/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | evp_key.c | 117 unsigned int mds=0,i; local 132 EVP_DigestUpdate(&c,&(md_buf[0]),mds); 136 EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); 141 EVP_DigestUpdate(&c,&(md_buf[0]),mds); 142 EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); 150 if (i == mds) break; 157 if (niv && (i != mds)) 162 if (i == mds) break;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | evp_key.c | 129 unsigned int mds = 0, i; local 144 if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds)) 151 if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds)) 157 if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds)) 159 if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds)) 167 if (i == mds) 175 if (niv && (i != mds)) { 179 if (i == mds)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | evp_key.c | 129 unsigned int mds = 0, i; local 144 if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds)) 151 if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds)) 157 if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds)) 159 if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds)) 167 if (i == mds) 175 if (niv && (i != mds)) { 179 if (i == mds)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/winbond/ |
H A D | Makefile | 2 mds.o \
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/ |
H A D | mdsmap.c | 17 * choose a random mds that is "up" (i.e. has a state > 0), or -1. 82 s32 mds, inc, state; local 94 namelen = ceph_decode_32(p); /* skip mds name */ 101 mds = ceph_decode_32(p); 119 dout("mdsmap_decode %d/%d %lld mds%d.%d %s %s\n", 120 i+1, n, global_id, mds, inc, pr_addr(&addr.in_addr), 122 if (mds >= 0 && mds < m->m_max_mds && state > 0) { 123 m->m_info[mds].global_id = global_id; 124 m->m_info[mds] [all...] |
H A D | caps.c | 309 * Find ceph_cap for given mds, if any. 313 static struct ceph_cap *__get_cap_for_mds(struct ceph_inode_info *ci, int mds) argument 320 if (mds < cap->mds) 322 else if (mds > cap->mds) 330 struct ceph_cap *ceph_get_cap_for_mds(struct ceph_inode_info *ci, int mds) argument 335 cap = __get_cap_for_mds(ci, mds); 346 int mds = -1; local 349 /* prefer mds wit 363 int mds; local 522 int mds = session->s_mds; local 1210 int mds; variable 1472 int mds = -1; /* keep track of how far we've gone through i_caps list local 2285 int mds = session->s_mds; variable 2583 int mds = session->s_mds; variable 2618 int mds = session->s_mds; local 2673 int mds = session->s_mds; local 2720 int mds = session->s_mds; local 2962 ceph_encode_inode_release(void **p, struct inode *inode, int mds, int drop, int unless, int force) argument 3030 ceph_encode_dentry_release(void **p, struct dentry *dentry, int mds, int drop, int unless) argument [all...] |
H A D | mds_client.c | 53 * mds reply parsing 126 pr_err("problem parsing mds trace %d\n", err); 202 * parse entire mds reply 244 pr_err("mds parse_reply err %d\n", err); 299 int mds) 303 if (mds >= mdsc->max_sessions || mdsc->sessions[mds] == NULL) 305 session = mdsc->sessions[mds]; 312 static bool __have_session(struct ceph_mds_client *mdsc, int mds) argument 314 if (mds > 298 __ceph_lookup_mds_session(struct ceph_mds_client *mdsc, int mds) argument 332 register_session(struct ceph_mds_client *mdsc, int mds) argument 577 int mds = -1; local 718 int mds = session->s_mds; local 745 int i, mds = session->s_mds; local 1208 int mds, ret = 1; local 1528 create_request_message(struct ceph_mds_client *mdsc, struct ceph_mds_request *req, int mds) argument 1649 __prepare_send_request(struct ceph_mds_client *mdsc, struct ceph_mds_request *req, int mds) argument 1731 int mds = -1; local 1814 kick_requests(struct ceph_mds_client *mdsc, int mds) argument 1956 int mds = session->s_mds; local 2184 int mds = session->s_mds; local 2405 int mds = session->s_mds; local 2620 int mds = session->s_mds; local [all...] |
H A D | mds_client.h | 34 * on-wire structures within the mds reply message payload. 45 * parsed info about an mds reply, including information about the 98 unsigned long s_ttl; /* time until mds kills us */ 110 u32 s_cap_gen; /* inc each time we get mds stale msg */ 136 USE_AUTH_MDS, /* prefer authoritative mds for this metadata item */ 149 * an in-flight mds request 156 int r_op; /* mds op code */ 174 /* for choosing which mds to send this request to */ 200 unsigned long r_request_started; /* start time for mds request only, 211 int r_resend_mds; /* mds t [all...] |
