3391 /* Get Security Descriptor (by handle) from remote server for a file or dir */
4029 * unexpectedly by server.
4226 /* Since session is dead, search handle closed on server already */
4355 /* server pointer checked in called function,
4357 pSMB->hdr.Mid = get_next_mid(ses->server);
4377 if (ses->server->sign)
4503 * much prefer larger but if server doesn't report
4590 * much prefer larger but if server doesn't report
4960 * much prefer larger but if server doesn't report
5423 * Samba server ignores set of file size to zero due to bugs in some
5426 * accidentally as happened on one Samba server beta by putting
5704 cifs_dbg(FYI, "empty EA list returned from server\n");