| /openbmc/qemu/net/ |
| H A D | queue.c | 83 NetPacket *packet, *next; in qemu_del_net_queue() local 85 QTAILQ_FOREACH_SAFE(packet, &queue->packets, entry, next) { in qemu_del_net_queue() 86 QTAILQ_REMOVE(&queue->packets, packet, entry); in qemu_del_net_queue() 87 g_free(packet); in qemu_del_net_queue() 100 NetPacket *packet; in qemu_net_queue_append() local 105 packet = g_malloc(sizeof(NetPacket) + size); in qemu_net_queue_append() 106 packet->sender = sender; in qemu_net_queue_append() 107 packet->flags = flags; in qemu_net_queue_append() 108 packet->size = size; in qemu_net_queue_append() 109 packet->sent_cb = sent_cb; in qemu_net_queue_append() [all …]
|
| /openbmc/qemu/hw/usb/ |
| H A D | pcap.c | 103 static void do_usb_pcap_header(FILE *fp, struct usbmon_packet *packet) in do_usb_pcap_header() argument 109 packet->ts_sec = tv.tv_sec; in do_usb_pcap_header() 110 packet->ts_usec = tv.tv_usec; in do_usb_pcap_header() 112 header.ts_sec = packet->ts_sec; in do_usb_pcap_header() 113 header.ts_usec = packet->ts_usec; in do_usb_pcap_header() 114 header.incl_len = packet->len_cap; in do_usb_pcap_header() 115 header.orig_len = packet->length + sizeof(*packet); in do_usb_pcap_header() 117 fwrite(packet, sizeof(*packet), 1, fp); in do_usb_pcap_header() 124 struct usbmon_packet packet = { in do_usb_pcap_ctrl() local 140 memcpy(packet.s.setup, dev->setup_buf, 8); in do_usb_pcap_ctrl() [all …]
|
| H A D | u2f-passthru.c | 98 static inline uint32_t packet_get_cid(const void *packet) in packet_get_cid() argument 100 return *((uint32_t *)packet); in packet_get_cid() 103 static inline bool packet_is_init(const void *packet) in packet_is_init() argument 105 return ((uint8_t *)packet)[4] & (1 << 7); in packet_is_init() 259 const uint8_t packet[U2FHID_PACKET_SIZE]) in u2f_passthru_recv_from_host() 265 cid = packet_get_cid(packet); in u2f_passthru_recv_from_host() 268 if (!packet_is_init(packet)) { in u2f_passthru_recv_from_host() 271 packet_init = (struct packet_init *)packet; in u2f_passthru_recv_from_host() 282 if (packet_is_init(packet)) { in u2f_passthru_recv_from_host() 283 struct packet_init *packet_init = (struct packet_init *)packet; in u2f_passthru_recv_from_host() [all …]
|
| H A D | u2f.c | 197 uint8_t packet[U2FHID_PACKET_SIZE]; in u2f_key_recv_from_guest() local 203 usb_packet_copy(p, packet, p->iov.size); in u2f_key_recv_from_guest() 204 kc->recv_from_guest(key, packet); in u2f_key_recv_from_guest() 208 const uint8_t packet[U2FHID_PACKET_SIZE]) in u2f_pending_in_add() 220 memcpy(key->pending_in[index], packet, U2FHID_PACKET_SIZE); in u2f_pending_in_add() 268 const uint8_t packet[U2FHID_PACKET_SIZE]) in u2f_send_to_guest() 270 u2f_pending_in_add(key, packet); in u2f_send_to_guest()
|
| H A D | dev-storage.c | 182 USBPacket *p = s->packet; in usb_msd_packet_complete() 191 s->packet = NULL; in usb_msd_packet_complete() 199 if (s->packet) { in usb_msd_fatal_error() 245 USBPacket *p = s->packet; in usb_msd_transfer_data() 256 p = s->packet; in usb_msd_transfer_data() 267 USBPacket *p = s->packet; in usb_msd_command_complete() 276 if (s->packet) { in usb_msd_command_complete() 334 if (s->packet) { in usb_msd_handle_reset() 390 assert(s->packet == p); in usb_msd_cancel_io() 391 s->packet = NULL; in usb_msd_cancel_io() [all …]
|
| /openbmc/u-boot/net/ |
| H A D | fastboot.c | 55 uchar *packet; in fastboot_udp_send_info() local 66 packet = net_tx_packet + net_eth_hdr_size() + IP_UDP_HDR_SIZE; in fastboot_udp_send_info() 67 packet_base = packet; in fastboot_udp_send_info() 70 memcpy(packet, &response_header, sizeof(response_header)); in fastboot_udp_send_info() 71 packet += sizeof(response_header); in fastboot_udp_send_info() 74 memcpy(packet, response, strlen(response)); in fastboot_udp_send_info() 75 packet += strlen(response); in fastboot_udp_send_info() 77 len = packet - packet_base; in fastboot_udp_send_info() 122 uchar *packet; in fastboot_send() local 137 packet = net_tx_packet + net_eth_hdr_size() + IP_UDP_HDR_SIZE; in fastboot_send() [all …]
|
| /openbmc/phosphor-net-ipmid/ |
| H A D | message_parsers.cpp | 140 std::vector<uint8_t> packet(sizeof(SessionHeader_t)); in flatten() local 143 auto header = reinterpret_cast<SessionHeader_t*>(packet.data()); in flatten() 156 packet.insert(packet.end(), outMessage->payload.begin(), in flatten() 160 packet.resize(packet.size() + sizeof(SessionTrailer_t)); in flatten() 162 reinterpret_cast<SessionTrailer_t*>(packet.data() + packet.size()); in flatten() 165 return packet; in flatten() 251 std::vector<uint8_t> packet(sizeof(SessionHeader_t)); in flatten() local 253 SessionHeader_t* header = reinterpret_cast<SessionHeader_t*>(packet.data()); in flatten() 264 internal::addSequenceNumber(packet, session); in flatten() 277 packet.insert(packet.end(), cipherPayload.begin(), cipherPayload.end()); in flatten() [all …]
|
| H A D | integrity_algo.cpp | 43 const std::vector<uint8_t>& packet, const size_t length, in verifyIntegrityData() argument 48 packet.data() + message::parser::RMCP_SESSION_HEADER_SIZE, length); in verifyIntegrityData() 57 const std::vector<uint8_t>& packet) const in generateIntegrityData() 60 packet.data() + message::parser::RMCP_SESSION_HEADER_SIZE, in generateIntegrityData() 61 packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE); in generateIntegrityData() 109 const std::vector<uint8_t>& packet, const size_t length, in verifyIntegrityData() argument 114 packet.data() + message::parser::RMCP_SESSION_HEADER_SIZE, length); in verifyIntegrityData() 123 const std::vector<uint8_t>& packet) const in generateIntegrityData() 126 packet.data() + message::parser::RMCP_SESSION_HEADER_SIZE, in generateIntegrityData() 127 packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE); in generateIntegrityData()
|
| H A D | message_handler.cpp | 22 std::vector<uint8_t> packet; in receive() local 26 std::tie(readStatus, packet) = channel->read(); in receive() 36 std::tie(inMessage, sessionHeader) = parser::unflatten(packet); in receive() 143 void Handler::writeData(const std::vector<uint8_t>& packet) in writeData() argument 145 auto writeStatus = channel->write(packet); in writeData() 156 auto packet = asfparser::flatten(inMessage->asfMsgTag); in sendASF() local 159 writeData(packet); in sendASF() 166 auto packet = parser::flatten(outMessage, sessionHeader, session); in send() local 169 writeData(packet); in send()
|
| H A D | integrity_algo.hpp | 72 const std::vector<uint8_t>& packet, const size_t packetLen, 191 const std::vector<uint8_t>& packet, const size_t length, 204 const std::vector<uint8_t>& packet) const override; 277 const std::vector<uint8_t>& packet, const size_t length, 290 const std::vector<uint8_t>& packet) const override;
|
| /openbmc/phosphor-net-ipmid/test/ |
