Searched refs:extracts (Results 1 – 14 of 14) sorted by relevance
33 extr = &dpni_ext->extracts[i]; in dpni_prepare_key_cfg()35 switch (cfg->extracts[i].type) { in dpni_prepare_key_cfg()37 extr->prot = cfg->extracts[i].extract.from_hdr.prot; in dpni_prepare_key_cfg()39 cfg->extracts[i].extract.from_hdr.type); in dpni_prepare_key_cfg()40 extr->size = cfg->extracts[i].extract.from_hdr.size; in dpni_prepare_key_cfg()41 extr->offset = cfg->extracts[i].extract.from_hdr.offset; in dpni_prepare_key_cfg()43 cfg->extracts[i].extract.from_hdr.field); in dpni_prepare_key_cfg()45 cfg->extracts[i].extract.from_hdr.hdr_index; in dpni_prepare_key_cfg()48 extr->size = cfg->extracts[i].extract.from_data.size; in dpni_prepare_key_cfg()50 cfg->extracts[i].extract.from_data.offset; in dpni_prepare_key_cfg()[all …]
477 struct dpkg_extract extracts[DPKG_MAX_NUM_OF_EXTRACTS]; member
426 struct dpni_dist_extract extracts[DPKG_MAX_NUM_OF_EXTRACTS]; member
2091 &cls_cfg.extracts[cls_cfg.num_extracts]; in dpaa2_eth_set_hash()
11 This script downloads and extracts the firmware, creating wd719x-risc.bin and
29 | extracts and shifts. The three msbs from d2 will go into55 | d6: temp for bit-field extracts
10 | The entry point sGETMAN extracts the mantissa of the
83 Once this file gets to the driver, the driver extracts packet_size data from
29 with boot wrapper code that extracts data from the old
40 flow key that it parsed from the packet. Userspace then extracts its
309 Third, it extracts up to nfetch offsets into the mmap buffer, and stores
422 A helper function that extracts the physical address from the edid struct
25 Python script that aggregates and extracts useful information from a
7501 # sgetman(): extracts the mantissa of the input argument. The #