Searched refs:Kerberos (Results 1 - 15 of 15) sorted by relevance
/kernel/linux/linux-5.10/fs/cifs/ |
H A D | fs_context.c | 135 vol->sectype = Kerberos; in cifs_parse_security_flavors()
|
H A D | cifsglob.h | 129 Kerberos, /* Kerberos via SPNEGO */ enumerator 738 bool sec_kerberosu2u; /* supports U2U Kerberos */ 739 bool sec_kerberos; /* supports plain Kerberos */ 740 bool sec_mskerberos; /* supports legacy MS Kerberos */ 2019 case Kerberos: in get_security_type_str() 2020 return "Kerberos"; in get_security_type_str()
|
H A D | cifsfs.c | 424 case Kerberos: in cifs_show_security() 439 if (ses->sectype == Kerberos) in cifs_show_security()
|
H A D | sess.c | 799 case Kerberos: in cifs_select_sectype() 808 return Kerberos; in cifs_select_sectype() 1341 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n", in sess_auth_kerberos() 1708 case Kerberos: in select_sec() 1713 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in select_sec()
|
H A D | smb2pdu.c | 1148 case Kerberos: in smb2_select_sectype() 1159 return Kerberos; in smb2_select_sectype() 1358 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n", in SMB2_auth_kerberos() 1393 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in SMB2_auth_kerberos() 1577 case Kerberos: in SMB2_select_sec() 1777 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
|
H A D | connect.c | 2694 case Kerberos: in match_session() 4873 /* BB FIXME add code to fail this if NTLMv2 or Kerberos in CIFSTCon() 5094 if (vol->sectype == Kerberos) in cifs_set_vol_auth()
|
H A D | cifssmb.c | 578 case Kerberos: in should_set_ext_sec_flag()
|
/kernel/linux/linux-6.6/fs/smb/client/ |
H A D | fs_context.c | 219 ctx->sectype = Kerberos; in cifs_parse_security_flavors() 804 } else if (old_ctx->sectype == Kerberos) { in smb3_verify_reconfigure_ctx() 806 "can not change password for Kerberos via remount\n"); in smb3_verify_reconfigure_ctx()
|
H A D | sess.c | 1298 case Kerberos: in cifs_select_sectype() 1307 return Kerberos; in cifs_select_sectype() 1612 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n", in sess_auth_kerberos() 1978 case Kerberos: in select_sec() 1983 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in select_sec()
|
H A D | cifs_swn.c | 143 case Kerberos: in cifs_swn_send_register_message()
|
H A D | cifsglob.h | 148 Kerberos, /* Kerberos via SPNEGO */ enumerator 722 bool sec_kerberosu2u; /* supports U2U Kerberos */ 723 bool sec_kerberos; /* supports plain Kerberos */ 724 bool sec_mskerberos; /* supports legacy MS Kerberos */ 2110 case Kerberos: in get_security_type_str() 2111 return "Kerberos"; in get_security_type_str()
|
H A D | cifsfs.c | 477 case Kerberos: in cifs_show_security() 492 if (ses->sectype == Kerberos) in cifs_show_security()
|
H A D | smb2pdu.c | 1389 case Kerberos: in smb2_select_sectype() 1400 return Kerberos; in smb2_select_sectype() 1623 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n", in SMB2_auth_kerberos() 1663 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in SMB2_auth_kerberos() 1857 case Kerberos: in SMB2_select_sec() 2063 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
|
H A D | connect.c | 1858 case Kerberos: in match_session() 3969 if (ctx->sectype == Kerberos) in cifs_set_vol_auth()
|
H A D | cifssmb.c | 389 case Kerberos: in should_set_ext_sec_flag()
|
Completed in 56 milliseconds