| H A D | cipher.cpp | 21 std::vector<uint8_t> packet = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12}; in TEST() local 32 auto response = algoPtr->generateIntegrityData(packet); in TEST() 56 size_t length = packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE; in TEST() 59 packet.data() + message::parser::RMCP_SESSION_HEADER_SIZE, length, in TEST() 82 std::vector<uint8_t> packet = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12}; in TEST() local 104 size_t length = packet.size() - message::parser::RMCP_SESSION_HEADER_SIZE; in TEST() 107 packet.data() + message::parser::RMCP_SESSION_HEADER_SIZE, length, in TEST() 118 auto packetSize = packet.size(); in TEST() 119 packet.insert(packet.end(), output.begin(), output.end()); in TEST() 122 auto integrityIter = packet.cbegin(); in TEST() [all …]
|
| /openbmc/qemu/target/hexagon/ |
| H A D | decode.c | 91 void decode_send_insn_to(Packet *packet, int start, int newloc) in decode_send_insn_to() argument 107 tmpinsn = packet->insn[i]; in decode_send_insn_to() 108 packet->insn[i] = packet->insn[i + direction]; in decode_send_insn_to() 109 packet->insn[i + direction] = tmpinsn; in decode_send_insn_to() 115 decode_fill_newvalue_regno(Packet *packet) in decode_fill_newvalue_regno() argument 119 for (i = 1; i < packet->num_insns; i++) { in decode_fill_newvalue_regno() 120 if (GET_ATTRIB(packet->insn[i].opcode, A_DOTNEWVALUE) && in decode_fill_newvalue_regno() 121 !GET_ATTRIB(packet->insn[i].opcode, A_EXTENSION)) { in decode_fill_newvalue_regno() 123 g_assert(packet->insn[i].new_read_idx != -1); in decode_fill_newvalue_regno() 124 use_regidx = packet->insn[i].new_read_idx; in decode_fill_newvalue_regno() [all …]
|
| /openbmc/qemu/hw/vfio/ |
| H A D | migration-multifd.c | 124 VFIODeviceStatePacket *packet, in vfio_load_state_buffer_insert() argument 131 size_t data_size = packet_total_size - sizeof(*packet); in vfio_load_state_buffer_insert() 134 if (packet->idx >= vfio_state_buffers_size_get(&multifd->load_bufs)) { in vfio_load_state_buffer_insert() 135 vfio_state_buffers_size_set(&multifd->load_bufs, packet->idx + 1); in vfio_load_state_buffer_insert() 138 lb = vfio_state_buffers_at(&multifd->load_bufs, packet->idx); in vfio_load_state_buffer_insert() 141 vbasedev->name, packet->idx); in vfio_load_state_buffer_insert() 145 assert(packet->idx >= multifd->load_buf_idx); in vfio_load_state_buffer_insert() 153 vbasedev->name, packet->idx, in vfio_load_state_buffer_insert() 158 lb->data = g_memdup2(&packet->data, data_size); in vfio_load_state_buffer_insert() 171 VFIODeviceStatePacket *packet = (VFIODeviceStatePacket *)data; in vfio_multifd_load_state_buffer() local [all …]
|
| /openbmc/qemu/docs/ |
| H A D | colo-proxy.txt | 26 If the packet difference, notify COLO-frame to do checkpoint and send 27 all primary packet has queued. Otherwise just send the queued primary 28 packet and drop the queued secondary packet. 69 1.Guest receive packet route: 74 Mirror client will send packet to guest,at the 75 same time, copy and forward packet to secondary 81 If receive packet is TCP packet,we will adjust ack 85 2.Guest send packet route: 90 Redirect server filter receive primary guest packet 94 COLO-compare receive primary guest packet then [all …]
|
| /openbmc/qemu/migration/ |
| H A D | multifd-nocomp.c | 91 p->iov[0].iov_base = p->packet; in multifd_ram_prepare_header() 138 ret = qio_channel_write_all(p->c, (void *)p->packet, in multifd_nocomp_send_prepare() 205 MultiFDPacket_t *packet = p->packet; in multifd_ram_fill_packet() local 209 packet->pages_alloc = cpu_to_be32(multifd_ram_page_count()); in multifd_ram_fill_packet() 210 packet->normal_pages = cpu_to_be32(pages->normal_num); in multifd_ram_fill_packet() 211 packet->zero_pages = cpu_to_be32(zero_num); in multifd_ram_fill_packet() 214 pstrcpy(packet->ramblock, sizeof(packet->ramblock), in multifd_ram_fill_packet() 222 packet->offset[i] = cpu_to_be64(temp); in multifd_ram_fill_packet() 231 MultiFDPacket_t *packet = p->packet; in multifd_ram_unfill_packet() local 234 uint32_t pages_per_packet = be32_to_cpu(packet->pages_alloc); in multifd_ram_unfill_packet() [all …]
