Searched refs:kvno (Results 1 - 6 of 6) sorted by relevance
/linux-master/include/keys/ |
H A D | rxrpc-type.h | 27 u32 kvno; /* key version number */ member in struct:rxkad_key 53 u32 kvno; member in struct:rxrpc_key_data_v1
|
/linux-master/net/rxrpc/ |
H A D | security.c | 160 u32 kvno, u32 enctype) 173 sp->hdr.serviceId, sp->hdr.securityIndex, kvno, enctype); 174 else if (kvno) 176 sp->hdr.serviceId, sp->hdr.securityIndex, kvno); 158 rxrpc_look_up_server_security(struct rxrpc_connection *conn, struct sk_buff *skb, u32 kvno, u32 enctype) argument
|
H A D | key.c | 91 token->kad->kvno = ntohl(xdr[1]); 101 _debug("KVNO: %u", token->kad->kvno); 271 * 12 4 kvno 325 _debug("KVNO: %u", v1->kvno); 356 token->kad->kvno = v1->kvno; 481 u32 kvno) 508 data.v1.kvno = 0; 592 toksize += 8 * 4; /* viceid, kvno, key*2, begin, 666 ENCODE(token->kad->kvno); 478 rxrpc_get_server_data_key(struct rxrpc_connection *conn, const void *session_key, time64_t expiry, u32 kvno) argument [all...] |
H A D | protocol.h | 175 __be32 kvno; /* Kerberos key version number */ member in struct:rxkad_response
|
H A D | rxkad.c | 841 resp->kvno = htonl(token->kad->kvno); 1031 u32 version, kvno, ticket_len, level; local 1067 kvno = ntohl(response->kvno); 1069 trace_rxrpc_rx_response(conn, sp->hdr.serial, version, kvno, ticket_len); 1083 if (kvno >= RXKAD_TKT_TYPE_KERBEROS_V5) { 1171 ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno);
|
/linux-master/include/trace/events/ |
H A D | rxrpc.h | 990 u32 version, u32 kvno, u32 ticket_len), 992 TP_ARGS(conn, serial, version, kvno, ticket_len), 998 __field(u32, kvno) 1006 __entry->kvno = kvno; 1010 TP_printk("C=%08x RESPONSE %08x v=%x kvno=%x tl=%x", 1014 __entry->kvno,
|
Completed in 157 milliseconds