Lines Matching refs:__be32

13 typedef __be32	rxrpc_seq_net_t; /* on-the-wire Rx message sequence number */
14 typedef __be32 rxrpc_serial_net_t; /* on-the-wire Rx message serial number */
22 __be32 epoch; /* client boot timestamp */
25 __be32 cid; /* connection and channel ID */
32 __be32 callNumber; /* call ID (0 for connection-level packets) */
33 __be32 seq; /* sequence number of pkt in call stream */
34 __be32 serial; /* serial number of pkt sent to network */
110 __be32 firstPacket; /* sequence no of first ACK'd packet in attached list */
111 __be32 previousPacket; /* sequence no of previous packet received */
112 __be32 serial; /* serial no of packet that prompted this ACK */
139 __be32 maxMTU; /* maximum Rx MTU size (bytes) [AFS 3.3] */
140 __be32 ifMTU; /* maximum interface MTU size (bytes) [AFS 3.3] */
141 __be32 rwind; /* Rx window size (packets) [AFS 3.4] */
142 __be32 jumbo_max; /* max packets to stick into a jumbo packet [AFS 3.5] */
150 __be32 version; /* version of this challenge type */
151 __be32 nonce; /* encrypted random number */
152 __be32 min_level; /* minimum security level */
153 __be32 __padding; /* padding to 8-byte boundary */
161 __be32 version; /* version of this response type */
162 __be32 __pad;
166 __be32 epoch; /* current epoch */
167 __be32 cid; /* parent connection ID */
168 __be32 checksum; /* checksum */
169 __be32 securityIndex; /* security type */
170 __be32 call_id[4]; /* encrypted call IDs */
171 __be32 inc_nonce; /* challenge nonce + 1 */
172 __be32 level; /* desired level */
175 __be32 kvno; /* Kerberos key version number */
176 __be32 ticket_len; /* Kerberos ticket length */