|
| H A D | multifd-device-state.c | 63 MultiFDPacketDeviceState_t *packet = p->packet_device_state; in multifd_device_state_fill_packet() local 65 packet->hdr.flags = cpu_to_be32(p->flags); in multifd_device_state_fill_packet() 66 strncpy(packet->idstr, device_state->idstr, sizeof(packet->idstr) - 1); in multifd_device_state_fill_packet() 67 packet->idstr[sizeof(packet->idstr) - 1] = 0; in multifd_device_state_fill_packet() 68 packet->instance_id = cpu_to_be32(device_state->instance_id); in multifd_device_state_fill_packet() 69 packet->next_packet_size = cpu_to_be32(p->next_packet_size); in multifd_device_state_fill_packet()
|
| /openbmc/u-boot/test/dm/ |
| H A D | eth.c | 262 static int sb_check_arp_reply(struct udevice *dev, void *packet, in sb_check_arp_reply() argument 266 struct ethernet_hdr *eth = packet; in sb_check_arp_reply() 274 arp = packet + ETHER_HDR_SIZE; in sb_check_arp_reply() 300 static int sb_with_async_arp_handler(struct udevice *dev, void *packet, in sb_with_async_arp_handler() argument 304 struct ethernet_hdr *eth = packet; in sb_with_async_arp_handler() 305 struct arp_hdr *arp = packet + ETHER_HDR_SIZE; in sb_with_async_arp_handler() 322 sandbox_eth_arp_req_to_reply(dev, packet, len); in sb_with_async_arp_handler() 323 sandbox_eth_ping_req_to_reply(dev, packet, len); in sb_with_async_arp_handler() 325 return sb_check_arp_reply(dev, packet, len); in sb_with_async_arp_handler() 347 static int sb_check_ping_reply(struct udevice *dev, void *packet, in sb_check_ping_reply() argument [all …]
|
| /openbmc/qemu/tests/qtest/ |
| H A D | igb-test.c | 43 static const struct eth_header packet = { variable 57 memwrite(data, &packet, sizeof(packet)); in igb_send_verify() 82 g_assert_false(memcmp(buffer, &packet, sizeof(packet))); in igb_send_verify() 92 struct eth_header test_iov = packet; in igb_receive_verify() 93 int len = htonl(sizeof(packet)); in igb_receive_verify() 100 .iov_len = sizeof(packet), in igb_receive_verify() 108 ret = iov_send(test_sockets[0], iov, 2, 0, sizeof(len) + sizeof(packet)); in igb_receive_verify() 109 g_assert_cmpint(ret, == , sizeof(packet) + sizeof(len)); in igb_receive_verify() 130 g_assert_false(memcmp(buffer, &packet, sizeof(packet))); in igb_receive_verify()
|
| H A D | e1000e-test.c | 39 static const struct eth_header packet = { variable 53 memwrite(data, &packet, sizeof(packet)); in e1000e_send_verify() 79 g_assert_false(memcmp(buffer, &packet, sizeof(packet))); in e1000e_send_verify() 89 struct eth_header test_iov = packet; in e1000e_receive_verify() 90 int len = htonl(sizeof(packet)); in e1000e_receive_verify() 97 .iov_len = sizeof(packet), in e1000e_receive_verify() 105 ret = iov_send(test_sockets[0], iov, 2, 0, sizeof(len) + sizeof(packet)); in e1000e_receive_verify() 106 g_assert_cmpint(ret, == , sizeof(packet) + sizeof(len)); in e1000e_receive_verify() 127 g_assert_false(memcmp(buffer, &packet, sizeof(packet))); in e1000e_receive_verify()
|
| /openbmc/qemu/tests/tcg/multiarch/system/ |
| H A D | Makefile.softmmu-target | 43 run-gdbstub-untimely-packet: hello 47 --output untimely-packet.gdb.out \ 48 --stderr untimely-packet.gdb.err \ 54 (! grep -Fq 'Packet instead of Ack, ignoring it' untimely-packet.gdb.err), \ 55 "GREP", file untimely-packet.gdb.err) 72 run-gdbstub-untimely-packet run-gdbstub-registers
