kvno               27 include/keys/rxrpc-type.h 	u32	kvno;			/* key version number */
kvno              101 include/keys/rxrpc-type.h 	u32		kvno;
kvno              127 net/rxrpc/key.c 	token->kad->kvno	= ntohl(xdr[1]);
kvno              137 net/rxrpc/key.c 	_debug("KVNO: %u", token->kad->kvno);
kvno              740 net/rxrpc/key.c 	_debug("KVNO: %u", v1->kvno);
kvno              771 net/rxrpc/key.c 	token->kad->kvno		= v1->kvno;
kvno              963 net/rxrpc/key.c 			      u32 kvno)
kvno              990 net/rxrpc/key.c 	data.v1.kvno = 0;
kvno             1168 net/rxrpc/key.c 			ENCODE(token->kad->kvno);
kvno              182 net/rxrpc/protocol.h 	__be32		kvno;		/* Kerberos key version number */
kvno              868 net/rxrpc/rxkad.c 	resp->kvno			= htonl(token->kad->kvno);
kvno             1096 net/rxrpc/rxkad.c 	u32 abort_code, version, kvno, ticket_len, level;
kvno             1117 net/rxrpc/rxkad.c 	kvno = ntohl(response->kvno);
kvno             1119 net/rxrpc/rxkad.c 	       sp->hdr.serial, version, kvno, ticket_len);
kvno             1133 net/rxrpc/rxkad.c 	if (kvno >= RXKAD_TKT_TYPE_KERBEROS_V5)
kvno             1212 net/rxrpc/rxkad.c 	ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno);