Searched refs:Kerberos (Results 1 – 9 of 9) sorted by relevance
19 session establishment via Kerberos or NTLM or NTLMv2,50 (since 1997) support stronger NTLM (and even NTLMv2 and Kerberos)73 bool "Kerberos/SPNEGO advanced session setup"78 Kerberos tickets which are needed to mount to certain secure servers79 (for which more secure Kerberos authentication is required). If128 mechanism which will be used for Kerberos session negotiation
133 if (server->secType == Kerberos) in cifs_get_spnego_key()
41 Jeff Layton (many, many fixes, as well as great work on the cifs Kerberos code)
635 *secType = Kerberos; in decode_negTokenInit()
519 krb5 Use Kerberos version 5 authentication520 krb5i Use Kerberos authentication and packet signing592 may use Kerberos security 0x00008593 must use Kerberos 0x08008687 Enabling Kerberos (extended security) works but requires version 1.2 or later692 cifs.upcall helper program), instead of using Kerberos, is sufficient for703 To use cifs Kerberos and DFS support, the Linux keyutils package should be
87 Kerberos, /* Kerberos via SPNEGO */ enumerator
596 } else if (type == Kerberos || type == MSKerberos) { in CIFS_SessSetup()
50 create. Update cifs.upcall version to handle new Kerberos sec flags71 Enable experimental Kerberos support. Return writebehind errors on flush933 (which is the mechanism preferred by Windows 2000 server in the absence of Kerberos).
622 server->secType = Kerberos; in CIFSSMBNegotiate()