Searched refs:kvno (Results 1 - 4 of 4) sorted by relevance

/linux-4.4.14/include/keys/
H A Drxrpc-type.h31 u32 kvno; /* key version number */ member in struct:rxkad_key
105 u32 kvno; member in struct:rxrpc_key_data_v1
/linux-4.4.14/net/rxrpc/
H A Dar-key.c126 token->kad->kvno = ntohl(xdr[1]); rxrpc_preparse_xdr_rxkad()
136 _debug("KVNO: %u", token->kad->kvno); rxrpc_preparse_xdr_rxkad()
678 * 12 4 kvno
731 _debug("KVNO: %u", v1->kvno); rxrpc_preparse()
762 token->kad->kvno = v1->kvno; rxrpc_preparse()
965 u32 kvno) rxrpc_get_server_data_key()
992 data.v1.kvno = 0; rxrpc_get_server_data_key()
1078 toksize += 8 * 4; /* viceid, kvno, key*2, begin, rxrpc_read()
1175 ENCODE(token->kad->kvno); rxrpc_read()
962 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time_t expiry, u32 kvno) rxrpc_get_server_data_key() argument
H A Drxkad.c802 resp.kvno = htonl(token->kad->kvno); rxkad_respond_to_challenge()
1008 u32 abort_code, version, kvno, ticket_len, level; rxkad_verify_response() local
1022 kvno = ntohl(response.kvno); rxkad_verify_response()
1025 ntohl(sp->hdr.serial), version, kvno, ticket_len); rxkad_verify_response()
1036 if (kvno >= RXKAD_TKT_TYPE_KERBEROS_V5) rxkad_verify_response()
1092 ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno); rxkad_verify_response()
/linux-4.4.14/include/rxrpc/
H A Dpacket.h166 __be32 kvno; /* Kerberos key version number */ member in struct:rxkad_response

Completed in 269 milliseconds