Lines Matching defs:session
31 * server using a reliable, session oriented transport protocol, such as
32 * NetBIOS or TCP/IP. Originally, each SMB session was restricted to a
33 * single underlying transport connection, i.e. a single NetBIOS session,
37 * allowing parallelism over each NetBIOS session. For example, raw data
42 * to specify how many they were prepared to support per session
107 * ULONG SessionKey; Unique token identifying this session
156 * ULONG SessionKey; Unique token identifying this session
278 * know this is the only thread currently using this session.
357 skc = &sr->session->s_cfg;
405 smb_session_t *session = sr->session;
415 if (session->s_state != SMB_SESSION_STATE_ESTABLISHED) {
439 session->secmode = NEGOTIATE_ENCRYPT_PASSWORDS |
441 secmode = session->secmode;
442 sesskey = session->sesskey;
449 bcopy(&session->challenge_key, negprot->ni_key, SMB_CHALLENGE_SZ);
456 (void) ksocket_setsockopt(session->sock, SOL_SOCKET,
470 (void) ksocket_setsockopt(session->sock, SOL_SOCKET,
483 sesskey, /* session key */
495 (void) ksocket_setsockopt(session->sock, SOL_SOCKET,
508 sesskey, /* session key */
520 (void) ksocket_setsockopt(session->sock, SOL_SOCKET,
534 session->secmode = secmode;
572 sesskey, /* session key */
600 sesskey, /* session key */
625 session->dialect = negprot->ni_dialect;
626 session->s_state = SMB_SESSION_STATE_NEGOTIATED;
629 session->newrq_func = smb1sr_newrq;