/fs/crypto/ |
D | fscrypt_private.h | 89 struct fscrypt_context_v1 v1; member 101 BUILD_BUG_ON(sizeof(ctx->v1) != 28); in fscrypt_context_size() 102 return sizeof(ctx->v1); in fscrypt_context_size() 122 return ctx->v1.nonce; in fscrypt_context_nonce() 132 struct fscrypt_policy_v1 v1; member 144 return sizeof(policy->v1); in fscrypt_policy_size() 157 return policy->v1.contents_encryption_mode; in fscrypt_policy_contents_mode() 170 return policy->v1.filenames_encryption_mode; in fscrypt_policy_fnames_mode() 183 return policy->v1.flags; in fscrypt_policy_flags()
|
D | keysetup_v1.c | 195 memcpy(&hash_key, ci->ci_policy.v1.master_key_descriptor, in find_or_insert_direct_key() 200 if (memcmp(ci->ci_policy.v1.master_key_descriptor, in find_or_insert_direct_key() 243 memcpy(dk->dk_descriptor, ci->ci_policy.v1.master_key_descriptor, in fscrypt_get_direct_key() 297 if (ci->ci_policy.v1.flags & FSCRYPT_POLICY_FLAG_DIRECT_KEY) in fscrypt_setup_v1_file_key() 312 ci->ci_policy.v1.master_key_descriptor, in fscrypt_setup_v1_file_key_via_subscribed_keyrings() 316 ci->ci_policy.v1.master_key_descriptor, in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
D | policy.c | 42 memcpy(key_spec->u.descriptor, policy->v1.master_key_descriptor, in fscrypt_policy_to_key_spec() 307 return fscrypt_supported_v1_policy(&policy_u->v1, inode); in fscrypt_supported_policy() 333 const struct fscrypt_policy_v1 *policy = &policy_u->v1; in fscrypt_new_context() 334 struct fscrypt_context_v1 *ctx = &ctx_u->v1; in fscrypt_new_context() 395 const struct fscrypt_context_v1 *ctx = &ctx_u->v1; in fscrypt_policy_from_context() 396 struct fscrypt_policy_v1 *policy = &policy_u->v1; in fscrypt_policy_from_context() 581 if (copy_to_user(arg, &policy, sizeof(policy.v1))) in fscrypt_ioctl_get_policy() 819 policy->v1.contents_encryption_mode = FSCRYPT_MODE_AES_256_XTS; in fscrypt_parse_test_dummy_encryption() 820 policy->v1.filenames_encryption_mode = FSCRYPT_MODE_AES_256_CTS; in fscrypt_parse_test_dummy_encryption() 821 memset(policy->v1.master_key_descriptor, 0x42, in fscrypt_parse_test_dummy_encryption()
|
/fs/adfs/ |
D | map.c | 262 unsigned int v0, v1, v2, v3; in adfs_calczonecheck() local 265 v0 = v1 = v2 = v3 = 0; in adfs_calczonecheck() 269 v1 += map[i + 1] + (v0 >> 8); in adfs_calczonecheck() 271 v2 += map[i + 2] + (v1 >> 8); in adfs_calczonecheck() 272 v1 &= 0xff; in adfs_calczonecheck() 277 v1 += map[1] + (v0 >> 8); in adfs_calczonecheck() 278 v2 += map[2] + (v1 >> 8); in adfs_calczonecheck() 281 return v0 ^ v1 ^ v2 ^ v3; in adfs_calczonecheck()
|
/fs/afs/ |
D | dynroot.c | 139 struct dns_server_list_v1_header *v1 = (void *)result; in afs_probe_cell_name() local 141 if (v1->hdr.zero == 0 && in afs_probe_cell_name() 142 v1->hdr.content == DNS_PAYLOAD_IS_SERVER_LIST && in afs_probe_cell_name() 143 v1->hdr.version == 1 && in afs_probe_cell_name() 144 (v1->status != DNS_LOOKUP_GOOD && in afs_probe_cell_name() 145 v1->status != DNS_LOOKUP_GOOD_WITH_BAD)) in afs_probe_cell_name()
|
/fs/nfs/ |
