Lines Matching refs:response

687  * send a Kerberos security response
743 * calculate the response checksum
745 static void rxkad_calc_response_checksum(struct rxkad_response *response)
749 u8 *p = (u8 *) response;
751 for (loop = sizeof(*response); loop > 0; loop--)
754 response->encrypted.checksum = htonl(csum);
758 * encrypt the response packet
830 /* build the response packet */
848 /* calculate the response checksum and then do the encryption */
858 * decrypt the kerberos IV ticket in the response
986 * decrypt the response packet
1020 * verify a response
1025 struct rxkad_response *response;
1054 response = kzalloc(sizeof(struct rxkad_response), GFP_NOFS);
1055 if (!response)
1059 response, sizeof(*response)) < 0) {
1065 version = ntohl(response->version);
1066 ticket_len = ntohl(response->ticket_len);
1067 kvno = ntohl(response->kvno);
1095 if (skb_copy_bits(skb, sizeof(struct rxrpc_wire_header) + sizeof(*response),
1108 * response */
1109 rxkad_decrypt_response(conn, response, &session_key);
1111 if (ntohl(response->encrypted.epoch) != conn->proto.epoch ||
1112 ntohl(response->encrypted.cid) != conn->proto.cid ||
1113 ntohl(response->encrypted.securityIndex) != conn->security_ix) {
1119 csum = response->encrypted.checksum;
1120 response->encrypted.checksum = 0;
1121 rxkad_calc_response_checksum(response);
1122 if (response->encrypted.checksum != csum) {
1129 u32 call_id = ntohl(response->encrypted.call_id[i]);
1154 if (ntohl(response->encrypted.inc_nonce) != conn->rxkad.nonce + 1) {
1160 level = ntohl(response->encrypted.level);
1176 kfree(response);
1183 kfree(response);
1190 kfree(response);
1192 /* Ignore the response packet if we got a temporary error such as