Lines Matching defs:cifs_ses
1040 struct cifs_ses { struct
1041 struct list_head smb_ses_list;
1042 struct list_head rlist; /* reconnect list */
1043 struct list_head tcon_list;
1044 struct cifs_tcon *tcon_ipc;
1045 spinlock_t ses_lock; /* protect anything here that is not protected */
1046 struct mutex session_mutex;
1047 struct TCP_Server_Info *server; /* pointer to server info */
1048 int ses_count; /* reference counter */
1049 enum ses_status_enum ses_status; /* updates protected by cifs_tcp_ses_lock */
1050 unsigned int overrideSecFlg; /* if non-zero override global sec flags */
1051 char *serverOS; /* name of operating system underlying server */
1052 char *serverNOS; /* name of network operating system of server */
1053 char *serverDomain; /* security realm of server */
1054 __u64 Suid; /* remote smb uid */
1055 kuid_t linux_uid; /* overriding owner of files on the mount */
1056 kuid_t cred_uid; /* owner of credentials */
1057 unsigned int capabilities;
1058 char ip_addr[INET6_ADDRSTRLEN + 1]; /* Max ipv6 (or v4) addr string len */
1059 char *user_name; /* must not be null except during init of sess
1061 char *domainName;
1062 char *password;
1063 char workstation_name[CIFS_MAX_WORKSTATION_LEN];
1064 struct session_key auth_key;
1065 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */
1066 enum securityEnum sectype; /* what security flavor was specified? */
1067 bool sign; /* is signing required? */
1068 bool domainAuto:1;
1069 unsigned int flags;
1070 __u16 session_flags;
1071 __u8 smb3signingkey[SMB3_SIGN_KEY_SIZE];
1072 __u8 smb3encryptionkey[SMB3_ENC_DEC_KEY_SIZE];
1073 __u8 smb3decryptionkey[SMB3_ENC_DEC_KEY_SIZE];
1074 __u8 preauth_sha_hash[SMB2_PREAUTH_HASH_SIZE];
1085 spinlock_t iface_lock;
1087 struct list_head iface_list;
1088 size_t iface_count;
1089 unsigned long iface_last_update; /* jiffies */
1092 spinlock_t chan_lock;
1126 struct cifs_ses *dfs_root_ses; argument
1131 cap_unix(struct cifs_ses *ses) in cap_unix() argument