| /dpdk/examples/fips_validation/ |
| H A D | fips_validation_tdes.c | 141 char byte[3] = {src[i * 2], src[i * 2 + 1], '\0'}; in parse_tdes_uint8_hex_str() local 143 if (parser_read_uint8_hex(&val->val[i], byte) < 0) in parse_tdes_uint8_hex_str() 152 char byte[3] = {src[i * 2], src[i * 2 + 1], '\0'}; in parse_tdes_uint8_hex_str() local 154 if (parser_read_uint8_hex(&val->val[i], byte) < 0) in parse_tdes_uint8_hex_str() 163 char byte[3] = {src[i * 2], src[i * 2 + 1], '\0'}; in parse_tdes_uint8_hex_str() local 165 if (parser_read_uint8_hex(&val->val[i + 8], byte) < 0) in parse_tdes_uint8_hex_str() 171 char byte[3] = {src[i * 2], src[i * 2 + 1], '\0'}; in parse_tdes_uint8_hex_str() local 173 if (parser_read_uint8_hex(&val->val[i + 16], byte) < 0) in parse_tdes_uint8_hex_str()
|
| H A D | fips_validation_ccm.c | 98 char byte[3] = {src[j * 2], src[j * 2 + 1], '\0'}; in parse_uint8_ccm_aad_str() local 100 if (parser_read_uint8_hex(&val->val[j + 18], byte) < 0) { in parse_uint8_ccm_aad_str()
|
| /dpdk/drivers/common/sfc_efx/base/ |
| H A D | efx_rx.c | 1338 unsigned int byte; in siena_rx_scale_key_set() local 1347 byte = 0; in siena_rx_scale_key_set() 1352 offset > 0 && byte < n; in siena_rx_scale_key_set() 1358 byte = 0; in siena_rx_scale_key_set() 1363 offset > 0 && byte < n; in siena_rx_scale_key_set() 1374 byte = 0; in siena_rx_scale_key_set() 1380 offset > 0 && byte < n; in siena_rx_scale_key_set() 1390 offset > 0 && byte < n; in siena_rx_scale_key_set() 1406 byte = 0; in siena_rx_scale_key_set() 1488 uint32_t byte; in siena_rx_scale_tbl_set() local [all …]
|
| H A D | efx_sram.c | 242 uint8_t byte; in efx_sram_byte_changing_set() local 245 byte = (uint8_t)((offset % 257) % 256); in efx_sram_byte_changing_set() 247 byte = (uint8_t)(~((offset - 8) % 257) % 256); in efx_sram_byte_changing_set() 249 eqp->eq_u8[index] = (negate) ? ~byte : byte; in efx_sram_byte_changing_set()
|
| H A D | efx_vpd.c | 330 efx_byte_t byte; in efx_vpd_next_tag() local 342 EFX_POPULATE_BYTE_1(byte, EFX_BYTE_0, data[*offsetp]); in efx_vpd_next_tag() 344 switch (EFX_BYTE_FIELD(byte, TAG_TYPE)) { in efx_vpd_next_tag() 348 name = EFX_BYTE_FIELD(byte, TAG_SMALL_ITEM_NAME); in efx_vpd_next_tag() 349 length = (uint16_t)EFX_BYTE_FIELD(byte, TAG_SMALL_ITEM_SIZE); in efx_vpd_next_tag() 361 name = EFX_BYTE_FIELD(byte, TAG_LARGE_ITEM_NAME); in efx_vpd_next_tag() 586 efx_byte_t byte; in efx_vpd_hunk_reinit() local 611 EFX_POPULATE_BYTE_3(byte, in efx_vpd_hunk_reinit() 615 data[offset] = EFX_BYTE_FIELD(byte, EFX_BYTE_0); in efx_vpd_hunk_reinit()
|
| /dpdk/doc/guides/sample_app_ug/ |
| H A D | test_pipeline.rst | 64 …alized implementations are expected to provide better performance for 8-byte and 16-byte key sizes, 92 …| 3 | hash-[spec]-8-lru | LRU hash table with 8-byte key size and 16 million | 16 m… 95 … | | [4-byte index, 4 bytes of 0… 111 …| 4 | hash-[spec]-8-ext | Extendable bucket hash table with 8-byte key size | Same… 115 …| 5 | hash-[spec]-16-lru | LRU hash table with 16-byte key size and 16 million | 16 m… 118 … | | [4-byte index, 12 bytes of … 134 …| 6 | hash-[spec]-16-ext | Extendable bucket hash table with 16-byte key size | Same… 138 …| 7 | hash-[spec]-32-lru | LRU hash table with 32-byte key size and 16 million | 16 m… 141 … | | [4-byte index, 28 bytes of … 157 …| 8 | hash-[spec]-32-ext | Extendable bucket hash table with 32-byte key size | Same…
