Home
last modified time | relevance | path

Searched refs:Kerberos (Results 1 - 15 of 15) sorted by relevance

/kernel/linux/linux-5.10/fs/cifs/
H A Dfs_context.c135 vol->sectype = Kerberos; in cifs_parse_security_flavors()
H A Dcifsglob.h129 Kerberos, /* Kerberos via SPNEGO */ enumerator
738 bool sec_kerberosu2u; /* supports U2U Kerberos */
739 bool sec_kerberos; /* supports plain Kerberos */
740 bool sec_mskerberos; /* supports legacy MS Kerberos */
2019 case Kerberos: in get_security_type_str()
2020 return "Kerberos"; in get_security_type_str()
H A Dcifsfs.c424 case Kerberos: in cifs_show_security()
439 if (ses->sectype == Kerberos) in cifs_show_security()
H A Dsess.c799 case Kerberos: in cifs_select_sectype()
808 return Kerberos; in cifs_select_sectype()
1341 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n", in sess_auth_kerberos()
1708 case Kerberos: in select_sec()
1713 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in select_sec()
H A Dsmb2pdu.c1148 case Kerberos: in smb2_select_sectype()
1159 return Kerberos; in smb2_select_sectype()
1358 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n", in SMB2_auth_kerberos()
1393 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in SMB2_auth_kerberos()
1577 case Kerberos: in SMB2_select_sec()
1777 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
H A Dconnect.c2694 case Kerberos: in match_session()
4873 /* BB FIXME add code to fail this if NTLMv2 or Kerberos in CIFSTCon()
5094 if (vol->sectype == Kerberos) in cifs_set_vol_auth()
H A Dcifssmb.c578 case Kerberos: in should_set_ext_sec_flag()
/kernel/linux/linux-6.6/fs/smb/client/
H A Dfs_context.c219 ctx->sectype = Kerberos; in cifs_parse_security_flavors()
804 } else if (old_ctx->sectype == Kerberos) { in smb3_verify_reconfigure_ctx()
806 "can not change password for Kerberos via remount\n"); in smb3_verify_reconfigure_ctx()
H A Dsess.c1298 case Kerberos: in cifs_select_sectype()
1307 return Kerberos; in cifs_select_sectype()
1612 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n", in sess_auth_kerberos()
1978 case Kerberos: in select_sec()
1983 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in select_sec()
H A Dcifs_swn.c143 case Kerberos: in cifs_swn_send_register_message()
H A Dcifsglob.h148 Kerberos, /* Kerberos via SPNEGO */ enumerator
722 bool sec_kerberosu2u; /* supports U2U Kerberos */
723 bool sec_kerberos; /* supports plain Kerberos */
724 bool sec_mskerberos; /* supports legacy MS Kerberos */
2110 case Kerberos: in get_security_type_str()
2111 return "Kerberos"; in get_security_type_str()
H A Dcifsfs.c477 case Kerberos: in cifs_show_security()
492 if (ses->sectype == Kerberos) in cifs_show_security()
H A Dsmb2pdu.c1389 case Kerberos: in smb2_select_sectype()
1400 return Kerberos; in smb2_select_sectype()
1623 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n", in SMB2_auth_kerberos()
1663 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in SMB2_auth_kerberos()
1857 case Kerberos: in SMB2_select_sec()
2063 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
H A Dconnect.c1858 case Kerberos: in match_session()
3969 if (ctx->sectype == Kerberos) in cifs_set_vol_auth()
H A Dcifssmb.c389 case Kerberos: in should_set_ext_sec_flag()

Completed in 56 milliseconds