/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/IScsiDxe/ |
H A D | IScsiExtScsiPassThru.c | 18 Sends a SCSI Request Packet to a SCSI device that is attached to the SCSI channel. This function 24 the id of the SCSI device to send the SCSI Request Packet. Each 28 @param[in] Lun The LUN of the SCSI device to send the SCSI Request Packet. 29 @param[in, out] Packet A pointer to the SCSI Request Packet to send to the SCSI device 35 SCSI Request Packet completes. 37 @retval EFI_SUCCESS The SCSI Request Packet was sent by the host. For bi-directional 42 @retval EFI_BAD_BUFFER_SIZE The SCSI Request Packet was not executed. The number of bytes that 46 @retval EFI_NOT_READY The SCSI Request Packet could not be sent because there are too many 49 Packet 60 IScsiExtScsiPassThruFunction( IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This, IN UINT8 *Target, IN UINT64 Lun, IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet, IN EFI_EVENT Event OPTIONAL ) argument [all...] |
H A D | IScsiTcp4Io.c | 334 Transmit the Packet to the other endpoint of the socket. 337 @param[in] Packet The packet to transmit. 346 IN NET_BUF *Packet 353 TxData = AllocatePool (sizeof (EFI_TCP4_TRANSMIT_DATA) + (Packet->BlockOpNum - 1) * sizeof (EFI_TCP4_FRAGMENT_DATA)); 360 TxData->DataLength = Packet->TotalSize; 365 TxData->FragmentCount = Packet->BlockOpNum; 366 NetbufBuildExt (Packet, (NET_FRAGMENT *) &TxData->FragmentTable[0], &TxData->FragmentCount); 368 Tcp4Io->TxToken.Packet.TxData = TxData; 398 @param[in] Packet The buffer to hold the data copy from the soket rx buffer. 400 @param[in] Timeout The time to wait for receiving the amount of data the Packet 410 Tcp4IoReceive( IN TCP4_IO *Tcp4Io, IN NET_BUF *Packet, IN BOOLEAN AsyncMode, IN EFI_EVENT Timeout ) argument [all...] |
H A D | IScsiDhcp.c | 178 @param[in] Packet The DHCP packet that is to be sent or already received. 179 @param[out] NewPacket The packet used to replace the above Packet. 193 IN EFI_DHCP4_PACKET * Packet, OPTIONAL 208 Status = This->Parse (This, Packet, &OptionCount, NULL); 218 Status = This->Parse (This, Packet, &OptionCount, OptionList); 188 IScsiDhcpSelectOffer( IN EFI_DHCP4_PROTOCOL * This, IN VOID *Context, IN EFI_DHCP4_STATE CurrentState, IN EFI_DHCP4_EVENT Dhcp4Event, IN EFI_DHCP4_PACKET * Packet, OPTIONAL OUT EFI_DHCP4_PACKET **NewPacket OPTIONAL ) argument
|
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IScsiDxe/ |
H A D | IScsiExtScsiPassThru.c | 30 Sends a SCSI Request Packet to a SCSI device that is attached to the SCSI channel. 37 Request Packet. Each transport driver may choose to 42 @param[in] Lun The LUN of the SCSI device to send the SCSI Request Packet. 43 @param[in, out] Packet A pointer to the SCSI Request Packet to send to the 49 and Event will be signaled when the SCSI Request Packet 52 @retval EFI_SUCCESS The SCSI Request Packet was sent by the host. For 57 @retval EFI_BAD_BUFFER_SIZE The SCSI Request Packet was not executed. 62 @retval EFI_NOT_READY The SCSI Request Packet could not be sent because 66 the SCSI Request Packet 81 IScsiExtScsiPassThruFunction( IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This, IN UINT8 *Target, IN UINT64 Lun, IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet, IN EFI_EVENT Event OPTIONAL ) argument [all...] |
H A D | IScsiDhcp.c | 195 @param[in] Packet The DHCP packet that is to be sent or was already received. 196 @param[out] NewPacket The packet used to replace the above Packet. 211 IN EFI_DHCP4_PACKET *Packet, OPTIONAL 226 Status = This->Parse (This, Packet, &OptionCount, NULL); 236 Status = This->Parse (This, Packet, &OptionCount, OptionList); 206 IScsiDhcpSelectOffer( IN EFI_DHCP4_PROTOCOL *This, IN VOID *Context, IN EFI_DHCP4_STATE CurrentState, IN EFI_DHCP4_EVENT Dhcp4Event, IN EFI_DHCP4_PACKET *Packet, OPTIONAL OUT EFI_DHCP4_PACKET **NewPacket OPTIONAL ) argument
|
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Ip4Dxe/ |
H A D | Ip4Icmp.c | 86 @param[in] Packet The content of the ICMP redirect packet with IP 99 IN NET_BUF *Packet, 124 NetbufFree (Packet); 151 NetbufFree (Packet); 163 @param[in] Packet The content of the ICMP error with IP head 175 IN NET_BUF *Packet 180 if (Packet->TotalSize < sizeof (Icmp)) { 181 NetbufFree (Packet); 185 NetbufCopy (Packet, 0, sizeof (Icmp), (UINT8 *) &Icmp); 192 return Ip4ProcessIcmpRedirect (IpSb, Head, Packet, 96 Ip4ProcessIcmpRedirect( IN IP4_SERVICE *IpSb, IN IP4_HEAD *Head, IN NET_BUF *Packet, IN IP4_ICMP_ERROR_HEAD *Icmp ) argument [all...] |
H A D | Ip4Igmp.c | 177 NET_BUF *Packet; local 183 Packet = NetbufAlloc (IP4_MAX_HEADLEN + sizeof (IGMP_HEAD)); 185 if (Packet == NULL) { 192 NetbufReserve (Packet, IP4_MAX_HEADLEN); 194 Igmp = (IGMP_HEAD *) NetbufAllocSpace (Packet, sizeof (IGMP_HEAD), FALSE); 215 Packet, 408 @param[in] Packet The IGMP message, without IP4 header 418 IN NET_BUF *Packet 434 if ((Packet->TotalSize < sizeof (Igmp)) || (NetbufChecksum (Packet) ! [all...] |
H A D | Ip4Output.c | 21 Prepend an IP4 head to the Packet. It will copy the options and 24 @param Packet The packet to prepend IP4 header to 34 Packet. 40 IN OUT NET_BUF *Packet, 62 PacketHead = (IP4_HEAD *) NetbufAllocSpace (Packet, HeadLen, NET_BUF_HEAD); 76 PacketHead->TotalLen = HTONS ((UINT16) Packet->TotalSize); 86 Packet->Ip.Ip4 = PacketHead; 159 @param Packet The packet that transmitted. 169 NET_BUF *Packet, 175 NetbufFree (Packet); 39 Ip4PrependHead( IN OUT NET_BUF *Packet, IN IP4_HEAD *Head, IN UINT8 *Option, IN UINT32 OptLen ) argument 167 Ip4SysPacketSent( IP4_PROTOCOL *Ip4Instance, NET_BUF *Packet, EFI_STATUS IoStatus, UINT32 LinkFlag, VOID *Context ) argument 211 Ip4Output( IN IP4_SERVICE *IpSb, IN IP4_PROTOCOL *IpInstance OPTIONAL, IN NET_BUF *Packet, IN IP4_HEAD *Head, IN UINT8 *Option, IN UINT32 OptLen, IN IP4_ADDR GateWay, IN IP4_FRAME_CALLBACK Callback, IN VOID *Context ) argument 460 Ip4CancelPacket( IN IP4_INTERFACE *IpIf, IN NET_BUF *Packet, IN EFI_STATUS IoStatus ) argument [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Mtftp4Dxe/ |
H A D | Mtftp4Wrq.c | 37 EFI_MTFTP4_PACKET *Packet; local 54 Packet = (EFI_MTFTP4_PACKET *) NetbufAllocSpace (UdpPacket, MTFTP4_DATA_HEAD_LEN, FALSE); 55 ASSERT (Packet != NULL); 57 Packet->Data.OpCode = HTONS (EFI_MTFTP4_OPCODE_DATA); 58 Packet->Data.Block = HTONS (BlockNum); 77 CopyMem (Packet->Data.Data, (UINT8 *) Token->Buffer + Start, DataLen); 113 CopyMem (Packet->Data.Data, DataBuf, DataLen); 129 @param Packet The MTFTP packet received 141 IN EFI_MTFTP4_PACKET *Packet, 151 AckNum = NTOHS (Packet 139 Mtftp4WrqHandleAck( IN MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, OUT BOOLEAN *Completed ) argument 258 Mtftp4WrqHandleOack( IN OUT MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, OUT BOOLEAN *Completed ) argument 348 EFI_MTFTP4_PACKET *Packet; local [all...] |
H A D | Mtftp4Option.c | 157 @param Packet The packet to check 170 IN EFI_MTFTP4_PACKET *Packet, 183 Cur = (UINT8 *) Packet + MTFTP4_OPCODE_LEN; 184 Last = (UINT8 *) Packet + PacketLen - 1; 227 Allocate and fill in a array of Mtftp options from the Packet. 232 @param Packet The packet to parse 245 IN EFI_MTFTP4_PACKET *Packet, 259 if (NTOHS (Packet->OpCode) != EFI_MTFTP4_OPCODE_OACK) { 270 if (*((UINT8 *) Packet + PacketLen - 1) != 0) { 277 Status = Mtftp4FillOptions (Packet, PacketLe 169 Mtftp4FillOptions( IN EFI_MTFTP4_PACKET *Packet, IN UINT32 PacketLen, IN OUT UINT32 *Count, OUT EFI_MTFTP4_OPTION *Options OPTIONAL ) argument 244 Mtftp4ExtractOptions( IN EFI_MTFTP4_PACKET *Packet, IN UINT32 PacketLen, OUT UINT32 *OptionCount, OUT EFI_MTFTP4_OPTION **OptionList OPTIONAL ) argument 511 Mtftp4ParseOptionOack( IN EFI_MTFTP4_PACKET *Packet, IN UINT32 PacketLen, OUT MTFTP4_OPTION *MtftpOption ) argument [all...] |
H A D | Mtftp4Rrq.c | 100 NET_BUF *Packet; local 102 Packet = NetbufAlloc (sizeof (EFI_MTFTP4_ACK_HEADER)); 103 if (Packet == NULL) { 108 Packet, 117 return Mtftp4SendPacket (Instance, Packet); 126 @param Packet The received data packet 139 IN EFI_MTFTP4_PACKET *Packet, 153 Block = NTOHS (Packet->Data.Block); 181 Status = Token->CheckPacket (&Instance->Mtftp4, Token, (UINT16) Len, Packet); 198 CopyMem ((UINT8 *) Token->Buffer + Start, Packet 137 Mtftp4RrqSaveBlock( IN OUT MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len ) argument 246 Mtftp4RrqHandleData( IN MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, IN BOOLEAN Multicast, OUT BOOLEAN *Completed ) argument 478 Mtftp4RrqHandleOack( IN OUT MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, IN BOOLEAN Multicast, OUT BOOLEAN *Completed ) argument 626 EFI_MTFTP4_PACKET *Packet; local [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/UefiPxeBcDxe/ |
H A D | PxeBcMtftp.c | 37 @param Packet Pointer to Mtftp packet 49 IN EFI_MTFTP4_PACKET *Packet 60 if (Packet->OpCode == EFI_MTFTP4_OPCODE_ERROR) { 62 Private->Mode.TftpError.ErrorCode = (UINT8) Packet->Error.ErrorCode; 63 AsciiStrnCpy (Private->Mode.TftpError.ErrorString, (CHAR8 *) Packet->Error.ErrorMessage, 127); 73 (EFI_PXE_BASE_CODE_PACKET *) Packet 114 EFI_MTFTP4_PACKET *Packet; local 124 Packet = NULL; 155 &Packet 161 Private->Mode.TftpError.ErrorCode = (UINT8) Packet [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/ |
H A D | IpSecDebug.c | 189 Print the IKE Packet. 191 @param[in] Packet Point to IKE packet to be printed. 198 IN IKE_PACKET *Packet, 208 ASSERT (Packet != NULL); 210 PacketSize = Packet->PayloadTotalSize + sizeof (IKE_HEADER); 211 InitCookie = (Direction == EfiIPsecOutBound) ? HTONLL (Packet->Header->InitiatorCookie) : Packet->Header->InitiatorCookie; 212 RespCookie = (Direction == EfiIPsecOutBound) ? HTONLL (Packet->Header->ResponderCookie) : Packet->Header->ResponderCookie; 214 switch (Packet 197 IpSecDumpPacket( IN IKE_PACKET *Packet, IN EFI_IPSEC_TRAFFIC_DIR Direction, IN UINT8 IpVersion ) argument [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Mtftp6Dxe/ |
H A D | Mtftp6Impl.c | 275 @param[out] Packet The pointer to the received packet. This buffer must be freed by 278 @retval EFI_SUCCESS An MTFTPv6 OACK packet was received and is in the Packet. 294 @retval EFI_TFTP_ERROR An MTFTPv6 ERROR packet was received and is in the Packet. 295 @retval EFI_NETWORK_UNREACHABLE An ICMP network unreachable error packet was received and the Packet is set to NULL. 297 @retval EFI_HOST_UNREACHABLE An ICMP host unreachable error packet was received and the Packet is set to NULL. 299 @retval EFI_PROTOCOL_UNREACHABLE An ICMP protocol unreachable error packet was received and the Packet is set to NULL. 301 @retval EFI_PORT_UNREACHABLE An ICMP port unreachable error packet was received and the Packet is set to NULL. 302 @retval EFI_ICMP_ERROR Some other ICMP ERROR packet was received and the Packet is set to NULL. 304 @retval EFI_PROTOCOL_ERROR An unexpected MTFTPv6 packet was received and is in the Packet. 320 OUT EFI_MTFTP6_PACKET **Packet OPTIONA 411 EfiMtftp6ParseOptions( IN EFI_MTFTP6_PROTOCOL *This, IN UINT32 PacketLen, IN EFI_MTFTP6_PACKET *Packet, OUT UINT32 *OptionCount, OUT EFI_MTFTP6_OPTION **OptionList OPTIONAL ) argument [all...] |
H A D | Mtftp6Option.c | 247 @param[in] Packet The packet to be checked. 262 IN EFI_MTFTP6_PACKET *Packet, 275 Cur = (UINT8 *) Packet + MTFTP6_OPCODE_LEN; 276 Last = (UINT8 *) Packet + PacketLen - 1; 326 @param[in] Packet The packet to be checked. 343 IN EFI_MTFTP6_PACKET *Packet, 351 if (PacketLen == 0 || Packet == NULL || OptionCount == NULL) { 361 if (NTOHS (Packet->OpCode) != EFI_MTFTP6_OPCODE_OACK) { 368 if (*((UINT8 *) Packet + PacketLen - 1) != 0) { 376 Status = Mtftp6ParsePacketOption (Packet, PacketLe 261 Mtftp6ParsePacketOption( IN EFI_MTFTP6_PACKET *Packet, IN UINT32 PacketLen, IN OUT UINT32 *Count, IN EFI_MTFTP6_OPTION *Options OPTIONAL ) argument 342 Mtftp6ParseStart( IN EFI_MTFTP6_PACKET *Packet, IN UINT32 PacketLen, IN OUT UINT32 *OptionCount, OUT EFI_MTFTP6_OPTION **OptionList OPTIONAL ) argument [all...] |
H A D | Mtftp6Wrq.c | 37 EFI_MTFTP6_PACKET *Packet; local 54 Packet = (EFI_MTFTP6_PACKET *) NetbufAllocSpace ( 59 ASSERT (Packet != NULL); 61 Packet->Data.OpCode = HTONS (EFI_MTFTP6_OPCODE_DATA); 62 Packet->Data.Block = HTONS (BlockNum); 81 CopyMem (Packet->Data.Data, (UINT8 *) Token->Buffer + Start, DataLen); 114 CopyMem (Packet->Data.Data, DataBuf, DataLen); 134 @param[in] Packet The pointer to the received packet. 148 IN EFI_MTFTP6_PACKET *Packet, 159 AckNum = NTOHS (Packet 146 Mtftp6WrqHandleAck( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument 282 Mtftp6WrqHandleOack( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument 391 EFI_MTFTP6_PACKET *Packet; local [all...] |
H A D | Mtftp6Rrq.c | 37 NET_BUF *Packet; local 42 Packet = NetbufAlloc (sizeof (EFI_MTFTP6_ACK_HEADER)); 44 if (Packet == NULL) { 49 Packet, 63 return Mtftp6TransmitPacket (Instance, Packet); 72 @param[in] Packet The pointer to the received packet. 86 IN EFI_MTFTP6_PACKET *Packet, 101 Block = NTOHS (Packet->Data.Block); 132 Status = Token->CheckPacket (&Instance->Mtftp6, Token, (UINT16) Len, Packet); 158 CopyMem ((UINT8 *) Token->Buffer + Start, Packet 84 Mtftp6RrqSaveBlock( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket ) argument 213 Mtftp6RrqHandleData( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument 443 Mtftp6RrqHandleOack( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument 646 EFI_MTFTP6_PACKET *Packet; local [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Bus/Usb/UsbBotPei/ |
H A D | PeiAtapi.c | 23 Sends out ATAPI Inquiry Packet Command to the specified device. This command will 39 ATAPI_PACKET_COMMAND Packet; local 46 ZeroMem (&Packet, sizeof (ATAPI_PACKET_COMMAND)); 49 Packet.Inquiry.opcode = ATA_CMD_INQUIRY; 50 Packet.Inquiry.page_code = 0; 51 Packet.Inquiry.allocation_length = 36; 61 &Packet, 85 Sends out ATAPI Test Unit Ready Packet Command to the specified device 101 ATAPI_PACKET_COMMAND Packet; local 107 ZeroMem (&Packet, sizeo 152 ATAPI_PACKET_COMMAND Packet; local 245 ATAPI_PACKET_COMMAND Packet; local 297 ATAPI_PACKET_COMMAND Packet; local 367 ATAPI_PACKET_COMMAND Packet; local [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Library/DxeTcpIoLib/ |
H A D | DxeTcpIoLib.c | 374 TcpIo->RxToken.Tcp4Token.Packet.RxData = RxData; 459 if (TcpIo->RxToken.Tcp4Token.Packet.RxData != NULL) { 460 FreePool (TcpIo->RxToken.Tcp4Token.Packet.RxData); 739 Transmit the Packet to the other endpoint of the socket. 742 @param[in] Packet The packet to transmit. 757 IN NET_BUF *Packet 766 if ((TcpIo == NULL) || (TcpIo->Tcp.Tcp4 == NULL)|| (Packet == NULL)) { 773 (Packet->BlockOpNum - 1) * sizeof (EFI_TCP4_FRAGMENT_DATA); 776 (Packet->BlockOpNum - 1) * sizeof (EFI_TCP6_FRAGMENT_DATA); 788 ((EFI_TCP4_TRANSMIT_DATA *) Data)->DataLength = Packet 876 TcpIoReceive( IN OUT TCP_IO *TcpIo, IN NET_BUF *Packet, IN BOOLEAN AsyncMode, IN EFI_EVENT Timeout ) argument [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Udp4Dxe/ |
H A D | Udp4Main.c | 509 NET_BUF *Packet; local 555 TxData = Token->Packet.TxData; 560 Packet = NetbufFromExt ( 568 if (Packet == NULL) { 577 *((UINTN *) &Packet->ProtoData[0]) = (UINTN) (Udp4Service->IpIo); 579 Udp4Header = (EFI_UDP_HEADER *) NetbufAllocSpace (Packet, UDP4_HEADER_SIZE, TRUE); 589 Udp4Header->Length = HTONS ((UINT16) Packet->TotalSize); 636 Udp4Header->Checksum = Udp4Checksum (Packet, HeadSum); 661 Status = NetMapInsertTail (&Instance->TxTokens, Token, Packet); 672 Packet, [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Dhcp6Dxe/ |
H A D | Dhcp6Impl.c | 1130 @param[in] Packet The pointer to the Dhcp6 packet. 1137 that were found in the Packet. 1144 IN EFI_DHCP6_PACKET *Packet, 1155 if (This == NULL || Packet == NULL || OptionCount == NULL) { 1163 if (Packet->Length > Packet->Size || Packet->Length < sizeof (EFI_DHCP6_HEADER)) { 1180 OptLen = Packet->Length - sizeof (EFI_DHCP6_HEADER); 1181 Start = Packet->Dhcp6.Option; 1208 Start = Packet 1142 EfiDhcp6Parse( IN EFI_DHCP6_PROTOCOL *This, IN EFI_DHCP6_PACKET *Packet, IN OUT UINT32 *OptionCount, OUT EFI_DHCP6_PACKET_OPTION *PacketOptionList[] OPTIONAL ) argument [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Ip6Dxe/ |
H A D | Ip6Icmp.c | 125 @param[in] Packet The content of the ICMPv6 message with the IP head 137 IN NET_BUF *Packet 150 Data = NetbufDuplicate (Packet, NULL, IP6_MAX_HEADLEN); 177 ReplyHead.PayloadLength = HTONS ((UINT16) (Packet->TotalSize)); 202 NetbufFree (Packet); 207 Process Packet Too Big message sent by a router in response to a packet that 210 if Packet Too Big message is still received, do not reduce the packet size, but 215 @param[in] Packet The content of the ICMPv6 error with the IP head 228 IN NET_BUF *Packet 236 NetbufCopy (Packet, 570 Ip6SendIcmpError( IN IP6_SERVICE *IpSb, IN NET_BUF *Packet, IN EFI_IPv6_ADDRESS *SourceAddress OPTIONAL, IN EFI_IPv6_ADDRESS *DestinationAddress, IN UINT8 Type, IN UINT8 Code, IN UINT32 *Pointer OPTIONAL ) argument [all...] |
H A D | Ip6If.h | 42 NET_BUF *Packet, 71 NET_BUF *Packet; member in struct:__anon12494 231 @param[in] Packet The packet to transmit. 245 IN NET_BUF *Packet,
|
H A D | Ip6Input.h | 35 #define IP6_GET_CLIP_INFO(Packet) ((IP6_CLIP_INFO *) ((Packet)->ProtoData)) 89 NET_BUF *Packet; // The first fragment of the packet member in struct:__anon12499 105 @param[in] Packet The IP6 packet received. 114 IN NET_BUF *Packet, 210 @param[in] Packet The data of the received packet. 221 IN NET_BUF *Packet
|
H A D | Ip6Option.c | 24 @param[in] Packet The to be validated packet. 38 IN NET_BUF *Packet, 86 Packet, 88 &Packet->Ip.Ip6->SourceAddress, 95 if (!IP6_IS_MULTICAST (&Packet->Ip.Ip6->DestinationAddress)) { 99 Packet, 101 &Packet->Ip.Ip6->SourceAddress, 237 @param[in] Packet The data of the packet. Ignored if NULL. 262 IN NET_BUF *Packet OPTIONAL, 331 if ((IpSb != NULL) && (Packet ! 36 Ip6IsOptionValid( IN IP6_SERVICE *IpSb, IN NET_BUF *Packet, IN UINT8 *Option, IN UINT8 OptionLen, IN UINT32 Pointer ) argument [all...] |