Searched refs:kvno (Results 1 - 4 of 4) sorted by relevance
/linux-4.4.14/include/keys/ |
H A D | rxrpc-type.h | 31 u32 kvno; /* key version number */ member in struct:rxkad_key 105 u32 kvno; member in struct:rxrpc_key_data_v1
|
/linux-4.4.14/net/rxrpc/ |
H A D | ar-key.c | 126 token->kad->kvno = ntohl(xdr[1]); rxrpc_preparse_xdr_rxkad() 136 _debug("KVNO: %u", token->kad->kvno); rxrpc_preparse_xdr_rxkad() 678 * 12 4 kvno 731 _debug("KVNO: %u", v1->kvno); rxrpc_preparse() 762 token->kad->kvno = v1->kvno; rxrpc_preparse() 965 u32 kvno) rxrpc_get_server_data_key() 992 data.v1.kvno = 0; rxrpc_get_server_data_key() 1078 toksize += 8 * 4; /* viceid, kvno, key*2, begin, rxrpc_read() 1175 ENCODE(token->kad->kvno); rxrpc_read() 962 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time_t expiry, u32 kvno) rxrpc_get_server_data_key() argument
|
H A D | rxkad.c | 802 resp.kvno = htonl(token->kad->kvno); rxkad_respond_to_challenge() 1008 u32 abort_code, version, kvno, ticket_len, level; rxkad_verify_response() local 1022 kvno = ntohl(response.kvno); rxkad_verify_response() 1025 ntohl(sp->hdr.serial), version, kvno, ticket_len); rxkad_verify_response() 1036 if (kvno >= RXKAD_TKT_TYPE_KERBEROS_V5) rxkad_verify_response() 1092 ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno); rxkad_verify_response()
|
/linux-4.4.14/include/rxrpc/ |
H A D | packet.h | 166 __be32 kvno; /* Kerberos key version number */ member in struct:rxkad_response
|
Completed in 269 milliseconds