Searched defs:Packet (Results 1 - 25 of 94) sorted by relevance

1234

/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/IScsiDxe/
H A DIScsiExtScsiPassThru.c18 Sends a SCSI Request Packet to a SCSI device that is attached to the SCSI channel. This function
24 the id of the SCSI device to send the SCSI Request Packet. Each
28 @param[in] Lun The LUN of the SCSI device to send the SCSI Request Packet.
29 @param[in, out] Packet A pointer to the SCSI Request Packet to send to the SCSI device
35 SCSI Request Packet completes.
37 @retval EFI_SUCCESS The SCSI Request Packet was sent by the host. For bi-directional
42 @retval EFI_BAD_BUFFER_SIZE The SCSI Request Packet was not executed. The number of bytes that
46 @retval EFI_NOT_READY The SCSI Request Packet could not be sent because there are too many
49 Packet
60 IScsiExtScsiPassThruFunction( IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This, IN UINT8 *Target, IN UINT64 Lun, IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet, IN EFI_EVENT Event OPTIONAL ) argument
[all...]
H A DIScsiTcp4Io.c334 Transmit the Packet to the other endpoint of the socket.
337 @param[in] Packet The packet to transmit.
346 IN NET_BUF *Packet
353 TxData = AllocatePool (sizeof (EFI_TCP4_TRANSMIT_DATA) + (Packet->BlockOpNum - 1) * sizeof (EFI_TCP4_FRAGMENT_DATA));
360 TxData->DataLength = Packet->TotalSize;
365 TxData->FragmentCount = Packet->BlockOpNum;
366 NetbufBuildExt (Packet, (NET_FRAGMENT *) &TxData->FragmentTable[0], &TxData->FragmentCount);
368 Tcp4Io->TxToken.Packet.TxData = TxData;
398 @param[in] Packet The buffer to hold the data copy from the soket rx buffer.
400 @param[in] Timeout The time to wait for receiving the amount of data the Packet
410 Tcp4IoReceive( IN TCP4_IO *Tcp4Io, IN NET_BUF *Packet, IN BOOLEAN AsyncMode, IN EFI_EVENT Timeout ) argument
[all...]
H A DIScsiDhcp.c178 @param[in] Packet The DHCP packet that is to be sent or already received.
179 @param[out] NewPacket The packet used to replace the above Packet.
193 IN EFI_DHCP4_PACKET * Packet, OPTIONAL
208 Status = This->Parse (This, Packet, &OptionCount, NULL);
218 Status = This->Parse (This, Packet, &OptionCount, OptionList);
188 IScsiDhcpSelectOffer( IN EFI_DHCP4_PROTOCOL * This, IN VOID *Context, IN EFI_DHCP4_STATE CurrentState, IN EFI_DHCP4_EVENT Dhcp4Event, IN EFI_DHCP4_PACKET * Packet, OPTIONAL OUT EFI_DHCP4_PACKET **NewPacket OPTIONAL ) argument
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IScsiDxe/
H A DIScsiExtScsiPassThru.c30 Sends a SCSI Request Packet to a SCSI device that is attached to the SCSI channel.
37 Request Packet. Each transport driver may choose to
42 @param[in] Lun The LUN of the SCSI device to send the SCSI Request Packet.
43 @param[in, out] Packet A pointer to the SCSI Request Packet to send to the
49 and Event will be signaled when the SCSI Request Packet
52 @retval EFI_SUCCESS The SCSI Request Packet was sent by the host. For
57 @retval EFI_BAD_BUFFER_SIZE The SCSI Request Packet was not executed.
62 @retval EFI_NOT_READY The SCSI Request Packet could not be sent because
66 the SCSI Request Packet
81 IScsiExtScsiPassThruFunction( IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This, IN UINT8 *Target, IN UINT64 Lun, IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet, IN EFI_EVENT Event OPTIONAL ) argument
[all...]
H A DIScsiDhcp.c195 @param[in] Packet The DHCP packet that is to be sent or was already received.
196 @param[out] NewPacket The packet used to replace the above Packet.
