Searched refs:kad (Results 1 – 3 of 3) sorted by relevance
/linux-6.6.21/net/rxrpc/ |
D | key.c | 74 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad() 82 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 83 if (!token->kad) { in rxrpc_preparse_xdr_rxkad() 89 token->kad->ticket_len = tktlen; in rxrpc_preparse_xdr_rxkad() 90 token->kad->vice_id = ntohl(xdr[0]); in rxrpc_preparse_xdr_rxkad() 91 token->kad->kvno = ntohl(xdr[1]); in rxrpc_preparse_xdr_rxkad() 92 token->kad->start = ntohl(xdr[4]); in rxrpc_preparse_xdr_rxkad() 93 token->kad->expiry = ntohl(xdr[5]); in rxrpc_preparse_xdr_rxkad() 94 token->kad->primary_flag = ntohl(xdr[6]); in rxrpc_preparse_xdr_rxkad() 95 memcpy(&token->kad->session_key, &xdr[2], 8); in rxrpc_preparse_xdr_rxkad() [all …]
|
D | rxkad.c | 117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, in rxkad_init_connection_security() 118 sizeof(token->kad->session_key)) < 0) in rxkad_init_connection_security() 209 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 321 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt() 511 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_verify_packet_2() 840 resp->kvno = htonl(token->kad->kvno); in rxkad_respond_to_challenge() 841 resp->ticket_len = htonl(token->kad->ticket_len); in rxkad_respond_to_challenge() 849 ret = rxkad_encrypt_response(conn, resp, token->kad); in rxkad_respond_to_challenge() 851 ret = rxkad_send_response(conn, &sp->hdr, resp, token->kad); in rxkad_respond_to_challenge()
|
/linux-6.6.21/include/keys/ |
D | rxrpc-type.h | 42 struct rxkad_key *kad; member
|