kvno 27 include/keys/rxrpc-type.h u32 kvno; /* key version number */ kvno 101 include/keys/rxrpc-type.h u32 kvno; kvno 127 net/rxrpc/key.c token->kad->kvno = ntohl(xdr[1]); kvno 137 net/rxrpc/key.c _debug("KVNO: %u", token->kad->kvno); kvno 740 net/rxrpc/key.c _debug("KVNO: %u", v1->kvno); kvno 771 net/rxrpc/key.c token->kad->kvno = v1->kvno; kvno 963 net/rxrpc/key.c u32 kvno) kvno 990 net/rxrpc/key.c data.v1.kvno = 0; kvno 1168 net/rxrpc/key.c ENCODE(token->kad->kvno); kvno 182 net/rxrpc/protocol.h __be32 kvno; /* Kerberos key version number */ kvno 868 net/rxrpc/rxkad.c resp->kvno = htonl(token->kad->kvno); kvno 1096 net/rxrpc/rxkad.c u32 abort_code, version, kvno, ticket_len, level; kvno 1117 net/rxrpc/rxkad.c kvno = ntohl(response->kvno); kvno 1119 net/rxrpc/rxkad.c sp->hdr.serial, version, kvno, ticket_len); kvno 1133 net/rxrpc/rxkad.c if (kvno >= RXKAD_TKT_TYPE_KERBEROS_V5) kvno 1212 net/rxrpc/rxkad.c ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno);