/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/ |
H A D | IpSecMain.c | 35 @param[in, out] FragmentTable Pointer to a list of fragments. 55 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 75 FragmentTable == NULL || 81 IpPayload = (*FragmentTable)[0].FragmentBuffer; 97 FragmentTable, 186 FragmentTable, 47 IpSecProcess( IN EFI_IPSEC2_PROTOCOL *This, IN EFI_HANDLE NicHandle, IN UINT8 IpVersion, IN OUT VOID *IpHead, IN OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, IN EFI_IPSEC_TRAFFIC_DIR TrafficDirection, OUT EFI_EVENT *RecycleSignal ) argument
|
H A D | IpSecImpl.h | 120 EFI_IPSEC_FRAGMENT_DATA *FragmentTable; member in struct:_IPSEC_RECYCLE_CONTEXT 154 returns without an IPsec protected IP Header and FragmentTable. 163 @param[in, out] FragmentTable Pointer to a list of fragments in form of IPsec 181 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 201 @param[in, out] FragmentTable Pointer to a list of fragments to be protected by 219 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 356 @param[in, out] FragmentTable Pointer to a list of fragments. 376 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable,
|
H A D | IpSecImpl.c | 721 if (RecycleContext->FragmentTable != NULL) { 722 FreePool (RecycleContext->FragmentTable); 1191 @param[in, out] FragmentTable Pointer to a list of fragments to be protected by 1208 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 1263 (NET_FRAGMENT *)(*FragmentTable), 1364 @param[in, out] FragmentTable Pointer to a list of fragments in the form of IPsec 1386 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 1424 (NET_FRAGMENT *) *FragmentTable, 1583 *FragmentTable = AllocateZeroPool (sizeof (EFI_IPSEC_FRAGMENT_DATA)); 1584 if (*FragmentTable 1201 IpSecTunnelOutboundPacket( IN OUT UINT8 *IpHead, IN UINT8 IpVersion, IN IPSEC_SAD_DATA *SadData, IN OUT UINT8 *LastHead, IN VOID **OptionsBuffer, IN UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN UINT32 *FragmentCount ) argument 1380 IpSecEspInboundPacket( IN UINT8 IpVersion, IN OUT VOID *IpHead, OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, OUT EFI_IPSEC_SPD_SELECTOR **SpdSelector, OUT EFI_EVENT *RecycleEvent ) argument 1690 IpSecEspOutboundPacket( IN UINT8 IpVersion, IN OUT VOID *IpHead, IN OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, IN IPSEC_SAD_ENTRY *SadEntry, OUT EFI_EVENT *RecycleEvent ) argument 2089 IpSecProtectInboundPacket( IN UINT8 IpVersion, IN OUT VOID *IpHead, IN OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, OUT EFI_IPSEC_SPD_SELECTOR **SpdEntry, OUT EFI_EVENT *RecycleEvent ) argument 2148 IpSecProtectOutboundPacket( IN UINT8 IpVersion, IN OUT VOID *IpHead, IN OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, IN IPSEC_SAD_ENTRY *SadEntry, OUT EFI_EVENT *RecycleEvent ) argument [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/MnpDxe/ |
H A D | MnpIo.c | 38 EFI_MANAGED_NETWORK_FRAGMENT_DATA *FragmentTable; local 64 FragmentTable = TxData->FragmentTable; 67 if ((FragmentTable[Index].FragmentLength == 0) || (FragmentTable[Index].FragmentBuffer == NULL)) { 75 TotalLength += FragmentTable[Index].FragmentLength; 78 if ((TxData->DestinationAddress == NULL) && (FragmentTable[0].FragmentLength < TxData->HeaderLength)) { 133 // Media header is in FragmentTable and there is only one fragment, 136 *PktBuf = TxData->FragmentTable[0].FragmentBuffer; 137 *PktLen = TxData->FragmentTable[ [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdePkg/Include/Protocol/ |
H A D | ManagedNetwork.h | 121 EFI_MANAGED_NETWORK_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12212
|
H A D | Udp6.h | 205 EFI_UDP6_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12366 214 /// FragmentTable could contain multiple buffers that are not in the continuous memory locations. 215 /// The EFI UDPv6 Protocol client might need to combine two or more buffers in FragmentTable to 243 EFI_UDP6_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12367 429 - One or more of the Token.Packet.TxData.FragmentTable[].FragmentLength 431 - One or more of the Token.Packet.TxData.FragmentTable[].FragmentBuffer
|
H A D | Udp4.h | 97 EFI_UDP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12357 106 EFI_UDP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12358
|
H A D | Ip4.h | 216 EFI_IP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12167 236 EFI_IP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12169
|
H A D | Tcp4.h | 164 EFI_TCP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12332 172 EFI_TCP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12333 440 the sum of all FragmentBuffer length in FragmentTable.
|
H A D | Tcp6.h | 358 /// Fragmentbuffer in FragmentTable allocated by user. 370 EFI_TCP6_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12347 402 EFI_TCP6_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12348 695 will be copied into the FragmentTable, at the same time the full length of received data will 715 sum of all FragmentBuffer length in FragmentTable.
|
H A D | Ip6.h | 450 /// Sum of the lengths of IPv6 packet buffers in FragmentTable. May 461 EFI_IP6_FRAGMENT_DATA FragmentTable[1]; member in struct:_EFI_IP6_RECEIVE_DATA 505 /// Total length in bytes of the FragmentTable data to transmit. 515 EFI_IP6_FRAGMENT_DATA FragmentTable[1]; member in struct:_EFI_IP6_TRANSMIT_DATA 800 - One or more of the Token.Packet.TxData.FragmentTable[].FragmentLength fields is zero. 801 - One or more of the Token.Packet.TxData.FragmentTable[].FragmentBuffer fields is NULL.
|
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Ip4Dxe/ |
H A D | Ip4Input.c | 503 NET_FRAGMENT *FragmentTable; local 518 FragmentTable = NULL; 550 FragmentTable = AllocateZeroPool (FragmentCount * sizeof (NET_FRAGMENT)); 552 if (FragmentTable == NULL) { 557 Status = NetbufBuildExt (Packet, FragmentTable, &FragmentCount); 560 // Record the original FragmentTable and count. 562 OriginalFragmentTable = FragmentTable; 566 FreePool (FragmentTable); 583 (EFI_IPSEC_FRAGMENT_DATA **) (&FragmentTable), 598 if (OriginalFragmentTable == FragmentTable [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Ip6Dxe/ |
H A D | Ip6Input.c | 514 NET_FRAGMENT *FragmentTable; local 531 FragmentTable = NULL; 576 FragmentTable = AllocateZeroPool (FragmentCount * sizeof (NET_FRAGMENT)); 578 if (FragmentTable == NULL) { 583 Status = NetbufBuildExt (Packet, FragmentTable, &FragmentCount); 584 OriginalFragmentTable = FragmentTable; 588 FreePool (FragmentTable); 605 (EFI_IPSEC_FRAGMENT_DATA **) (&FragmentTable), 620 if (OriginalFragmentCount == FragmentCount && OriginalFragmentTable == FragmentTable) { 624 FreePool (FragmentTable); [all...] |