Home
last modified time | relevance | path

Searched refs:Kerberos (Results 1 – 9 of 9) sorted by relevance

/fs/cifs/
DKconfig19 session establishment via Kerberos or NTLM or NTLMv2,
50 (since 1997) support stronger NTLM (and even NTLMv2 and Kerberos)
73 bool "Kerberos/SPNEGO advanced session setup"
78 Kerberos tickets which are needed to mount to certain secure servers
79 (for which more secure Kerberos authentication is required). If
128 mechanism which will be used for Kerberos session negotiation
Dcifs_spnego.c133 if (server->secType == Kerberos) in cifs_get_spnego_key()
DAUTHORS41 Jeff Layton (many, many fixes, as well as great work on the cifs Kerberos code)
Dasn1.c635 *secType = Kerberos; in decode_negTokenInit()
DREADME519 krb5 Use Kerberos version 5 authentication
520 krb5i Use Kerberos authentication and packet signing
592 may use Kerberos security 0x00008
593 must use Kerberos 0x08008
687 Enabling Kerberos (extended security) works but requires version 1.2 or later
692 cifs.upcall helper program), instead of using Kerberos, is sufficient for
703 To use cifs Kerberos and DFS support, the Linux keyutils package should be
Dcifsglob.h87 Kerberos, /* Kerberos via SPNEGO */ enumerator
Dsess.c596 } else if (type == Kerberos || type == MSKerberos) { in CIFS_SessSetup()
DCHANGES50 create. Update cifs.upcall version to handle new Kerberos sec flags
71 Enable experimental Kerberos support. Return writebehind errors on flush
933 (which is the mechanism preferred by Windows 2000 server in the absence of Kerberos).
Dcifssmb.c622 server->secType = Kerberos; in CIFSSMBNegotiate()