Lines Matching refs:ticket_len
659 iov[2].iov_len = s2->ticket_len; in rxkad_send_response()
803 resp.ticket_len = htonl(token->kad->ticket_len); in rxkad_respond_to_challenge()
820 void *ticket, size_t ticket_len, in rxkad_decrypt_ticket() argument
860 sg_init_one(&sg[0], ticket, ticket_len); in rxkad_decrypt_ticket()
861 crypto_blkcipher_decrypt_iv(&desc, sg, sg, ticket_len); in rxkad_decrypt_ticket()
864 end = p + ticket_len; in rxkad_decrypt_ticket()
1008 u32 abort_code, version, kvno, ticket_len, level; in rxkad_verify_response() local
1021 ticket_len = ntohl(response.ticket_len); in rxkad_verify_response()
1025 ntohl(sp->hdr.serial), version, kvno, ticket_len); in rxkad_verify_response()
1032 if (ticket_len < 4 || ticket_len > MAXKRB5TICKETLEN) in rxkad_verify_response()
1040 ticket = kmalloc(ticket_len, GFP_NOFS); in rxkad_verify_response()
1045 if (skb_copy_bits(skb, 0, ticket, ticket_len) < 0) in rxkad_verify_response()
1048 ret = rxkad_decrypt_ticket(conn, ticket, ticket_len, &session_key, in rxkad_verify_response()