/openbmc/linux/net/rxrpc/ |
H A D | key.c | 116 prep->payload.data[1] = (void *)((unsigned long)prep->payload.data[1] + 1); in rxrpc_preparse_xdr_rxkad() 119 for (pptoken = (struct rxrpc_key_token **)&prep->payload.data[0]; in rxrpc_preparse_xdr_rxkad() 361 prep->payload.data[1] = (void *)((unsigned long)prep->payload.data[1] + 1); in rxrpc_preparse() 364 pp = (struct rxrpc_key_token **)&prep->payload.data[0]; in rxrpc_preparse() 408 rxrpc_free_token_list(prep->payload.data[0]); in rxrpc_free_preparse() 416 rxrpc_free_token_list(key->payload.data[0]); in rxrpc_destroy() 429 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_describe() 587 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_read() 657 for (token = key->payload.data[0]; token; token = token->next) { in rxrpc_read()
|
/openbmc/phosphor-host-ipmid/ |
H A D | dcmihandler.cpp | 658 ipmi::message::Payload payload; in getDCMICapabilities() local 734 return ipmi::responseSuccess(payload); in getDCMICapabilities() 883 if (payload.unpack(activate, reserved) || !payload.fullyUnpacked()) in setDCMIConfParams() 914 !payload.fullyUnpacked()) in setDCMIConfParams() 943 ipmi::message::Payload payload; in getDCMIConfParams() local 951 payload.pack(dcmi::activateDhcpReply); in getDCMIConfParams() 966 payload.pack(discovery); in getDCMIConfParams() 971 payload.pack(dcmi::dhcpTiming1); in getDCMIConfParams() 974 payload.pack(dcmi::dhcpTiming2); in getDCMIConfParams() 977 payload.pack(dcmi::dhcpTiming3); in getDCMIConfParams() [all …]
|
/openbmc/openbmc/poky/meta/lib/patchtest/tests/ |
H A D | test_metadata.py | 81 payload = str(patch) 83 payload 84 ) or patchtest_patterns.lic_chksum_removed.search_string(payload): 97 payload = str(patch) 98 for line in payload.splitlines():
|
/openbmc/linux/net/mac80211/ |
H A D | tkip.h | 16 u8 *payload, size_t payload_len); 26 u8 *payload, size_t payload_len, u8 *ta,
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_isol.c | 333 v2_payload.payload.sol_packet.character_count = 0; in sendBreak() 334 v2_payload.payload.sol_packet.generate_break = 1; in sendBreak() 509 v2_payload.payload.sol_packet.data[length++] = in processiSolUserInput() 511 v2_payload.payload.sol_packet.data[length++] = ch; in processiSolUserInput() 522 v2_payload.payload.sol_packet.data[length++] = ch; in processiSolUserInput() 541 v2_payload.payload.sol_packet.flush_outbound = 1; /* Not sure if necessary ? */ in processiSolUserInput() 542 v2_payload.payload.sol_packet.character_count = length; in processiSolUserInput() 552 (rsp->payload.sol_packet.packet_sequence_number)) in processiSolUserInput()
|
/openbmc/linux/drivers/media/radio/si4713/ |
H A D | radio-usb-si4713.c | 203 u8 payload[8]; member 249 const u8 *payload = start_seq[i].payload; in si4713_start_seq() local 251 memcpy(radio->buffer + 1, payload, len); in si4713_start_seq() 265 u8 payload[8]; member 293 static int send_command(struct si4713_usb_device *radio, u8 *payload, char *data, int len) in send_command() argument 300 memcpy(radio->buffer + 2, payload, 3); in send_command() 356 retval = send_command(radio, command_table[i].payload, in si4713_i2c_write()
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | generate_udp_fragments.py | 69 payload = MAGIC_MESSAGE.encode() 72 pkt = IP(src=sip,dst=dip) / UDP(sport=sport,dport=dport,chksum=0) / Raw(load=payload) 75 …c=sip6,dst=dip6) / IPv6ExtHdrFragment(id=0xBEEF) / UDP(sport=sport,dport=dport) / Raw(load=payload)
|
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | devlink_trap_tunnel_vxlan_ipv6.sh | 177 payload=$(ecn_payload_get) 181 sp=12345,dp=$VXPORT,tos=$outer_tos,p=$payload -q & 253 payload=$($payload_get) 255 -B 2001:db8:3::1 -t udp sp=12345,dp=$VXPORT,p=$payload -q & 323 payload=$(mc_smac_payload_get) 326 -B 2001:db8:3::1 -t udp sp=12345,dp=$VXPORT,p=$payload -q &
|
H A D | devlink_trap_tunnel_vxlan.sh | 173 payload=$(ecn_payload_get) 176 -t udp sp=12345,dp=$VXPORT,tos=$outer_tos,p=$payload -q & 244 payload=$($payload_get) 246 -B 192.0.2.17 -t udp sp=12345,dp=$VXPORT,p=$payload -q & 311 payload=$(mc_smac_payload_get) 314 -B 192.0.2.17 -t udp sp=12345,dp=$VXPORT,p=$payload -q &
|
H A D | devlink_trap_tunnel_ipip.sh | 164 payload=$(ecn_payload_get) 168 len=48,tos=$outer_tos,proto=47,p=$payload -q & 197 payload=$(ipip_payload_get "$@") 200 -A $sip -B 192.0.2.65 -t ip len=48,proto=47,p=$payload -q &
|
/openbmc/linux/include/linux/surface_aggregator/ |
H A D | controller.h | 90 const u8 *payload; member 367 rqst.payload = NULL; \ 407 rqst.payload = (u8 *)arg; \ 450 rqst.payload = NULL; \ 511 rqst.payload = (u8 *)arg; \ 568 rqst.payload = NULL; \ 610 rqst.payload = (u8 *)arg; \ 655 rqst.payload = NULL; \ 719 rqst.payload = (u8 *)arg; \
|
/openbmc/phosphor-dbus-interfaces/yaml/com/google/gbmc/ |
H A D | Hoth.interface.yaml | 117 Get the status of the payload initiation process. 122 Status of the payload initiation 156 Get the status of the send payload process. 161 Status of the send payload process. 171 Get the status of the payload verification process. 176 Status of the payload verification 195 Determines the max size of the payload region. 200 The size of the payload region 256 Get time spending in validating the payload, copying mutable regions
|
/openbmc/linux/samples/seccomp/ |
H A D | bpf-direct.c | 163 #define payload(_c) (_c), sizeof((_c)) macro 173 payload("OHAI! WHAT IS YOUR NAME? ")); in main() 175 syscall(__NR_write, STDOUT_FILENO, payload("HELLO, ")); in main() 178 payload("Error message going to STDERR\n")); in main()
|
/openbmc/u-boot/board/sandisk/sansa_fuze_plus/ |
H A D | sfp.c | 211 static int mxsfb_write_byte(uint32_t payload, const unsigned int data) in mxsfb_write_byte() argument 217 payload = ((payload & 0xff) << 1) | (((payload >> 8) & 0xff) << 10); in mxsfb_write_byte() 239 writel(payload, ®s->hw_lcdif_data); in mxsfb_write_byte()
|
/openbmc/linux/drivers/hwtracing/stm/ |
H A D | p_sys-t.c | 268 u64 payload[2]; /* Clock value and frequency */ in sys_t_clock_sync() local 276 payload[0] = ktime_get_real_ns(); in sys_t_clock_sync() 277 payload[1] = NSEC_PER_SEC; in sys_t_clock_sync() 278 sz = stm_data_write(data, m, c, false, &payload, sizeof(payload)); in sys_t_clock_sync() 284 return sizeof(header) + sizeof(payload); in sys_t_clock_sync()
|
/openbmc/linux/include/net/ |
H A D | genetlink.h | 533 static inline int genlmsg_msg_size(int payload) in genlmsg_msg_size() argument 535 return GENL_HDRLEN + payload; in genlmsg_msg_size() 542 static inline int genlmsg_total_size(int payload) in genlmsg_total_size() argument 544 return NLMSG_ALIGN(genlmsg_msg_size(payload)); in genlmsg_total_size() 552 static inline struct sk_buff *genlmsg_new(size_t payload, gfp_t flags) in genlmsg_new() argument 554 return nlmsg_new(genlmsg_total_size(payload), flags); in genlmsg_new()
|
/openbmc/linux/drivers/staging/media/atomisp/pci/runtime/eventq/src/ |
H A D | eventq.c | 25 uint8_t *payload) in ia_css_eventq_recv() argument 35 ia_css_event_decode(sp_event, payload); in ia_css_eventq_recv()
|
/openbmc/linux/Documentation/security/keys/ |
H A D | core.rst | 35 - A payload. 72 Having a payload is not required; and the payload can, in fact, just be a 400 of the payload. 404 payload. 684 The payload and plen arguments describe the payload data as for add_key(). 1331 The simplest payload is just data stored in key->payload directly. In this 1444 union key_payload payload; 1496 prep->payload.data[] to key->payload.data[], with RCU-safe assignment on 1517 the old payload. 1605 should be used to read the payload pointer if the payload is to be [all …]
|
/openbmc/linux/drivers/accel/ivpu/ |
H A D | ivpu_ipc.c | 45 u32 *payload = (u32 *)&jsm_msg->payload; in ivpu_jsm_msg_dump() local 50 payload[0], payload[1], payload[2], payload[3], payload[4]); in ivpu_jsm_msg_dump() 113 tx_buf->jsm.payload = req->payload; in ivpu_ipc_tx_prepare()
|
/openbmc/phosphor-ipmi-flash/tools/ |
H A D | lpc.cpp | 39 std::vector<std::uint8_t> payload(sizeof(host_lpc_buf)); in sendContents() local 48 std::memcpy(payload.data(), &host_lpc_buf, sizeof(host_lpc_buf)); in sendContents() 49 blob->writeMeta(session, 0x00, payload); in sendContents()
|
/openbmc/linux/security/keys/ |
H A D | dh.c | 38 const struct user_key_payload *payload; in dh_data_from_key() local 41 payload = user_key_payload_locked(key); in dh_data_from_key() 43 duplicate = kmemdup(payload->data, payload->datalen, in dh_data_from_key() 47 ret = payload->datalen; in dh_data_from_key()
|
/openbmc/linux/drivers/net/wireless/realtek/rtw88/ |
H A D | fw.c | 27 sub_cmd_id = c2h->payload[0]; in rtw_fw_c2h_cmd_handle_ext() 68 u8 *payload; member 85 rate = GET_RA_REPORT_RATE(ra_data->payload); in rtw_fw_ra_report_iter() 86 sgi = GET_RA_REPORT_SGI(ra_data->payload); in rtw_fw_ra_report_iter() 87 bw = GET_RA_REPORT_BW(ra_data->payload); in rtw_fw_ra_report_iter() 134 ra_data.payload = payload; in rtw_fw_ra_report_handle() 140 u8 *payload; member 148 u8 *payload = iter_data->payload; in rtw_fw_bcn_filter_notify_vif_iter() local 178 dev_iter_data.payload = payload; in rtw_fw_bcn_filter_notify() 188 dm_info->scan_density = payload[0]; in rtw_fw_scan_result() [all …]
|
/openbmc/linux/include/keys/ |
H A D | asymmetric-type.h | 72 return key->payload.data[asym_key_ids]; in asymmetric_key_ids() 78 return key->payload.data[asym_crypto]; in asymmetric_key_public_key()
|
/openbmc/linux/drivers/platform/x86/intel/ |
H A D | sdsi.c | 94 u64 *payload; member 247 sdsi_memcpy64_toio(priv->mbox_addr + SDSI_SIZE_CMD, info->payload + 1, in sdsi_mbox_cmd_write() 295 writeq(info->payload[0], priv->mbox_addr); in sdsi_mbox_acquire() 353 info.payload = kzalloc(info.size, GFP_KERNEL); in sdsi_provision() 354 if (!info.payload) in sdsi_provision() 358 memcpy(info.payload, buf, count); in sdsi_provision() 361 info.payload[(info.size - SDSI_SIZE_CMD) / SDSI_SIZE_CMD] = command; in sdsi_provision() 370 kfree(info.payload); in sdsi_provision() 422 info.payload = &command; in certificate_read()
|
/openbmc/pldm/platform-mc/ |
H A D | manager.hpp | 118 auto eventData = reinterpret_cast<const uint8_t*>(request->payload) + in handleSensorEvent() 142 const_cast<const uint8_t*>(request->payload) + eventDataOffset; in handleCperEvent() 164 auto eventData = reinterpret_cast<const uint8_t*>(request->payload) + in handlePldmMessagePollEvent()
|