Searched refs:mds (Results 1 - 22 of 22) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Devp_key.c117 unsigned int mds=0,i; local
132 EVP_DigestUpdate(&c,&(md_buf[0]),mds);
136 EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds);
141 EVP_DigestUpdate(&c,&(md_buf[0]),mds);
142 EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds);
150 if (i == mds) break;
157 if (niv && (i != mds))
162 if (i == mds) break;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/
H A Devp_key.c129 unsigned int mds = 0, i; local
144 if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds))
151 if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds))
157 if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds))
159 if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds))
167 if (i == mds)
175 if (niv && (i != mds)) {
179 if (i == mds)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/
H A Devp_key.c129 unsigned int mds = 0, i; local
144 if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds))
151 if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds))
157 if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds))
159 if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds))
167 if (i == mds)
175 if (niv && (i != mds)) {
179 if (i == mds)
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/winbond/
H A DMakefile2 mds.o \
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/
H A Dmdsmap.c17 * choose a random mds that is "up" (i.e. has a state > 0), or -1.
82 s32 mds, inc, state; local
94 namelen = ceph_decode_32(p); /* skip mds name */
101 mds = ceph_decode_32(p);
119 dout("mdsmap_decode %d/%d %lld mds%d.%d %s %s\n",
120 i+1, n, global_id, mds, inc, pr_addr(&addr.in_addr),
122 if (mds >= 0 && mds < m->m_max_mds && state > 0) {
123 m->m_info[mds].global_id = global_id;
124 m->m_info[mds]
[all...]
H A Dcaps.c309 * Find ceph_cap for given mds, if any.
313 static struct ceph_cap *__get_cap_for_mds(struct ceph_inode_info *ci, int mds) argument
320 if (mds < cap->mds)
322 else if (mds > cap->mds)
330 struct ceph_cap *ceph_get_cap_for_mds(struct ceph_inode_info *ci, int mds) argument
335 cap = __get_cap_for_mds(ci, mds);
346 int mds = -1; local
349 /* prefer mds wit
363 int mds; local
522 int mds = session->s_mds; local
1210 int mds; variable
1472 int mds = -1; /* keep track of how far we've gone through i_caps list local
2285 int mds = session->s_mds; variable
2583 int mds = session->s_mds; variable
2618 int mds = session->s_mds; local
2673 int mds = session->s_mds; local
2720 int mds = session->s_mds; local
2962 ceph_encode_inode_release(void **p, struct inode *inode, int mds, int drop, int unless, int force) argument
3030 ceph_encode_dentry_release(void **p, struct dentry *dentry, int mds, int drop, int unless) argument
[all...]
H A Dmds_client.c53 * mds reply parsing
126 pr_err("problem parsing mds trace %d\n", err);
202 * parse entire mds reply
244 pr_err("mds parse_reply err %d\n", err);
299 int mds)
303 if (mds >= mdsc->max_sessions || mdsc->sessions[mds] == NULL)
305 session = mdsc->sessions[mds];
312 static bool __have_session(struct ceph_mds_client *mdsc, int mds) argument
314 if (mds >
298 __ceph_lookup_mds_session(struct ceph_mds_client *mdsc, int mds) argument
332 register_session(struct ceph_mds_client *mdsc, int mds) argument
577 int mds = -1; local
718 int mds = session->s_mds; local
745 int i, mds = session->s_mds; local
1208 int mds, ret = 1; local
1528 create_request_message(struct ceph_mds_client *mdsc, struct ceph_mds_request *req, int mds) argument
1649 __prepare_send_request(struct ceph_mds_client *mdsc, struct ceph_mds_request *req, int mds) argument
1731 int mds = -1; local
1814 kick_requests(struct ceph_mds_client *mdsc, int mds) argument
1956 int mds = session->s_mds; local
2184 int mds = session->s_mds; local
2405 int mds = session->s_mds; local
2620 int mds = session->s_mds; local
[all...]
H A Dmds_client.h34 * on-wire structures within the mds reply message payload.
45 * parsed info about an mds reply, including information about the
98 unsigned long s_ttl; /* time until mds kills us */
110 u32 s_cap_gen; /* inc each time we get mds stale msg */
136 USE_AUTH_MDS, /* prefer authoritative mds for this metadata item */
149 * an in-flight mds request
156 int r_op; /* mds op code */
174 /* for choosing which mds to send this request to */
200 unsigned long r_request_started; /* start time for mds request only,
211 int r_resend_mds; /* mds t
[all...]
H A Dsuper.h101 * update the mds to avoid sending another message later.
178 * Each cap is referenced by the inode's i_caps rbtree and by per-mds
186 int mds; member in struct:ceph_cap
187 u64 cap_id; /* unique cap id (mds provided) */
188 int issued; /* latest, from the mds */
202 * Snapped cap state that is pending flush to mds. When a snapshot occurs,
244 * delegation info. That is, if mds >= 0 || ndist > 0.
256 int mds; /* -1 if same authority as parent */ member in struct:ceph_inode_frag
335 * overlapping, pipelined cap flushes to the mds. we can probably
341 struct list_head i_cap_delay_list; /* for delayed cap release to mds */
[all...]
