Home
last modified time | relevance | path

Searched refs:Kerberos (Results 1 – 23 of 23) sorted by relevance

/Linux-v6.1/net/sunrpc/
DKconfig20 tristate "Secure RPC: Kerberos V mechanism"
27 Choose Y here to enable Secure RPC using the Kerberos version 5
30 Secure RPC calls with Kerberos require an auxiliary user-space
33 Kerberos support should be installed.
38 bool "Secure RPC: Disable insecure Kerberos encryption types"
43 with the Kerberos version 5 GSS-API mechanism (RFC 1964). The
/Linux-v6.1/Documentation/filesystems/nfs/
Dclient-identifier.rst175 If NFS with Kerberos is not configured, a Linux NFSv4 client uses
183 When a Kerberos keytab is present on a Linux NFS client, the client
187 Kerberos principal can use that principal in place of the client's
190 Using Kerberos for this purpose enables the client and server to
193 flavor with Kerberos and the integrity QOS to prevent in-transit
Drpc-server-gss.rst57 In some Kerberos deployment GSSAPI tokens can be quite big, up and
59 the Kerberos tickets, that needs to be sent through the GSS layer in
/Linux-v6.1/fs/cifs/
DKconfig42 session establishment via Kerberos or NTLM or NTLMv2, RDMA
86 bool "Kerberos/SPNEGO advanced session setup"
90 utilities to provide SPNEGO packaged (RFC 4178) Kerberos tickets
92 secure Kerberos authentication is required). If unsure, say Y.
Dsess.c1120 case Kerberos: in cifs_select_sectype()
1129 return Kerberos; in cifs_select_sectype()
1799 case Kerberos: in select_sec()
Dcifs_swn.c143 case Kerberos: in cifs_swn_send_register_message()
Dcifsglob.h148 Kerberos, /* Kerberos via SPNEGO */ enumerator
2073 case Kerberos: in get_security_type_str()
Dcifsfs.c472 case Kerberos: in cifs_show_security()
487 if (ses->sectype == Kerberos) in cifs_show_security()
Dsmb2pdu.c1233 case Kerberos: in smb2_select_sectype()
1244 return Kerberos; in smb2_select_sectype()
1687 case Kerberos: in SMB2_select_sec()
1894 ((ses->user_name != NULL) || (ses->sectype == Kerberos))) in SMB2_tcon()
Dfs_context.c218 ctx->sectype = Kerberos; in cifs_parse_security_flavors()
Dconnect.c1794 case Kerberos: in match_session()
4194 if (ctx->sectype == Kerberos) in cifs_set_vol_auth()
Dcifssmb.c418 case Kerberos: in should_set_ext_sec_flag()
/Linux-v6.1/net/rxrpc/
DKconfig49 bool "RxRPC Kerberos security"
/Linux-v6.1/security/keys/
DKconfig47 primarily aimed at Kerberos key storage. The keyrings are persistent
66 (for example Kerberos ticket caches). The data may be stored out to
/Linux-v6.1/fs/ksmbd/
DKconfig66 bool "Support for Kerberos 5"
/Linux-v6.1/Documentation/admin-guide/cifs/
Dauthors.rst47 - Jeff Layton (many, many fixes, as well as great work on the cifs Kerberos code)
Dusage.rst671 Use Kerberos version 5 authentication
673 Use Kerberos authentication and packet signing
752 may use Kerberos security 0x00008
753 must use Kerberos 0x08008
832 Enabling Kerberos (extended security) works but requires version 1.2 or later
837 cifs.upcall helper program), instead of using Kerberos, is sufficient for
849 To use cifs Kerberos and DFS support, the Linux keyutils package should be
/Linux-v6.1/Documentation/security/keys/
Drequest-key.rst104 Kerberos TGT key). It just requests the appropriate key, and the keyring
113 Kerberos server using the TGT) and then instantiates key U.
Dcore.rst411 ID and a colon, such as "krb5tgt:" for a Kerberos 5 ticket granting
1399 filesystem might want to define a Kerberos 5 ticket key type. To do this, it
1803 required to obtain the key, eg: a Kerberos Ticket-Granting Ticket.
/Linux-v6.1/Documentation/filesystems/cifs/
Dksmbd.rst100 Kerberos Supported.
/Linux-v6.1/Documentation/filesystems/
Dafs.rst46 CONFIG_RXKAD - The RxRPC Kerberos security handler
/Linux-v6.1/Documentation/crypto/
Ddescore-readme.rst131 swedish reimplementation of Kerberos des library
151 ``highly optimized`` and tweaked Kerberos/Athena code (byte-order dependent):
/Linux-v6.1/crypto/
DKconfig682 This mode is required for Kerberos gss mechanism support