Home
last modified time | relevance | path

Searched refs:ticket_len (Results 1 – 5 of 5) sorted by relevance

/linux-6.12.1/net/rxrpc/
Drxkad.c722 iov[2].iov_len = s2->ticket_len; in rxkad_send_response()
842 resp->ticket_len = htonl(token->kad->ticket_len); in rxkad_respond_to_challenge()
863 void *ticket, size_t ticket_len, in rxkad_decrypt_ticket() argument
889 sg_init_one(&sg[0], ticket, ticket_len); in rxkad_decrypt_ticket()
891 skcipher_request_set_crypt(req, sg, sg, ticket_len, iv.x); in rxkad_decrypt_ticket()
896 end = p + ticket_len; in rxkad_decrypt_ticket()
1031 u32 version, kvno, ticket_len, level; in rxkad_verify_response() local
1066 ticket_len = ntohl(response->ticket_len); in rxkad_verify_response()
1069 trace_rxrpc_rx_response(conn, sp->hdr.serial, version, kvno, ticket_len); in rxkad_verify_response()
1077 if (ticket_len < 4 || ticket_len > MAXKRB5TICKETLEN) { in rxkad_verify_response()
[all …]
Dkey.c89 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad()
99 _debug("TLEN: %u", token->kad->ticket_len); in rxrpc_preparse_xdr_rxkad()
108 if (token->kad->ticket_len >= 8) in rxrpc_preparse_xdr_rxkad()
354 token->kad->ticket_len = v1->ticket_length; in rxrpc_preparse()
595 toksize += RND(token->kad->ticket_len); in rxrpc_read()
674 ENCODE_DATA(token->kad->ticket_len, token->kad->ticket); in rxrpc_read()
Dprotocol.h176 __be32 ticket_len; /* Kerberos ticket length */ member
/linux-6.12.1/include/keys/
Drxrpc-type.h29 u16 ticket_len; /* length of ticket[] */ member
/linux-6.12.1/include/trace/events/
Drxrpc.h991 u32 version, u32 kvno, u32 ticket_len),
993 TP_ARGS(conn, serial, version, kvno, ticket_len),
1000 __field(u32, ticket_len)
1008 __entry->ticket_len = ticket_len;
1016 __entry->ticket_len)