211 IN EFI_DHCP4_PACKET *Packet, OPTIONAL
226 Status = This->Parse (This, Packet, &OptionCount, NULL);
236 Status = This->Parse (This, Packet, &OptionCount, OptionList);
206 IScsiDhcpSelectOffer( IN EFI_DHCP4_PROTOCOL *This, IN VOID *Context, IN EFI_DHCP4_STATE CurrentState, IN EFI_DHCP4_EVENT Dhcp4Event, IN EFI_DHCP4_PACKET *Packet, OPTIONAL OUT EFI_DHCP4_PACKET **NewPacket OPTIONAL ) argument
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Ip4Dxe/
H A DIp4Icmp.c86 @param[in] Packet The content of the ICMP redirect packet with IP
99 IN NET_BUF *Packet,
124 NetbufFree (Packet);
151 NetbufFree (Packet);
163 @param[in] Packet The content of the ICMP error with IP head
175 IN NET_BUF *Packet
180 if (Packet->TotalSize < sizeof (Icmp)) {
181 NetbufFree (Packet);
185 NetbufCopy (Packet, 0, sizeof (Icmp), (UINT8 *) &Icmp);
192 return Ip4ProcessIcmpRedirect (IpSb, Head, Packet,
96 Ip4ProcessIcmpRedirect( IN IP4_SERVICE *IpSb, IN IP4_HEAD *Head, IN NET_BUF *Packet, IN IP4_ICMP_ERROR_HEAD *Icmp ) argument
[all...]
H A DIp4Igmp.c177 NET_BUF *Packet; local
183 Packet = NetbufAlloc (IP4_MAX_HEADLEN + sizeof (IGMP_HEAD));
185 if (Packet == NULL) {
192 NetbufReserve (Packet, IP4_MAX_HEADLEN);
194 Igmp = (IGMP_HEAD *) NetbufAllocSpace (Packet, sizeof (IGMP_HEAD), FALSE);
215 Packet,
408 @param[in] Packet The IGMP message, without IP4 header
418 IN NET_BUF *Packet
434 if ((Packet->TotalSize < sizeof (Igmp)) || (NetbufChecksum (Packet) !
[all...]
H A DIp4Output.c21 Prepend an IP4 head to the Packet. It will copy the options and
24 @param Packet The packet to prepend IP4 header to
34 Packet.
40 IN OUT NET_BUF *Packet,
62 PacketHead = (IP4_HEAD *) NetbufAllocSpace (Packet, HeadLen, NET_BUF_HEAD);
76 PacketHead->TotalLen = HTONS ((UINT16) Packet->TotalSize);
86 Packet->Ip.Ip4 = PacketHead;
159 @param Packet The packet that transmitted.
169 NET_BUF *Packet,
175 NetbufFree (Packet);
39 Ip4PrependHead( IN OUT NET_BUF *Packet, IN IP4_HEAD *Head, IN UINT8 *Option, IN UINT32 OptLen ) argument
167 Ip4SysPacketSent( IP4_PROTOCOL *Ip4Instance, NET_BUF *Packet, EFI_STATUS IoStatus, UINT32 LinkFlag, VOID *Context ) argument
211 Ip4Output( IN IP4_SERVICE *IpSb, IN IP4_PROTOCOL *IpInstance OPTIONAL, IN NET_BUF *Packet, IN IP4_HEAD *Head, IN UINT8 *Option, IN UINT32 OptLen, IN IP4_ADDR GateWay, IN IP4_FRAME_CALLBACK Callback, IN VOID *Context ) argument
460 Ip4CancelPacket( IN IP4_INTERFACE *IpIf, IN NET_BUF *Packet, IN EFI_STATUS IoStatus ) argument
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Mtftp4Dxe/
H A DMtftp4Wrq.c37 EFI_MTFTP4_PACKET *Packet; local
54 Packet = (EFI_MTFTP4_PACKET *) NetbufAllocSpace (UdpPacket, MTFTP4_DATA_HEAD_LEN, FALSE);
55 ASSERT (Packet != NULL);
57 Packet->Data.OpCode = HTONS (EFI_MTFTP4_OPCODE_DATA);
58 Packet->Data.Block = HTONS (BlockNum);
77 CopyMem (Packet->Data.Data, (UINT8 *) Token->Buffer + Start, DataLen);
113 CopyMem (Packet->Data.Data, DataBuf, DataLen);
129 @param Packet The MTFTP packet received
141 IN EFI_MTFTP4_PACKET *Packet,
151 AckNum = NTOHS (Packet
139 Mtftp4WrqHandleAck( IN MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, OUT BOOLEAN *Completed ) argument
258 Mtftp4WrqHandleOack( IN OUT MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, OUT BOOLEAN *Completed ) argument
348 EFI_MTFTP4_PACKET *Packet; local
[all...]