H A Dsnap.c519 * to be used for the snapshot, to be flushed back to the mds.
751 int mds = session->s_mds; local
776 dout("handle_snap from mds%d op %s split %llx tracelen %d\n", mds,
899 pr_err("corrupt snap message from mds%d\n", mds);
H A Dinode.c135 frag->mds = -1;
218 * Process dirfrag (delegation) info from the mds. Include leaf
228 int mds = le32_to_cpu(dirinfo->auth); local
249 frag->mds = -1;
256 /* find/add this frag to store mds delegation info */
261 pr_err("fill_dirfrag ENOMEM on mds ref %llx.%llx fg %x\n",
267 frag->mds = mds;
508 /* we did a utimes(); ignore mds values */
524 dout("%p mds time_warp_se
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dtwofish.cpp49 return mds[0][GETBYTE(x,0)] ^ mds[1][GETBYTE(x,1)] ^ mds[2][GETBYTE(x,2)] ^ mds[3][GETBYTE(x,3)];
75 m_s[0][i] = mds[0][GETBYTE(t, 0)];
76 m_s[1][i] = mds[1][GETBYTE(t, 1)];
77 m_s[2][i] = mds[2][GETBYTE(t, 2)];
78 m_s[3][i] = mds[3][GETBYTE(t, 3)];
H A Dtwofish.h31 static const word32 mds[4][256]; member in class:Twofish::Base
H A Dtftables.cpp56 const word32 Twofish::Base::mds[4][256] = { member in class:Twofish::Base
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Dtwofish_common.c116 * mds[0][i] = MDS (q1[i] 0 0 0)^T mds[1][i] = MDS (0 q0[i] 0 0)^T
117 * mds[2][i] = MDS (0 0 q1[i] 0)^T mds[3][i] = MDS (0 0 0 q0[i])^T
123 static const u32 mds[4][256] = { variable
498 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \
499 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \
500 ctx->s[2][i] = mds[2][q1[(a) ^ sc] ^ sg]; \
501 ctx->s[3][i] = mds[3][q1[(b) ^ sd] ^ sh]
506 ctx->s[0][i] = mds[
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/
H A Dts_rsp_sign.c196 sk_EVP_MD_free(ctx->mds); /* No EVP_MD_free method exists. */
278 if (!ctx->mds && !(ctx->mds = sk_EVP_MD_new_null()))
281 if (!sk_EVP_MD_push(ctx->mds, (EVP_MD *)md))
531 for (i = 0; !md && i < sk_EVP_MD_num(ctx->mds); ++i) {
532 EVP_MD *current_md = sk_EVP_MD_value(ctx->mds, i);
H A Dts.h504 STACK_OF(EVP_MD) *mds; /* Acceptable message digests. */ member in struct:TS_resp_ctx
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/
H A Dts_rsp_sign.c196 sk_EVP_MD_free(ctx->mds); /* No EVP_MD_free method exists. */
278 if (!ctx->mds && !(ctx->mds = sk_EVP_MD_new_null()))
281 if (!sk_EVP_MD_push(ctx->mds, (EVP_MD *)md))
531 for (i = 0; !md && i < sk_EVP_MD_num(ctx->mds); ++i) {
532 EVP_MD *current_md = sk_EVP_MD_value(ctx->mds, i);
H A Dts.h504 STACK_OF(EVP_MD) *mds; /* Acceptable message digests. */ member in struct:TS_resp_ctx
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/
H A Dtwofish.c120 * mds[0][i] = MDS (q1[i] 0 0 0)^T mds[1][i] = MDS (0 q0[i] 0 0)^T
121 * mds[2][i] = MDS (0 0 q1[i] 0)^T mds[3][i] = MDS (0 0 0 q0[i])^T
127 static const u32 mds[4][256] = {
501 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \
502 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \
503 ctx->s[2][i] = mds[2][q1[(a) ^ sc] ^ sg]; \
504 ctx->s[3][i] = mds[3][q1[(b) ^ sd] ^ sh]
513 ctx->s[0][i] = mds[
125 static const u32 mds[4][256] = { variable
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dtwofish.c120 * mds[0][i] = MDS (q1[i] 0 0 0)^T mds[1][i] = MDS (0 q0[i] 0 0)^T
121 * mds[2][i] = MDS (0 0 q1[i] 0)^T mds[3][i] = MDS (0 0 0 q0[i])^T
127 static const u32 mds[4][256] = {
501 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \
502 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \
503 ctx->s[2][i] = mds[2][q1[(a) ^ sc] ^ sg]; \
504 ctx->s[3][i] = mds[3][q1[(b) ^ sd] ^ sh]
513 ctx->s[0][i] = mds[
125 static const u32 mds[4][256] = { variable
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/debug/kdb/
H A Dkdb_main.c1431 * 'md8' 'mdr' and 'mds' commands.
1433 * md|mds [<addr arg> [<line count> [<radix>]]]
1564 else if (strcmp(argv[0], "mds") == 0)
1648 if (strcmp(argv[0], "mds") == 0) {
1650 /* Do not save these changes as last_*, they are temporary mds
2853 kdb_register_repeat("mds", kdb_md, "<vaddr>",

Completed in 223 milliseconds