H A D | super.h | 101 * update the mds to avoid sending another message later. 178 * Each cap is referenced by the inode's i_caps rbtree and by per-mds 186 int mds; member in struct:ceph_cap 187 u64 cap_id; /* unique cap id (mds provided) */ 188 int issued; /* latest, from the mds */ 202 * Snapped cap state that is pending flush to mds. When a snapshot occurs, 244 * delegation info. That is, if mds >= 0 || ndist > 0. 256 int mds; /* -1 if same authority as parent */ member in struct:ceph_inode_frag 335 * overlapping, pipelined cap flushes to the mds. we can probably 341 struct list_head i_cap_delay_list; /* for delayed cap release to mds */ [all...] |
H A D | snap.c | 519 * to be used for the snapshot, to be flushed back to the mds. 751 int mds = session->s_mds; local 776 dout("handle_snap from mds%d op %s split %llx tracelen %d\n", mds, 899 pr_err("corrupt snap message from mds%d\n", mds);
|
H A D | inode.c | 135 frag->mds = -1; 218 * Process dirfrag (delegation) info from the mds. Include leaf 228 int mds = le32_to_cpu(dirinfo->auth); local 249 frag->mds = -1; 256 /* find/add this frag to store mds delegation info */ 261 pr_err("fill_dirfrag ENOMEM on mds ref %llx.%llx fg %x\n", 267 frag->mds = mds; 508 /* we did a utimes(); ignore mds values */ 524 dout("%p mds time_warp_se [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | twofish.cpp | 49 return mds[0][GETBYTE(x,0)] ^ mds[1][GETBYTE(x,1)] ^ mds[2][GETBYTE(x,2)] ^ mds[3][GETBYTE(x,3)]; 75 m_s[0][i] = mds[0][GETBYTE(t, 0)]; 76 m_s[1][i] = mds[1][GETBYTE(t, 1)]; 77 m_s[2][i] = mds[2][GETBYTE(t, 2)]; 78 m_s[3][i] = mds[3][GETBYTE(t, 3)];
|
H A D | twofish.h | 31 static const word32 mds[4][256]; member in class:Twofish::Base
|
H A D | tftables.cpp | 56 const word32 Twofish::Base::mds[4][256] = { member in class:Twofish::Base
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | twofish_common.c | 116 * mds[0][i] = MDS (q1[i] 0 0 0)^T mds[1][i] = MDS (0 q0[i] 0 0)^T 117 * mds[2][i] = MDS (0 0 q1[i] 0)^T mds[3][i] = MDS (0 0 0 q0[i])^T 123 static const u32 mds[4][256] = { variable 498 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \ 499 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \ 500 ctx->s[2][i] = mds[2][q1[(a) ^ sc] ^ sg]; \ 501 ctx->s[3][i] = mds[3][q1[(b) ^ sd] ^ sh] 506 ctx->s[0][i] = mds[ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/ |
H A D | ts_rsp_sign.c | 196 sk_EVP_MD_free(ctx->mds); /* No EVP_MD_free method exists. */ 278 if (!ctx->mds && !(ctx->mds = sk_EVP_MD_new_null())) 281 if (!sk_EVP_MD_push(ctx->mds, (EVP_MD *)md)) 531 for (i = 0; !md && i < sk_EVP_MD_num(ctx->mds); ++i) { 532 EVP_MD *current_md = sk_EVP_MD_value(ctx->mds, i);
|
H A D | ts.h | 504 STACK_OF(EVP_MD) *mds; /* Acceptable message digests. */ member in struct:TS_resp_ctx
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 196 sk_EVP_MD_free(ctx->mds); /* No EVP_MD_free method exists. */ 278 if (!ctx->mds && !(ctx->mds = sk_EVP_MD_new_null())) 281 if (!sk_EVP_MD_push(ctx->mds, (EVP_MD *)md)) 531 for (i = 0; !md && i < sk_EVP_MD_num(ctx->mds); ++i) { 532 EVP_MD *current_md = sk_EVP_MD_value(ctx->mds, i);
|
H A D | ts.h | 504 STACK_OF(EVP_MD) *mds; /* Acceptable message digests. */ member in struct:TS_resp_ctx
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | twofish.c | 120 * mds[0][i] = MDS (q1[i] 0 0 0)^T mds[1][i] = MDS (0 q0[i] 0 0)^T 121 * mds[2][i] = MDS (0 0 q1[i] 0)^T mds[3][i] = MDS (0 0 0 q0[i])^T 127 static const u32 mds[4][256] = { 501 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \ 502 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \ 503 ctx->s[2][i] = mds[2][q1[(a) ^ sc] ^ sg]; \ 504 ctx->s[3][i] = mds[3][q1[(b) ^ sd] ^ sh] 513 ctx->s[0][i] = mds[ 125 static const u32 mds[4][256] = { variable [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | twofish.c | 120 * mds[0][i] = MDS (q1[i] 0 0 0)^T mds[1][i] = MDS (0 q0[i] 0 0)^T 121 * mds[2][i] = MDS (0 0 q1[i] 0)^T mds[3][i] = MDS (0 0 0 q0[i])^T 127 static const u32 mds[4][256] = { 501 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \ 502 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \ 503 ctx->s[2][i] = mds[2][q1[(a) ^ sc] ^ sg]; \ 504 ctx->s[3][i] = mds[3][q1[(b) ^ sd] ^ sh] 513 ctx->s[0][i] = mds[ 125 static const u32 mds[4][256] = { variable [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/debug/kdb/ |
H A D | kdb_main.c | 1431 * 'md8' 'mdr' and 'mds' commands. 1433 * md|mds [<addr arg> [<line count> [<radix>]]] 1564 else if (strcmp(argv[0], "mds") == 0) 1648 if (strcmp(argv[0], "mds") == 0) { 1650 /* Do not save these changes as last_*, they are temporary mds 2853 kdb_register_repeat("mds", kdb_md, "<vaddr>",
|