Lines Matching refs:sess
209 smbrdr_trnsprt_connect(struct sdb_session *sess, uint16_t port)
219 if ((sock = socket(sess->srv_ipaddr.a_family, SOCK_STREAM, 0)) <= 0) {
225 if (sess->srv_ipaddr.a_family == AF_INET) {
228 sin.sin_addr.s_addr = sess->srv_ipaddr.a_ipv4;
232 (void) smb_inet_ntop(&sess->srv_ipaddr, ipstr,
233 SMB_IPSTRLEN(sess->srv_ipaddr.a_family));
236 bcopy(&sess->srv_ipaddr.a_ipv6, &sin6.sin6_addr.s6_addr,
251 (void) smb_mbstowcs(unicode_server_name, sess->srv_name,
279 server_name, sess->scope, hostname, sess->scope);
291 sess->sock = sock;
292 sess->port = port;
295 sess->state = SDB_SSTATE_CONNECTED;
312 smbrdr_smb_negotiate(struct sdb_session *sess)
323 status = smbrdr_request_init(&srh, SMB_COM_NEGOTIATE, sess, 0, 0);
343 sess->secmode = 0;
344 sess->sesskey = 0;
345 sess->challenge_len = 0;
349 &dialect, &tmp_secmode, &sess->sesskey, &sess->remote_caps,
356 sess->secmode = tmp_secmode;
357 sess->challenge_len = tmp_clen;
360 sess->challenge_len, sess->challenge_key);
368 if ((sess->secmode & NEGOTIATE_SECURITY_SIGNATURES_REQUIRED) &&
369 (sess->secmode & NEGOTIATE_SECURITY_SIGNATURES_ENABLED)) {
370 sess->sign_ctx.ssc_flags |= SMB_SCF_REQUIRED;
373 sess->srv_name);
376 sess->state = SDB_SSTATE_NEGOTIATED;