Searched refs:extracts (Results 1 – 22 of 22) sorted by relevance
36 extr = &dpni_ext->extracts[i]; in dpni_prepare_key_cfg()38 switch (cfg->extracts[i].type) { in dpni_prepare_key_cfg()40 extr->prot = cfg->extracts[i].extract.from_hdr.prot; in dpni_prepare_key_cfg()42 cfg->extracts[i].extract.from_hdr.type); in dpni_prepare_key_cfg()43 extr->size = cfg->extracts[i].extract.from_hdr.size; in dpni_prepare_key_cfg()44 extr->offset = cfg->extracts[i].extract.from_hdr.offset; in dpni_prepare_key_cfg()46 cfg->extracts[i].extract.from_hdr.field); in dpni_prepare_key_cfg()48 cfg->extracts[i].extract.from_hdr.hdr_index; in dpni_prepare_key_cfg()51 extr->size = cfg->extracts[i].extract.from_data.size; in dpni_prepare_key_cfg()53 cfg->extracts[i].extract.from_data.offset; in dpni_prepare_key_cfg()[all …]
478 struct dpkg_extract extracts[DPKG_MAX_NUM_OF_EXTRACTS]; member
444 struct dpni_dist_extract extracts[DPKG_MAX_NUM_OF_EXTRACTS]; member
3498 kg_cfg.extracts[0].type = DPKG_EXTRACT_FROM_HDR; in dpaa2_eth_set_vlan_qos()3499 kg_cfg.extracts[0].extract.from_hdr.prot = NET_PROT_VLAN; in dpaa2_eth_set_vlan_qos()3500 kg_cfg.extracts[0].extract.from_hdr.type = DPKG_FULL_FIELD; in dpaa2_eth_set_vlan_qos()3501 kg_cfg.extracts[0].extract.from_hdr.field = NH_FLD_VLAN_TCI; in dpaa2_eth_set_vlan_qos()4033 &cls_cfg.extracts[cls_cfg.num_extracts]; in dpaa2_eth_set_dist_key()
7 mode, IP receives audio in AES format, extracts PCM and sends
14 This script downloads and extracts the firmware, creating wd719x-risc.bin and
29 | extracts and shifts. The three msbs from d2 will go into55 | d6: temp for bit-field extracts
10 | The entry point sGETMAN extracts the mantissa of the
57 bareudp device extracts and stores the tunnel information in SKB dst field before
43 flow key that it parsed from the packet. Userspace then extracts its
34 and extracts dump keys with which the VM dump data will be encrypted.
46 library parses and extracts this data into simpler structures for ease of
26 The _tep_print_field()_ function extracts from the recorded raw _data_ value of
17 data packets. This is passed along the MIPI CSI-2 Rx IP which extracts the
75 connector. The driver extracts the correct port numbers by reading specific _DSD
83 Once this file gets to the driver, the driver extracts packet_size data from
193 - ``parse`` extracts the KTAP output from a kernel log, parses
32 with boot wrapper code that extracts data from the old
329 Third, it extracts up to nfetch offsets into the mmap buffer, and stores
432 A helper function that extracts the physical address from the edid struct
25 Python script that aggregates and extracts useful information from a
7501 # sgetman(): extracts the mantissa of the input argument. The #