Searched refs:sectype (Results 1 – 6 of 6) sorted by relevance
1027 vol->sectype = Unspecified; in cifs_parse_security_flavors()1038 vol->sectype = Kerberos; in cifs_parse_security_flavors()1044 vol->sectype = RawNTLMSSP; in cifs_parse_security_flavors()1050 vol->sectype = NTLM; in cifs_parse_security_flavors()1056 vol->sectype = NTLMv2; in cifs_parse_security_flavors()1060 vol->sectype = LANMAN; in cifs_parse_security_flavors()2060 if (select_sectype(server, vol->sectype) == Unspecified) in match_security()2293 if (vol->sectype != Unspecified && in match_session()2294 vol->sectype != ses->sectype) in match_session()2297 switch (ses->sectype) { in match_session()[all …]
479 enum securityEnum sectype; /* sectype requested via mnt opts */ member832 enum securityEnum sectype; /* what security flavor was specified? */ member
963 if (ses->sectype != Kerberos && ses->sectype != RawNTLMSSP) in SMB2_select_sec()964 ses->sectype = RawNTLMSSP; in SMB2_select_sec()966 switch (ses->sectype) { in SMB2_select_sec()974 cifs_dbg(VFS, "secType %d not supported!\n", ses->sectype); in SMB2_select_sec()
332 if (ses->sectype == Unspecified) { in cifs_show_security()340 switch (ses->sectype) { in cifs_show_security()
1391 type = select_sectype(ses->server, ses->sectype); in select_sec()
528 should_set_ext_sec_flag(enum securityEnum sectype) in should_set_ext_sec_flag() argument530 switch (sectype) { in should_set_ext_sec_flag()568 if (should_set_ext_sec_flag(ses->sectype)) { in CIFSSMBNegotiate()