D | internal.h | 600 nfs_write_verifier_cmp(const struct nfs_write_verifier *v1, in nfs_write_verifier_cmp() argument 603 return memcmp(v1->data, v2->data, sizeof(v1->data)); in nfs_write_verifier_cmp()
|
D | nfs4client.c | 523 static bool nfs4_same_verifier(nfs4_verifier *v1, nfs4_verifier *v2) in nfs4_same_verifier() argument 525 return memcmp(v1->data, v2->data, sizeof(v1->data)) == 0; in nfs4_same_verifier()
|
/fs/ceph/ |
D | mds_client.c | 4300 struct ceph_mds_cap_reconnect_v1 v1; in reconnect_caps_cb() member 4361 rec.v1.cap_id = cpu_to_le64(cap->cap_id); in reconnect_caps_cb() 4362 rec.v1.wanted = cpu_to_le32(__ceph_caps_wanted(ci)); in reconnect_caps_cb() 4363 rec.v1.issued = cpu_to_le32(cap->issued); in reconnect_caps_cb() 4364 rec.v1.size = cpu_to_le64(i_size_read(inode)); in reconnect_caps_cb() 4365 ceph_encode_timespec64(&rec.v1.mtime, &inode->i_mtime); in reconnect_caps_cb() 4366 ceph_encode_timespec64(&rec.v1.atime, &inode->i_atime); in reconnect_caps_cb() 4367 rec.v1.snaprealm = cpu_to_le64(ci->i_snap_realm->ino); in reconnect_caps_cb() 4368 rec.v1.pathbase = cpu_to_le64(pathbase); in reconnect_caps_cb() 4465 pathlen + sizeof(rec.v1)); in reconnect_caps_cb() [all …]
|
/fs/smb/client/ |
D | smb2pdu.c | 4435 struct smbd_buffer_descriptor_v1 *v1; in smb2_new_read_req() local 4450 v1 = (struct smbd_buffer_descriptor_v1 *) &req->Buffer[0]; in smb2_new_read_req() 4451 v1->offset = cpu_to_le64(rdata->mr->mr->iova); in smb2_new_read_req() 4452 v1->token = cpu_to_le32(rdata->mr->mr->rkey); in smb2_new_read_req() 4453 v1->length = cpu_to_le32(rdata->mr->mr->length); in smb2_new_read_req() 4455 *total_len += sizeof(*v1) - 1; in smb2_new_read_req() 4889 struct smbd_buffer_descriptor_v1 *v1; in smb2_async_writev() local 4909 v1 = (struct smbd_buffer_descriptor_v1 *) &req->Buffer[0]; in smb2_async_writev() 4910 v1->offset = cpu_to_le64(wdata->mr->mr->iova); in smb2_async_writev() 4911 v1->token = cpu_to_le32(wdata->mr->mr->rkey); in smb2_async_writev() [all …]
|
/fs/fuse/ |
D | file.c | 415 u32 v1 = v >> 32; in fuse_lock_owner_id() local 420 v0 += ((v1 << 4 ^ v1 >> 5) + v1) ^ (sum + k[sum & 3]); in fuse_lock_owner_id() 422 v1 += ((v0 << 4 ^ v0 >> 5) + v0) ^ (sum + k[sum>>11 & 3]); in fuse_lock_owner_id() 425 return (u64) v0 + ((u64) v1 << 32); in fuse_lock_owner_id()
|
/fs/ntfs/ |
D | layout.h | 876 } __attribute__ ((__packed__)) v1; member
|
/fs/btrfs/ |
D | volumes.c | 4139 #define CHECK_APPEND_1ARG(a, v1) \ in describe_balance_args() argument 4141 ret = snprintf(bp, size_bp, (a), (v1)); \ in describe_balance_args() 4148 #define CHECK_APPEND_2ARG(a, v1, v2) \ in describe_balance_args() argument 4150 ret = snprintf(bp, size_bp, (a), (v1), (v2)); \ in describe_balance_args() 4227 #define CHECK_APPEND_1ARG(a, v1) \ in describe_balance_start_or_resume() argument 4229 ret = snprintf(bp, size_bp, (a), (v1)); \ in describe_balance_start_or_resume()
|
/fs/nfsd/ |
D | nfs4state.c | 2344 same_verf(nfs4_verifier *v1, nfs4_verifier *v2) in same_verf() argument 2346 return 0 == memcmp(v1->data, v2->data, sizeof(v1->data)); in same_verf()
|