H A DMtftp4Option.c157 @param Packet The packet to check
170 IN EFI_MTFTP4_PACKET *Packet,
183 Cur = (UINT8 *) Packet + MTFTP4_OPCODE_LEN;
184 Last = (UINT8 *) Packet + PacketLen - 1;
227 Allocate and fill in a array of Mtftp options from the Packet.
232 @param Packet The packet to parse
245 IN EFI_MTFTP4_PACKET *Packet,
259 if (NTOHS (Packet->OpCode) != EFI_MTFTP4_OPCODE_OACK) {
270 if (*((UINT8 *) Packet + PacketLen - 1) != 0) {
277 Status = Mtftp4FillOptions (Packet, PacketLe
169 Mtftp4FillOptions( IN EFI_MTFTP4_PACKET *Packet, IN UINT32 PacketLen, IN OUT UINT32 *Count, OUT EFI_MTFTP4_OPTION *Options OPTIONAL ) argument
244 Mtftp4ExtractOptions( IN EFI_MTFTP4_PACKET *Packet, IN UINT32 PacketLen, OUT UINT32 *OptionCount, OUT EFI_MTFTP4_OPTION **OptionList OPTIONAL ) argument
511 Mtftp4ParseOptionOack( IN EFI_MTFTP4_PACKET *Packet, IN UINT32 PacketLen, OUT MTFTP4_OPTION *MtftpOption ) argument
[all...]
H A DMtftp4Rrq.c100 NET_BUF *Packet; local
102 Packet = NetbufAlloc (sizeof (EFI_MTFTP4_ACK_HEADER));
103 if (Packet == NULL) {
108 Packet,
117 return Mtftp4SendPacket (Instance, Packet);
126 @param Packet The received data packet
139 IN EFI_MTFTP4_PACKET *Packet,
153 Block = NTOHS (Packet->Data.Block);
181 Status = Token->CheckPacket (&Instance->Mtftp4, Token, (UINT16) Len, Packet);
198 CopyMem ((UINT8 *) Token->Buffer + Start, Packet
137 Mtftp4RrqSaveBlock( IN OUT MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len ) argument
246 Mtftp4RrqHandleData( IN MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, IN BOOLEAN Multicast, OUT BOOLEAN *Completed ) argument
478 Mtftp4RrqHandleOack( IN OUT MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, IN BOOLEAN Multicast, OUT BOOLEAN *Completed ) argument
626 EFI_MTFTP4_PACKET *Packet; local
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/UefiPxeBcDxe/
H A DPxeBcMtftp.c37 @param Packet Pointer to Mtftp packet
49 IN EFI_MTFTP4_PACKET *Packet
60 if (Packet->OpCode == EFI_MTFTP4_OPCODE_ERROR) {
62 Private->Mode.TftpError.ErrorCode = (UINT8) Packet->Error.ErrorCode;
63 AsciiStrnCpy (Private->Mode.TftpError.ErrorString, (CHAR8 *) Packet->Error.ErrorMessage, 127);
73 (EFI_PXE_BASE_CODE_PACKET *) Packet
114 EFI_MTFTP4_PACKET *Packet; local
124 Packet = NULL;
155 &Packet
161 Private->Mode.TftpError.ErrorCode = (UINT8) Packet
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/
H A DIpSecDebug.c189 Print the IKE Packet.
191 @param[in] Packet Point to IKE packet to be printed.
198 IN IKE_PACKET *Packet,
208 ASSERT (Packet != NULL);
210 PacketSize = Packet->PayloadTotalSize + sizeof (IKE_HEADER);
211 InitCookie = (Direction == EfiIPsecOutBound) ? HTONLL (Packet->Header->InitiatorCookie) : Packet->Header->InitiatorCookie;
212 RespCookie = (Direction == EfiIPsecOutBound) ? HTONLL (Packet->Header->ResponderCookie) : Packet->Header->ResponderCookie;
214 switch (Packet
197 IpSecDumpPacket( IN IKE_PACKET *Packet, IN EFI_IPSEC_TRAFFIC_DIR Direction, IN UINT8 IpVersion ) argument
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Mtftp6Dxe/
H A DMtftp6Impl.c275 @param[out] Packet The pointer to the received packet. This buffer must be freed by
278 @retval EFI_SUCCESS An MTFTPv6 OACK packet was received and is in the Packet.