|
| /dpdk/drivers/raw/ifpga/base/ |
| H A D | ifpga_api.c | 86 u64 offset, unsigned int byte, void *data) in ifpga_acc_read() argument 94 if (offset + byte <= offset) in ifpga_acc_read() 101 if (offset + byte > region->len) in ifpga_acc_read() 104 switch (byte) { in ifpga_acc_read() 126 unsigned int byte, void *data) in ifpga_acc_write() argument 134 if (offset + byte <= offset) in ifpga_acc_write() 141 if (offset + byte > region->len) in ifpga_acc_write() 145 switch (byte) { in ifpga_acc_write()
|
| H A D | opae_hw_api.h | 170 u64 offset, unsigned int byte, void *data); 172 u64 offset, unsigned int byte, void *data); 209 u64 offset, unsigned int byte, void *data); 211 u64 offset, unsigned int byte, void *data); 232 u64 offset, unsigned int byte, void *data); 234 u64 offset, unsigned int byte, void *data); 278 u8 byte[SHM_BLK_SIZE]; member
|
| H A D | opae_hw_api.c | 98 u64 offset, unsigned int byte, void *data) in opae_acc_reg_read() argument 104 return acc->ops->read(acc, region_idx, offset, byte, data); in opae_acc_reg_read() 120 u64 offset, unsigned int byte, void *data) in opae_acc_reg_write() argument 126 return acc->ops->write(acc, region_idx, offset, byte, data); in opae_acc_reg_write()
|
| /dpdk/lib/rib/ |
| H A D | rte_rib6.h | 104 get_msk_part(uint8_t depth, int byte) { in get_msk_part() argument 107 byte &= 0xf; in get_msk_part() 109 part = RTE_MAX((int16_t)depth - (byte * 8), 0); in get_msk_part()
|
| /dpdk/drivers/common/cnxk/ |
| H A D | roc_aes.c | 64 Xtime(uint8_t byte, uint8_t pow) in Xtime() argument 66 uint32_t w = byte; in Xtime() 83 GF8mul(uint8_t byte, uint32_t mp) in GF8mul() argument 89 mul ^= Xtime(byte, pow); in GF8mul()
|
| /dpdk/app/test-pmd/ |
| H A D | 5tswap.c | 105 uint8_t *byte; in pkt_burst_5tuple_swap() member 146 h.byte += mb->l3_len; in pkt_burst_5tuple_swap()
|
| /dpdk/doc/guides/prog_guide/ |
| H A D | packet_classif_access_ctrl.rst | 34 * First field in the rule definition has to be one byte long. 37 This is done mainly for performance reasons - search function processes the first input byte as par… 62 …Note that due to the grouping of input bytes, 1 or 2 byte fields must be defined as consecutive fi… 64 Also, it is best to define fields of 8 or more bytes as 4 byte fields so that 95 /* first input field - always one byte long. */ 240 /* first input field - always one byte long. */ 268 * Next element of search key (Type of Service) is indeed 1 byte long. 311 When adding new rules into an ACL context, all fields must be in host byte order (LSB). 312 …arch is performed for an input tuple, all fields in that tuple must be in network byte order (MSB).