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/iptraf/ |
| H A D | iptraf-ng_1.2.1.bb | 6 data like TCP connection packet and byte counts, interface statistics \ 8 packet and byte counts. IPTraf-ng features include an IP traffic monitor \ 9 which shows TCP flag information, packet and byte counts, ICMP \ 10 details, OSPF packet types, and oversized IP packet warnings; \ 12 packet counts, IP checksum errors, interface activity and packet size \
|
| /openbmc/u-boot/drivers/net/ |
| H A D | sandbox.c | 57 int sandbox_eth_arp_req_to_reply(struct udevice *dev, void *packet, in sandbox_eth_arp_req_to_reply() argument 61 struct ethernet_hdr *eth = packet; in sandbox_eth_arp_req_to_reply() 69 arp = packet + ETHER_HDR_SIZE; in sandbox_eth_arp_req_to_reply() 112 int sandbox_eth_ping_req_to_reply(struct udevice *dev, void *packet, in sandbox_eth_ping_req_to_reply() argument 116 struct ethernet_hdr *eth = packet; in sandbox_eth_ping_req_to_reply() 126 ip = packet + ETHER_HDR_SIZE; in sandbox_eth_ping_req_to_reply() 142 memcpy(eth_recv, packet, len); in sandbox_eth_ping_req_to_reply() 264 static int sb_default_handler(struct udevice *dev, void *packet, in sb_default_handler() argument 267 if (!sandbox_eth_arp_req_to_reply(dev, packet, len)) in sb_default_handler() 269 if (!sandbox_eth_ping_req_to_reply(dev, packet, len)) in sb_default_handler() [all …]
|
| H A D | ethoc.c | 182 void __iomem *packet; member 410 if (priv->packet) in ethoc_rx_common() 411 *packetp = priv->packet + entry * PKTSIZE_ALIGN; in ethoc_rx_common() 463 static int ethoc_send_common(struct ethoc *priv, void *packet, int length) in ethoc_send_common() argument 477 if (priv->packet) { in ethoc_send_common() 478 void *p = priv->packet + entry * PKTSIZE_ALIGN; in ethoc_send_common() 480 memcpy(p, packet, length); in ethoc_send_common() 481 packet = p; in ethoc_send_common() 483 bd.addr = virt_to_phys(packet); in ethoc_send_common() 485 flush_dcache_range((ulong)packet, (ulong)packet + length); in ethoc_send_common() [all …]
|
| H A D | ftmac100.c | 184 static int _ftmac100_send(struct ftmac100_data *priv, void *packet, int length) in _ftmac100_send() argument 195 debug ("%s(%lx, %x)\n", __func__, (unsigned long)packet, length); in _ftmac100_send() 201 flush_dcache_range((unsigned long)packet,(unsigned long)packet+length); in _ftmac100_send() 202 curr_des->txdes2 = (unsigned int)(unsigned long)packet; /* TXBUF_BADR */ in _ftmac100_send() 272 static int ftmac100_send(struct eth_device *dev, void *packet, int length) in ftmac100_send() argument 275 return _ftmac100_send(priv , packet , length); in ftmac100_send() 330 static int ftmac100_send(struct udevice *dev, void *packet, int length) in ftmac100_send() argument 334 ret = _ftmac100_send(priv , packet , length); in ftmac100_send() 351 static int ftmac100_free_pkt(struct udevice *dev, uchar *packet, int length) in ftmac100_free_pkt() argument
|
| /openbmc/ipmitool/src/plugins/lanplus/ |
| H A D | README.sol | 28 Every SOL packet (with one exception) traveling in either direction causes 29 the recipient to return an acknowledgement packet, though acks themself are 54 Periodic dispatch of "keep alive" packet to the BMC. 60 Partial creation of packet payload 63 Completion of packet payload 64 Send (with retries) of SOL packet 67 Creation of RMCP+ packet 68 Details general to all V2 packet processing, as
|