294 @retval EFI_TFTP_ERROR An MTFTPv6 ERROR packet was received and is in the Packet.
295 @retval EFI_NETWORK_UNREACHABLE An ICMP network unreachable error packet was received and the Packet is set to NULL.
297 @retval EFI_HOST_UNREACHABLE An ICMP host unreachable error packet was received and the Packet is set to NULL.
299 @retval EFI_PROTOCOL_UNREACHABLE An ICMP protocol unreachable error packet was received and the Packet is set to NULL.
301 @retval EFI_PORT_UNREACHABLE An ICMP port unreachable error packet was received and the Packet is set to NULL.
302 @retval EFI_ICMP_ERROR Some other ICMP ERROR packet was received and the Packet is set to NULL.
304 @retval EFI_PROTOCOL_ERROR An unexpected MTFTPv6 packet was received and is in the Packet.
320 OUT EFI_MTFTP6_PACKET **Packet OPTIONA
411 EfiMtftp6ParseOptions( IN EFI_MTFTP6_PROTOCOL *This, IN UINT32 PacketLen, IN EFI_MTFTP6_PACKET *Packet, OUT UINT32 *OptionCount, OUT EFI_MTFTP6_OPTION **OptionList OPTIONAL ) argument
[all...]
H A DMtftp6Option.c247 @param[in] Packet The packet to be checked.
262 IN EFI_MTFTP6_PACKET *Packet,
275 Cur = (UINT8 *) Packet + MTFTP6_OPCODE_LEN;
276 Last = (UINT8 *) Packet + PacketLen - 1;
326 @param[in] Packet The packet to be checked.
343 IN EFI_MTFTP6_PACKET *Packet,
351 if (PacketLen == 0 || Packet == NULL || OptionCount == NULL) {
361 if (NTOHS (Packet->OpCode) != EFI_MTFTP6_OPCODE_OACK) {
368 if (*((UINT8 *) Packet + PacketLen - 1) != 0) {
376 Status = Mtftp6ParsePacketOption (Packet, PacketLe
261 Mtftp6ParsePacketOption( IN EFI_MTFTP6_PACKET *Packet, IN UINT32 PacketLen, IN OUT UINT32 *Count, IN EFI_MTFTP6_OPTION *Options OPTIONAL ) argument
342 Mtftp6ParseStart( IN EFI_MTFTP6_PACKET *Packet, IN UINT32 PacketLen, IN OUT UINT32 *OptionCount, OUT EFI_MTFTP6_OPTION **OptionList OPTIONAL ) argument
[all...]
H A DMtftp6Wrq.c37 EFI_MTFTP6_PACKET *Packet; local
54 Packet = (EFI_MTFTP6_PACKET *) NetbufAllocSpace (
59 ASSERT (Packet != NULL);
61 Packet->Data.OpCode = HTONS (EFI_MTFTP6_OPCODE_DATA);
62 Packet->Data.Block = HTONS (BlockNum);
81 CopyMem (Packet->Data.Data, (UINT8 *) Token->Buffer + Start, DataLen);
114 CopyMem (Packet->Data.Data, DataBuf, DataLen);
134 @param[in] Packet The pointer to the received packet.
148 IN EFI_MTFTP6_PACKET *Packet,
159 AckNum = NTOHS (Packet
146 Mtftp6WrqHandleAck( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument
282 Mtftp6WrqHandleOack( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument
391 EFI_MTFTP6_PACKET *Packet; local
[all...]
H A DMtftp6Rrq.c37 NET_BUF *Packet; local
42 Packet = NetbufAlloc (sizeof (EFI_MTFTP6_ACK_HEADER));
44 if (Packet == NULL) {
49 Packet,
63 return Mtftp6TransmitPacket (Instance, Packet);
72 @param[in] Packet The pointer to the received packet.