|
| H A D | asan.rst | 52 … if ASan is enabled, because apply 9 bytes of memory but access the tenth byte, detailed error log… 81 … if ASan is enabled, because apply 9 bytes of memory but access the first byte after release, deta…
|
| H A D | qos_framework.rst | 467 For 10 GbE, there are 1.25 billion byte slots that need to be filled by the port scheduler every se… 484 where a byte signifies the time duration required by the physical interface to send out a byte on t… 499 is the amount of CPU cycles that is equivalent to the transmission time for one byte on the wire 510 … This means that the scheduler is not able to keep up with the speed of the NIC byte conveyor belt, 556 …eatest common divisor for all packet lengths is one byte, the unit of credit is selected as one by… 648 …| | | | explanation of why the time is maintained in byte units. … 766 …| | | | explanation of why the time is maintained in byte units. … 841 …| | | | | Consuming one byte from queue #i requires consu… 1375 where a byte signifies the time duration required by the physical interface to send out a byte on t… 1379 to transmit one 64-byte packet onto the wire and represents the worst case scenario. [all …]
|
| H A D | packet_framework.rst | 399 …| 7 | Key offset | Offset of the lookup key byte array within the packet meta-data … 808 …:`table_qos_31` detail the main data structures used to implement 8-byte and 16-byte key hash tabl… 815 Data Structures for 8-byte Key Hash Tables 822 Data Structures for 16-byte Key Hash Tables 827 .. table:: Main Large Data Structures (Arrays) used for 8-byte and 16-byte Key Size Hash Tables 833 …| 1 | Bucket array | n_buckets (configurable) | *8-byte key size:* | Buckets of t… 838 …| | | | *16-byte key size:* | … 843 …| 2 | Bucket extensions array | n_buckets_ext (configurable) | *8-byte key size:* | This array i… 857 .. table:: Field Description for Bucket Array Entry (8-byte and 16-byte Key Hash Tables) 887 and detail the bucket search pipeline used to implement 8-byte and 16-byte key hash tables (either … [all …]
|
| H A D | hash_lib.rst | 48 …not only the key, but also the data which may be either a 8-byte integer or a pointer to external … 134 The Hash Library uses a hash function (configurable) to translate the input key into a 4-byte hash … 135 The bucket index and a 2-byte signature is derived from the hash value using partial-key hashing [p… 140 To speed up the search logic within the bucket, each hash entry stores the 2-byte key signature tog… 142 comparing the 2-byte signature of the input key against the signature of a key from the bucket. 144 …ssary, as two input keys from the same bucket can still potentially have the same 2-byte signature,
|
| /dpdk/doc/guides/cryptodevs/ |
| H A D | zuc.rst | 28 * ZUC (EIA3) supported only if hash offset field is byte-aligned. 29 * ZUC (EEA3) supported only if cipher length, cipher offset fields are byte-aligned.
|
| H A D | snow3g.rst | 28 * SNOW 3G (UIA2) supported only if hash offset field is byte-aligned. 30 (if length and/or offset of data to be ciphered is not byte-aligned).
|
| H A D | kasumi.rst | 28 * KASUMI(F9) supported only if hash offset and length field is byte-aligned. 30 (if length and/or offset of data to be ciphered is not byte-aligned).
|
| /dpdk/examples/pipeline/examples/ |
| H A D | meter.spec | 9 ; The "meter stats" CLI command can be used to read the packet and byte statistics counters of any
|
| H A D | varbit.spec | 7 ; by reading the first byte of the IPv4 header that carries the 4-bit Internet Header Length (IHL)
|
| /dpdk/lib/table/ |
| H A D | rte_swx_table_wm.c | 91 uint8_t byte = p->key_mask0 ? p->key_mask0[byte_id] : 0xFF; in acl_table_cfg_get() local 93 if (!byte) { in acl_table_cfg_get()
|
| /dpdk/lib/lpm/ |
| H A D | rte_lpm6.c | 1206 uint8_t byte = 3; in rule_find_range() local 1214 tbl += ip[byte]; in rule_find_range() 1220 byte += 1; in rule_find_range() 1225 ind = ip[byte] & depth_to_mask_1b(depth); in rule_find_range()
|
| /dpdk/doc/guides/nics/ |
| H A D | fm10k.rst | 154 while the byte counting registers are 48 bits. As a result, the statistics must 157 Given the PCIe Gen3 x8, about 50Gbps of traffic can occur. With 64 byte packets
|