kad 89 include/keys/rxrpc-type.h struct rxkad_key *kad; kad 110 net/rxrpc/key.c plen = sizeof(*token) + sizeof(*token->kad) + tktlen; kad 118 net/rxrpc/key.c token->kad = kzalloc(plen, GFP_KERNEL); kad 119 net/rxrpc/key.c if (!token->kad) { kad 125 net/rxrpc/key.c token->kad->ticket_len = tktlen; kad 126 net/rxrpc/key.c token->kad->vice_id = ntohl(xdr[0]); kad 127 net/rxrpc/key.c token->kad->kvno = ntohl(xdr[1]); kad 128 net/rxrpc/key.c token->kad->start = ntohl(xdr[4]); kad 129 net/rxrpc/key.c token->kad->expiry = ntohl(xdr[5]); kad 130 net/rxrpc/key.c token->kad->primary_flag = ntohl(xdr[6]); kad 131 net/rxrpc/key.c memcpy(&token->kad->session_key, &xdr[2], 8); kad 132 net/rxrpc/key.c memcpy(&token->kad->ticket, &xdr[8], tktlen); kad 135 net/rxrpc/key.c _debug("TLEN: %u", token->kad->ticket_len); kad 136 net/rxrpc/key.c _debug("EXPY: %x", token->kad->expiry); kad 137 net/rxrpc/key.c _debug("KVNO: %u", token->kad->kvno); kad 138 net/rxrpc/key.c _debug("PRIM: %u", token->kad->primary_flag); kad 140 net/rxrpc/key.c token->kad->session_key[0], token->kad->session_key[1], kad 141 net/rxrpc/key.c token->kad->session_key[2], token->kad->session_key[3], kad 142 net/rxrpc/key.c token->kad->session_key[4], token->kad->session_key[5], kad 143 net/rxrpc/key.c token->kad->session_key[6], token->kad->session_key[7]); kad 144 net/rxrpc/key.c if (token->kad->ticket_len >= 8) kad 146 net/rxrpc/key.c token->kad->ticket[0], token->kad->ticket[1], kad 147 net/rxrpc/key.c token->kad->ticket[2], token->kad->ticket[3], kad 148 net/rxrpc/key.c token->kad->ticket[4], token->kad->ticket[5], kad 149 net/rxrpc/key.c token->kad->ticket[6], token->kad->ticket[7]); kad 160 net/rxrpc/key.c expiry = rxrpc_u32_to_time64(token->kad->expiry); kad 757 net/rxrpc/key.c plen = sizeof(*token->kad) + v1->ticket_length; kad 764 net/rxrpc/key.c token->kad = kzalloc(plen, GFP_KERNEL); kad 765 net/rxrpc/key.c if (!token->kad) kad 769 net/rxrpc/key.c token->kad->ticket_len = v1->ticket_length; kad 770 net/rxrpc/key.c token->kad->expiry = v1->expiry; kad 771 net/rxrpc/key.c token->kad->kvno = v1->kvno; kad 772 net/rxrpc/key.c memcpy(&token->kad->session_key, &v1->session_key, 8); kad 773 net/rxrpc/key.c memcpy(&token->kad->ticket, v1->ticket, v1->ticket_length); kad 783 net/rxrpc/key.c expiry = rxrpc_u32_to_time64(token->kad->expiry); kad 806 net/rxrpc/key.c kfree(token->kad); kad 1078 net/rxrpc/key.c toksize += RND(token->kad->ticket_len); kad 1167 net/rxrpc/key.c ENCODE(token->kad->vice_id); kad 1168 net/rxrpc/key.c ENCODE(token->kad->kvno); kad 1169 net/rxrpc/key.c ENCODE_DATA(8, token->kad->session_key); kad 1170 net/rxrpc/key.c ENCODE(token->kad->start); kad 1171 net/rxrpc/key.c ENCODE(token->kad->expiry); kad 1172 net/rxrpc/key.c ENCODE(token->kad->primary_flag); kad 1173 net/rxrpc/key.c ENCODE_DATA(token->kad->ticket_len, token->kad->ticket); kad 70 net/rxrpc/rxkad.c if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, kad 71 net/rxrpc/rxkad.c sizeof(token->kad->session_key)) < 0) kad 126 net/rxrpc/rxkad.c memcpy(&iv, token->kad->session_key, sizeof(iv)); kad 242 net/rxrpc/rxkad.c memcpy(&iv, token->kad->session_key, sizeof(iv)); kad 473 net/rxrpc/rxkad.c memcpy(&iv, token->kad->session_key, sizeof(iv)); kad 868 net/rxrpc/rxkad.c resp->kvno = htonl(token->kad->kvno); kad 869 net/rxrpc/rxkad.c resp->ticket_len = htonl(token->kad->ticket_len); kad 877 net/rxrpc/rxkad.c ret = rxkad_encrypt_response(conn, resp, token->kad); kad 879 net/rxrpc/rxkad.c ret = rxkad_send_response(conn, &sp->hdr, resp, token->kad);