Searched refs:kvno (Results 1 – 7 of 7) sorted by relevance
/openbmc/linux/net/rxrpc/ |
H A D | security.c | 160 u32 kvno, u32 enctype) in rxrpc_look_up_server_security() argument 173 sp->hdr.serviceId, sp->hdr.securityIndex, kvno, enctype); in rxrpc_look_up_server_security() 174 else if (kvno) in rxrpc_look_up_server_security() 176 sp->hdr.serviceId, sp->hdr.securityIndex, kvno); in rxrpc_look_up_server_security()
|
H A D | key.c | 91 token->kad->kvno = ntohl(xdr[1]); in rxrpc_preparse_xdr_rxkad() 101 _debug("KVNO: %u", token->kad->kvno); in rxrpc_preparse_xdr_rxkad() 325 _debug("KVNO: %u", v1->kvno); in rxrpc_preparse() 356 token->kad->kvno = v1->kvno; in rxrpc_preparse() 481 u32 kvno) in rxrpc_get_server_data_key() argument 508 data.v1.kvno = 0; in rxrpc_get_server_data_key() 666 ENCODE(token->kad->kvno); in rxrpc_read()
|
H A D | rxkad.c | 840 resp->kvno = htonl(token->kad->kvno); in rxkad_respond_to_challenge() 1030 u32 version, kvno, ticket_len, level; in rxkad_verify_response() local 1066 kvno = ntohl(response->kvno); in rxkad_verify_response() 1068 trace_rxrpc_rx_response(conn, sp->hdr.serial, version, kvno, ticket_len); in rxkad_verify_response() 1082 if (kvno >= RXKAD_TKT_TYPE_KERBEROS_V5) { in rxkad_verify_response() 1170 ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno); in rxkad_verify_response()
|
H A D | protocol.h | 175 __be32 kvno; /* Kerberos key version number */ member
|
/openbmc/linux/include/keys/ |
H A D | rxrpc-type.h | 27 u32 kvno; /* key version number */ member 53 u32 kvno; member
|
/openbmc/linux/include/trace/events/ |
H A D | rxrpc.h | 996 u32 version, u32 kvno, u32 ticket_len), 998 TP_ARGS(conn, serial, version, kvno, ticket_len), 1004 __field(u32, kvno) 1012 __entry->kvno = kvno; 1020 __entry->kvno,
|
/openbmc/linux/Documentation/networking/ |
H A D | rxrpc.rst | 518 uint8_t kvno; /* key version number */
|