Lines Matching defs:cifs_ses

999 struct cifs_ses {  struct
1000 struct list_head smb_ses_list;
1001 struct list_head rlist; /* reconnect list */
1002 struct list_head tcon_list;
1003 struct cifs_tcon *tcon_ipc;
1004 spinlock_t ses_lock; /* protect anything here that is not protected */
1005 struct mutex session_mutex;
1006 struct TCP_Server_Info *server; /* pointer to server info */
1007 int ses_count; /* reference counter */
1008 enum ses_status_enum ses_status; /* updates protected by cifs_tcp_ses_lock */
1009 unsigned int overrideSecFlg; /* if non-zero override global sec flags */
1010 char *serverOS; /* name of operating system underlying server */
1011 char *serverNOS; /* name of network operating system of server */
1012 char *serverDomain; /* security realm of server */
1013 __u64 Suid; /* remote smb uid */
1014 kuid_t linux_uid; /* overriding owner of files on the mount */
1015 kuid_t cred_uid; /* owner of credentials */
1016 unsigned int capabilities;
1017 char ip_addr[INET6_ADDRSTRLEN + 1]; /* Max ipv6 (or v4) addr string len */
1018 char *user_name; /* must not be null except during init of sess
1020 char *domainName;
1021 char *password;
1022 char workstation_name[CIFS_MAX_WORKSTATION_LEN];
1023 struct session_key auth_key;
1024 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */
1025 enum securityEnum sectype; /* what security flavor was specified? */
1026 bool sign; /* is signing required? */
1027 bool domainAuto:1;
1028 __u16 session_flags;
1029 __u8 smb3signingkey[SMB3_SIGN_KEY_SIZE];
1030 __u8 smb3encryptionkey[SMB3_ENC_DEC_KEY_SIZE];
1031 __u8 smb3decryptionkey[SMB3_ENC_DEC_KEY_SIZE];
1032 __u8 preauth_sha_hash[SMB2_PREAUTH_HASH_SIZE];
1043 spinlock_t iface_lock;
1045 struct list_head iface_list;
1046 size_t iface_count;
1047 unsigned long iface_last_update; /* jiffies */
1050 spinlock_t chan_lock;
1083 struct cifs_ses *dfs_root_ses; argument
1088 cap_unix(struct cifs_ses *ses) in cap_unix() argument