Lines Matching refs:ntohl
262 check = txb->seq ^ ntohl(txb->wire.callNumber); in rxkad_secure_packet_auth()
305 check = txb->seq ^ ntohl(txb->wire.callNumber); in rxkad_secure_packet_encrypt()
365 x = (ntohl(txb->wire.cid) & RXRPC_CHANNELMASK) << (32 - RXRPC_CIDSHIFT); in rxkad_secure_packet()
377 y = ntohl(crypto.buf[1]); in rxkad_secure_packet()
448 buf = ntohl(sechdr.data_size); in rxkad_verify_packet_1()
528 buf = ntohl(sechdr.data_size); in rxkad_verify_packet_2()
590 y = ntohl(crypto.buf[1]); in rxkad_verify_packet()
811 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
812 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge()
813 min_level = ntohl(challenge.min_level); in rxkad_respond_to_challenge()
941 _debug("KIV KEY : %08x %08x", ntohl(key.n[0]), ntohl(key.n[1])); in rxkad_decrypt_ticket()
994 ntohl(session_key->n[0]), ntohl(session_key->n[1])); in rxkad_decrypt_response()
1062 version = ntohl(response->version); in rxkad_verify_response()
1063 ticket_len = ntohl(response->ticket_len); in rxkad_verify_response()
1064 kvno = ntohl(response->kvno); in rxkad_verify_response()
1108 if (ntohl(response->encrypted.epoch) != conn->proto.epoch || in rxkad_verify_response()
1109 ntohl(response->encrypted.cid) != conn->proto.cid || in rxkad_verify_response()
1110 ntohl(response->encrypted.securityIndex) != conn->security_ix) { in rxkad_verify_response()
1126 u32 call_id = ntohl(response->encrypted.call_id[i]); in rxkad_verify_response()
1151 if (ntohl(response->encrypted.inc_nonce) != conn->rxkad.nonce + 1) { in rxkad_verify_response()
1157 level = ntohl(response->encrypted.level); in rxkad_verify_response()