Lines Matching defs:cifs_ses
975 struct cifs_ses { struct
976 struct list_head smb_ses_list;
977 struct list_head tcon_list;
978 struct cifs_tcon *tcon_ipc;
979 struct mutex session_mutex;
980 struct TCP_Server_Info *server; /* pointer to server info */
981 int ses_count; /* reference counter */
982 enum statusEnum status; /* updates protected by GlobalMid_Lock */
983 unsigned overrideSecFlg; /* if non-zero override global sec flags */
984 char *serverOS; /* name of operating system underlying server */
985 char *serverNOS; /* name of network operating system of server */
986 char *serverDomain; /* security realm of server */
987 __u64 Suid; /* remote smb uid */
988 kuid_t linux_uid; /* overriding owner of files on the mount */
989 kuid_t cred_uid; /* owner of credentials */
990 unsigned int capabilities;
991 char serverName[SERVER_NAME_LEN_WITH_NULL];
992 char *user_name; /* must not be null except during init of sess
994 char *domainName;
995 char *password;
996 struct session_key auth_key;
997 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */
998 enum securityEnum sectype; /* what security flavor was specified? */
999 bool sign; /* is signing required? */
1000 bool need_reconnect:1; /* connection reset, uid now invalid */
1001 bool domainAuto:1;
1002 bool binding:1; /* are we binding the session? */
1003 __u16 session_flags;
1004 __u8 smb3signingkey[SMB3_SIGN_KEY_SIZE];
1005 __u8 smb3encryptionkey[SMB3_ENC_DEC_KEY_SIZE];
1006 __u8 smb3decryptionkey[SMB3_ENC_DEC_KEY_SIZE];
1007 __u8 preauth_sha_hash[SMB2_PREAUTH_HASH_SIZE];
1009 __u8 binding_preauth_sha_hash[SMB2_PREAUTH_HASH_SIZE];
1039 struct cifs_chan *cifs_ses_binding_channel(struct cifs_ses *ses) in cifs_ses_binding_channel() argument