/openbmc/linux/drivers/gpu/drm/amd/amdkfd/ |
D | kfd_packet_manager_vi.c |
|
/openbmc/linux/tools/perf/util/intel-pt-decoder/ |
D | intel-pt-pkt-decoder.c |
|
/openbmc/qemu/hw/net/ |
H A D | net_rx_pkt.h | 23 /* defines to enable packet dump functions */ 29 * Clean all rx packet resources 31 * @pkt: packet 37 * Init function for rx packet functionality 39 * @pkt: packet pointer 47 * @pkt: packet 55 * parse and set packet analysis results 57 * @pkt: packet 68 * fetches packet analysis results 70 * @pkt: packet [all …]
|
H A D | net_tx_pkt.h | 24 /* define to enable packet dump functions */ 33 * Init function for tx packet functionality 35 * @pkt: packet pointer 41 * Clean all tx packet resources. 43 * @pkt: packet. 50 * @pkt: packet 58 * @pkt: packet 72 * @pkt: packet 83 * @pkt: packet 96 * @pkt: packet [all …]
|
/openbmc/linux/net/sctp/ |
D | output.c |
|
/openbmc/u-boot/net/ |
H A D | fastboot.c | 30 /* Sequence number sent for every packet */ 35 /* Keep track of last packet for resubmission */ 49 * fastboot_udp_send_info() - Send an INFO packet during long commands. 55 uchar *packet; in fastboot_udp_send_info() local 66 packet = net_tx_packet + net_eth_hdr_size() + IP_UDP_HDR_SIZE; in fastboot_udp_send_info() 67 packet_base = packet; in fastboot_udp_send_info() 70 memcpy(packet, &response_header, sizeof(response_header)); in fastboot_udp_send_info() 71 packet += sizeof(response_header); in fastboot_udp_send_info() 74 memcpy(packet, response, strlen(response)); in fastboot_udp_send_info() 75 packet += strlen(response); in fastboot_udp_send_info() [all …]
|
/openbmc/qemu/net/ |
H A D | queue.c | 37 * the packet. 39 * If a sent callback isn't provided, we just drop the packet to avoid 83 NetPacket *packet, *next; in qemu_del_net_queue() local 85 QTAILQ_FOREACH_SAFE(packet, &queue->packets, entry, next) { in qemu_del_net_queue() 86 QTAILQ_REMOVE(&queue->packets, packet, entry); in qemu_del_net_queue() 87 g_free(packet); in qemu_del_net_queue() 100 NetPacket *packet; in qemu_net_queue_append() local 105 packet = g_malloc(sizeof(NetPacket) + size); in qemu_net_queue_append() 106 packet->sender = sender; in qemu_net_queue_append() 107 packet->flags = flags; in qemu_net_queue_append() [all …]
|
/openbmc/linux/tools/perf/util/arm-spe-decoder/ |
D | arm-spe-pkt-decoder.c |
|
/openbmc/phosphor-net-ipmid/ |
H A D | message_parsers.hpp | 75 * @brief Unflatten an incoming packet and prepare the IPMI message 77 * @param[in] inPacket - Incoming IPMI packet 80 * response packet. In case of success incoming message and session 88 * @brief Flatten an IPMI message and generate the IPMI packet with the 93 * packet 95 * @return IPMI packet on success 121 * @brief Unflatten an incoming packet and prepare the IPMI message 123 * @param[in] inPacket - Incoming IPMI packet 125 * @return IPMI message in the packet on success 130 * @brief Flatten an IPMI message and generate the IPMI packet with the [all …]
|
H A D | message_parsers.cpp | 19 // Check if the packet has atleast the size of the RMCP Header in unflatten() 122 // the packet length in the header in unflatten() 140 std::vector<uint8_t> packet(sizeof(SessionHeader_t)); in flatten() local 142 // Insert Session Header into the Packet in flatten() 143 auto header = reinterpret_cast<SessionHeader_t*>(packet.data()); in flatten() 155 // Insert the Payload into the Packet in flatten() 156 packet.insert(packet.end(), outMessage->payload.begin(), in flatten() 160 packet.resize(packet.size() + sizeof(SessionTrailer_t)); in flatten() 162 reinterpret_cast<SessionTrailer_t*>(packet.data() + packet.size()); in flatten() 165 return packet; in flatten() [all …]
|
