Lines Matching refs:__be32
13 typedef __be32 rxrpc_seq_net_t; /* on-the-wire Rx message sequence number */
14 typedef __be32 rxrpc_serial_net_t; /* on-the-wire Rx message serial number */
22 __be32 epoch; /* client boot timestamp */
25 __be32 cid; /* connection and channel ID */
32 __be32 callNumber; /* call ID (0 for connection-level packets) */
33 __be32 seq; /* sequence number of pkt in call stream */
34 __be32 serial; /* serial number of pkt sent to network */
110 __be32 firstPacket; /* sequence no of first ACK'd packet in attached list */
111 __be32 previousPacket; /* sequence no of previous packet received */
112 __be32 serial; /* serial no of packet that prompted this ACK */
146 __be32 rxMTU; /* maximum Rx MTU size (bytes) [AFS 3.3] */
147 __be32 maxMTU; /* maximum interface MTU size (bytes) [AFS 3.3] */
148 __be32 rwind; /* Rx window size (packets) [AFS 3.4] */
149 __be32 jumbo_max; /* max packets to stick into a jumbo packet [AFS 3.5] */
157 __be32 version; /* version of this challenge type */
158 __be32 nonce; /* encrypted random number */
159 __be32 min_level; /* minimum security level */
160 __be32 __padding; /* padding to 8-byte boundary */
168 __be32 version; /* version of this response type */
169 __be32 __pad;
173 __be32 epoch; /* current epoch */
174 __be32 cid; /* parent connection ID */
175 __be32 checksum; /* checksum */
176 __be32 securityIndex; /* security type */
177 __be32 call_id[4]; /* encrypted call IDs */
178 __be32 inc_nonce; /* challenge nonce + 1 */
179 __be32 level; /* desired level */
182 __be32 kvno; /* Kerberos key version number */
183 __be32 ticket_len; /* Kerberos ticket length */