Searched refs:extracts (Results 1 – 19 of 19) sorted by relevance
36 extr = &dpni_ext->extracts[i]; in dpni_prepare_key_cfg()38 switch (cfg->extracts[i].type) { in dpni_prepare_key_cfg()40 extr->prot = cfg->extracts[i].extract.from_hdr.prot; in dpni_prepare_key_cfg()42 cfg->extracts[i].extract.from_hdr.type); in dpni_prepare_key_cfg()43 extr->size = cfg->extracts[i].extract.from_hdr.size; in dpni_prepare_key_cfg()44 extr->offset = cfg->extracts[i].extract.from_hdr.offset; in dpni_prepare_key_cfg()46 cfg->extracts[i].extract.from_hdr.field); in dpni_prepare_key_cfg()48 cfg->extracts[i].extract.from_hdr.hdr_index; in dpni_prepare_key_cfg()51 extr->size = cfg->extracts[i].extract.from_data.size; in dpni_prepare_key_cfg()53 cfg->extracts[i].extract.from_data.offset; in dpni_prepare_key_cfg()[all …]
478 struct dpkg_extract extracts[DPKG_MAX_NUM_OF_EXTRACTS]; member
451 struct dpni_dist_extract extracts[DPKG_MAX_NUM_OF_EXTRACTS]; member
3715 kg_cfg.extracts[0].type = DPKG_EXTRACT_FROM_HDR; in dpaa2_eth_set_vlan_qos()3716 kg_cfg.extracts[0].extract.from_hdr.prot = NET_PROT_VLAN; in dpaa2_eth_set_vlan_qos()3717 kg_cfg.extracts[0].extract.from_hdr.type = DPKG_FULL_FIELD; in dpaa2_eth_set_vlan_qos()3718 kg_cfg.extracts[0].extract.from_hdr.field = NH_FLD_VLAN_TCI; in dpaa2_eth_set_vlan_qos()4251 &cls_cfg.extracts[cls_cfg.num_extracts]; in dpaa2_eth_set_dist_key()
9 mode, IP receives audio in AES format, extracts PCM and sends
14 This script downloads and extracts the firmware, creating wd719x-risc.bin and
29 | extracts and shifts. The three msbs from d2 will go into55 | d6: temp for bit-field extracts
10 | The entry point sGETMAN extracts the mantissa of the
58 bareUDP device extracts and stores the tunnel information in the SKB dst field before
43 flow key that it parsed from the packet. Userspace then extracts its
34 and extracts dump keys with which the VM dump data will be encrypted.
45 library parses and extracts this data into simpler structures for ease of
75 connector. The driver extracts the correct port numbers by reading specific _DSD
83 Once this file gets to the driver, the driver extracts packet_size data from
194 - ``parse`` extracts the KTAP output from a kernel log, parses
32 with boot wrapper code that extracts data from the old
329 Third, it extracts up to nfetch offsets into the mmap buffer, and stores
456 A helper function that extracts the physical address from the edid struct
7501 # sgetman(): extracts the mantissa of the input argument. The #