H A D | integrity_algo.hpp | 38 * Unless otherwise specified, the integrity algorithm is applied to the packet 60 * @brief Verify the integrity data of the packet 62 * @param[in] packet - Incoming IPMI packet 63 * @param[in] packetLen - Packet length excluding authCode 65 * packet 66 * @param[in] integrityDataEnd - End to the authCode in the packet 68 * @return true if authcode in the packet is equal to one generated 69 * using integrity algorithm on the packet data, false otherwise 72 const std::vector<uint8_t>& packet, const size_t packetLen, 77 * @brief Generate integrity data for the outgoing IPMI packet [all …]
|
/openbmc/u-boot/include/ |
H A D | fsl_memac.h | 23 u32 tx_ipg_length; /* Transmitter inter-packet-gap register */ 65 u32 rx_undsz_l; /* Rx undersized packet lower */ 66 u32 rx_undsz_u; /* Rx undersized packet upper */ 67 u32 rx_64_l; /* Rx 64 oct packet lower */ 68 u32 rx_64_u; /* Rx 64 oct packet upper */ 69 u32 rx_127_l; /* Rx 65 to 127 oct packet lower */ 70 u32 rx_127_u; /* Rx 65 to 127 oct packet upper */ 71 u32 rx_255_l; /* Rx 128 to 255 oct packet lower */ 72 u32 rx_255_u; /* Rx 128 to 255 oct packet upper */ 73 u32 rx_511_l; /* Rx 256 to 511 oct packet lower */ [all …]
|
/openbmc/qemu/hw/usb/ |
H A D | pcap.c | 2 * usb packet capture 32 uint32_t incl_len; /* number of octets of packet saved in file */ 33 uint32_t orig_len; /* actual length of packet */ 103 static void do_usb_pcap_header(FILE *fp, struct usbmon_packet *packet) in do_usb_pcap_header() argument 109 packet->ts_sec = tv.tv_sec; in do_usb_pcap_header() 110 packet->ts_usec = tv.tv_usec; in do_usb_pcap_header() 112 header.ts_sec = packet->ts_sec; in do_usb_pcap_header() 113 header.ts_usec = packet->ts_usec; in do_usb_pcap_header() 114 header.incl_len = packet->len_cap; in do_usb_pcap_header() 115 header.orig_len = packet->length + sizeof(*packet); in do_usb_pcap_header() [all …]
|
/openbmc/linux/drivers/tty/ipwireless/ |
D | hardware.c |
|
/openbmc/linux/Documentation/driver-api/surface_aggregator/ |
D | internal.rst |
|
/openbmc/linux/Documentation/networking/devlink/ |
D | devlink-trap.rst |
|
/openbmc/linux/drivers/tty/hvc/ |
D | hvsi.c |
|
/openbmc/linux/drivers/net/wireless/broadcom/b43legacy/ |
D | pio.c |
|
/openbmc/linux/drivers/media/test-drivers/vivid/ |
D | vivid-vbi-gen.c |
|
/openbmc/linux/arch/mips/include/asm/octeon/ |
D | cvmx-wqe.h |
|
/openbmc/u-boot/arch/sandbox/include/asm/ |
H A D | eth.h | 21 * @dev: device that received the packet 22 * @packet: pointer to the received pacaket buffer 23 * @len: length of received packet 26 int sandbox_eth_arp_req_to_reply(struct udevice *dev, void *packet, 34 * @dev: device that received the packet 35 * @packet: pointer to the received pacaket buffer 36 * @len: length of received packet 39 int sandbox_eth_ping_req_to_reply(struct udevice *dev, void *packet, 47 * @dev: device that received the packet 57 * @dev: device that received the packet [all …]
|
/openbmc/linux/net/batman-adv/ |
D | send.c |
|
/openbmc/phosphor-net-ipmid/test/ |
H A D | cipher.cpp | 18 * Step-1 Generate Integrity Data for the packet, using the implemented API in TEST() 20 // Packet = RMCP Session Header (4 bytes) + Packet (8 bytes) in TEST() 21 std::vector<uint8_t> packet = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12}; in TEST() local 32 auto response = algoPtr->generateIntegrityData(packet); in TEST() 56 size_t length = packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE; in TEST() 59 packet.data() + message::parser::RMCP_SESSION_HEADER_SIZE, length, in TEST() 81 // Packet = RMCP Session Header (4 bytes) + Packet (8 bytes) in TEST() 82 std::vector<uint8_t> packet = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12}; in TEST() local 104 size_t length = packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE; in TEST() 107 packet.data() + message::parser::RMCP_SESSION_HEADER_SIZE, length, in TEST() [all …]
|
/openbmc/linux/drivers/nvmem/ |
D | microchip-otpc.c |
|
/openbmc/linux/Documentation/networking/device_drivers/cellular/qualcomm/ |
D | rmnet.rst |
|