ticket_len 29 include/keys/rxrpc-type.h u16 ticket_len; /* length of ticket[] */ ticket_len 70 include/keys/rxrpc-type.h u16 ticket_len; /* length of ticket */ ticket_len 125 net/rxrpc/key.c token->kad->ticket_len = tktlen; ticket_len 135 net/rxrpc/key.c _debug("TLEN: %u", token->kad->ticket_len); ticket_len 144 net/rxrpc/key.c if (token->kad->ticket_len >= 8) ticket_len 506 net/rxrpc/key.c ret = rxrpc_krb5_decode_ticket(&rxk5->ticket, &rxk5->ticket_len, ticket_len 769 net/rxrpc/key.c token->kad->ticket_len = v1->ticket_length; ticket_len 1078 net/rxrpc/key.c toksize += RND(token->kad->ticket_len); ticket_len 1102 net/rxrpc/key.c toksize += 4 + RND(token->k5->ticket_len); ticket_len 1173 net/rxrpc/key.c ENCODE_DATA(token->kad->ticket_len, token->kad->ticket); ticket_len 1207 net/rxrpc/key.c ENCODE_DATA(token->k5->ticket_len, token->k5->ticket); ticket_len 183 net/rxrpc/protocol.h __be32 ticket_len; /* Kerberos ticket length */ ticket_len 742 net/rxrpc/rxkad.c iov[2].iov_len = s2->ticket_len; ticket_len 869 net/rxrpc/rxkad.c resp->ticket_len = htonl(token->kad->ticket_len); ticket_len 896 net/rxrpc/rxkad.c void *ticket, size_t ticket_len, ticket_len 941 net/rxrpc/rxkad.c sg_init_one(&sg[0], ticket, ticket_len); ticket_len 943 net/rxrpc/rxkad.c skcipher_request_set_crypt(req, sg, sg, ticket_len, iv.x); ticket_len 948 net/rxrpc/rxkad.c end = p + ticket_len; ticket_len 1096 net/rxrpc/rxkad.c u32 abort_code, version, kvno, ticket_len, level; ticket_len 1116 net/rxrpc/rxkad.c ticket_len = ntohl(response->ticket_len); ticket_len 1119 net/rxrpc/rxkad.c sp->hdr.serial, version, kvno, ticket_len); ticket_len 1128 net/rxrpc/rxkad.c if (ticket_len < 4 || ticket_len > MAXKRB5TICKETLEN) ticket_len 1138 net/rxrpc/rxkad.c ticket = kmalloc(ticket_len, GFP_NOFS); ticket_len 1145 net/rxrpc/rxkad.c ticket, ticket_len) < 0) ticket_len 1148 net/rxrpc/rxkad.c ret = rxkad_decrypt_ticket(conn, skb, ticket, ticket_len, &session_key,