Lines Matching defs:server

35 			/* only one valid case where server sends us request */
101 * which security mechanisms the server supports) make sure that
136 smb2_check_message(char *buf, unsigned int len, struct TCP_Server_Info *server)
147 /* If server is a channel, select the primary channel */
148 pserver = SERVER_IS_CHAN(server) ? server->primary_server : server;
244 /* Windows 7 server returns 24 bytes more */
247 /* server can return one byte more due to implied bcc[0] */
259 * MacOS server pads after SMB2.1 write response with 3 bytes
609 smb2_is_valid_lease_break(char *buffer, struct TCP_Server_Info *server)
619 /* If server is a channel, select the primary channel */
620 pserver = SERVER_IS_CHAN(server) ? server->primary_server : server;
672 smb2_is_valid_oplock_break(char *buffer, struct TCP_Server_Info *server)
689 return smb2_is_valid_lease_break(buffer, server);
696 /* If server is a channel, select the primary channel */
697 pserver = SERVER_IS_CHAN(server) ? server->primary_server : server;
777 * on the server.
779 * SMB2_CREATE to the server but before we processed the reply, and second
780 * if a close was interrupted before we sent the SMB2_CLOSE to the server.
812 struct TCP_Server_Info *server = NULL;
820 server = tcon->ses->server;
841 smb2_handle_cancelled_mid(struct mid_q_entry *mid, struct TCP_Server_Info *server)
852 tcon = smb2_find_smb_tcon(server, le64_to_cpu(hdr->SessionId),
874 * @ses: server session structure
875 * @server: pointer to server info
876 * @iov: array containing the SMB request we will send to the server
880 smb311_update_preauth_hash(struct cifs_ses *ses, struct TCP_Server_Info *server,
894 * neg prot was already done, so the server dialect was set
897 if (server->dialect != SMB311_PROT_ID)
911 rc = smb311_crypto_shash_allocate(server);
915 sha512 = server->secmech.sha512;