Home
last modified time | relevance | path

Searched refs:ticket_len (Results 1 - 9 of 9) sorted by relevance

/kernel/linux/linux-5.10/net/rxrpc/
H A Drxkad.c742 iov[2].iov_len = s2->ticket_len; in rxkad_send_response()
869 resp->ticket_len = htonl(token->kad->ticket_len); in rxkad_respond_to_challenge()
896 void *ticket, size_t ticket_len, in rxkad_decrypt_ticket()
941 sg_init_one(&sg[0], ticket, ticket_len); in rxkad_decrypt_ticket()
943 skcipher_request_set_crypt(req, sg, sg, ticket_len, iv.x); in rxkad_decrypt_ticket()
948 end = p + ticket_len; in rxkad_decrypt_ticket()
1096 u32 abort_code, version, kvno, ticket_len, level; in rxkad_verify_response() local
1116 ticket_len = ntohl(response->ticket_len); in rxkad_verify_response()
894 rxkad_decrypt_ticket(struct rxrpc_connection *conn, struct sk_buff *skb, void *ticket, size_t ticket_len, struct rxrpc_crypt *_session_key, time64_t *_expiry, u32 *_abort_code) rxkad_decrypt_ticket() argument
[all...]
H A Dkey.c125 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad()
135 _debug("TLEN: %u", token->kad->ticket_len); in rxrpc_preparse_xdr_rxkad()
144 if (token->kad->ticket_len >= 8) in rxrpc_preparse_xdr_rxkad()
506 ret = rxrpc_krb5_decode_ticket(&rxk5->ticket, &rxk5->ticket_len, in rxrpc_preparse_xdr_rxk5()
769 token->kad->ticket_len = v1->ticket_length; in rxrpc_preparse()
1077 toksize += RND(token->kad->ticket_len); in rxrpc_read()
1101 toksize += 4 + RND(token->k5->ticket_len); in rxrpc_read()
1181 ENCODE_DATA(token->kad->ticket_len, token->kad->ticket); in rxrpc_read()
1215 ENCODE_DATA(token->k5->ticket_len, token->k5->ticket); in rxrpc_read()
H A Dprotocol.h183 __be32 ticket_len; /* Kerberos ticket length */ member
/kernel/linux/linux-6.6/net/rxrpc/
H A Drxkad.c720 iov[2].iov_len = s2->ticket_len; in rxkad_send_response()
841 resp->ticket_len = htonl(token->kad->ticket_len); in rxkad_respond_to_challenge()
862 void *ticket, size_t ticket_len, in rxkad_decrypt_ticket()
888 sg_init_one(&sg[0], ticket, ticket_len); in rxkad_decrypt_ticket()
890 skcipher_request_set_crypt(req, sg, sg, ticket_len, iv.x); in rxkad_decrypt_ticket()
895 end = p + ticket_len; in rxkad_decrypt_ticket()
1030 u32 version, kvno, ticket_len, level; in rxkad_verify_response() local
1065 ticket_len = ntohl(response->ticket_len); in rxkad_verify_response()
859 rxkad_decrypt_ticket(struct rxrpc_connection *conn, struct key *server_key, struct sk_buff *skb, void *ticket, size_t ticket_len, struct rxrpc_crypt *_session_key, time64_t *_expiry) rxkad_decrypt_ticket() argument
[all...]
H A Dkey.c89 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad()
99 _debug("TLEN: %u", token->kad->ticket_len); in rxrpc_preparse_xdr_rxkad()
108 if (token->kad->ticket_len >= 8) in rxrpc_preparse_xdr_rxkad()
354 token->kad->ticket_len = v1->ticket_length; in rxrpc_preparse()
595 toksize += RND(token->kad->ticket_len); in rxrpc_read()
674 ENCODE_DATA(token->kad->ticket_len, token->kad->ticket); in rxrpc_read()
H A Dprotocol.h176 __be32 ticket_len; /* Kerberos ticket length */ member
/kernel/linux/linux-5.10/include/keys/
H A Drxrpc-type.h29 u16 ticket_len; /* length of ticket[] */ member
70 u16 ticket_len; /* length of ticket */ member
/kernel/linux/linux-6.6/include/keys/
H A Drxrpc-type.h29 u16 ticket_len; /* length of ticket[] */ member
/kernel/linux/linux-6.6/include/trace/events/
H A Drxrpc.h995 u32 version, u32 kvno, u32 ticket_len),
997 TP_ARGS(conn, serial, version, kvno, ticket_len),
1004 __field(u32, ticket_len)
1012 __entry->ticket_len = ticket_len;
1020 __entry->ticket_len)

Completed in 9 milliseconds