86 IN EFI_MTFTP6_PACKET *Packet,
101 Block = NTOHS (Packet->Data.Block);
132 Status = Token->CheckPacket (&Instance->Mtftp6, Token, (UINT16) Len, Packet);
158 CopyMem ((UINT8 *) Token->Buffer + Start, Packet
84 Mtftp6RrqSaveBlock( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket ) argument
213 Mtftp6RrqHandleData( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument
443 Mtftp6RrqHandleOack( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument
646 EFI_MTFTP6_PACKET *Packet; local
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Bus/Usb/UsbBotPei/
H A DPeiAtapi.c23 Sends out ATAPI Inquiry Packet Command to the specified device. This command will
39 ATAPI_PACKET_COMMAND Packet; local
46 ZeroMem (&Packet, sizeof (ATAPI_PACKET_COMMAND));
49 Packet.Inquiry.opcode = ATA_CMD_INQUIRY;
50 Packet.Inquiry.page_code = 0;
51 Packet.Inquiry.allocation_length = 36;
61 &Packet,
85 Sends out ATAPI Test Unit Ready Packet Command to the specified device
101 ATAPI_PACKET_COMMAND Packet; local
107 ZeroMem (&Packet, sizeo
152 ATAPI_PACKET_COMMAND Packet; local
245 ATAPI_PACKET_COMMAND Packet; local
297 ATAPI_PACKET_COMMAND Packet; local
367 ATAPI_PACKET_COMMAND Packet; local
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Library/DxeTcpIoLib/
H A DDxeTcpIoLib.c374 TcpIo->RxToken.Tcp4Token.Packet.RxData = RxData;
459 if (TcpIo->RxToken.Tcp4Token.Packet.RxData != NULL) {
460 FreePool (TcpIo->RxToken.Tcp4Token.Packet.RxData);
739 Transmit the Packet to the other endpoint of the socket.
742 @param[in] Packet The packet to transmit.
757 IN NET_BUF *Packet
766 if ((TcpIo == NULL) || (TcpIo->Tcp.Tcp4 == NULL)|| (Packet == NULL)) {
773 (Packet->BlockOpNum - 1) * sizeof (EFI_TCP4_FRAGMENT_DATA);
776 (Packet->BlockOpNum - 1) * sizeof (EFI_TCP6_FRAGMENT_DATA);
788 ((EFI_TCP4_TRANSMIT_DATA *) Data)->DataLength = Packet
876 TcpIoReceive( IN OUT TCP_IO *TcpIo, IN NET_BUF *Packet, IN BOOLEAN AsyncMode, IN EFI_EVENT Timeout ) argument
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Udp4Dxe/
H A DUdp4Main.c509 NET_BUF *Packet; local
555 TxData = Token->Packet.TxData;
560 Packet = NetbufFromExt (
568 if (Packet == NULL) {
577 *((UINTN *) &Packet->ProtoData[0]) = (UINTN) (Udp4Service->IpIo);
579 Udp4Header = (EFI_UDP_HEADER *) NetbufAllocSpace (Packet, UDP4_HEADER_SIZE, TRUE);
589 Udp4Header->Length = HTONS ((UINT16) Packet->TotalSize);
636 Udp4Header->Checksum = Udp4Checksum (Packet, HeadSum);
661 Status = NetMapInsertTail (&Instance->TxTokens, Token, Packet);
672 Packet,
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Dhcp6Dxe/
H A DDhcp6Impl.c1130 @param[in] Packet The pointer to the Dhcp6 packet.
1137 that were found in the Packet.
1144 IN EFI_DHCP6_PACKET *Packet,
1155 if (This == NULL || Packet == NULL || OptionCount == NULL) {
1163 if (Packet->Length > Packet->Size || Packet->Length < sizeof (EFI_DHCP6_HEADER)) {
1180 OptLen = Packet->Length - sizeof (EFI_DHCP6_HEADER);
1181 Start = Packet->Dhcp6.Option;
1208 Start = Packet
1142 EfiDhcp6Parse( IN EFI_DHCP6_PROTOCOL *This, IN EFI_DHCP6_PACKET *Packet, IN OUT UINT32 *OptionCount, OUT EFI_DHCP6_PACKET_OPTION *PacketOptionList[] OPTIONAL ) argument
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Ip6Dxe/
H A DIp6Icmp.c125 @param[in] Packet The content of the ICMPv6 message with the IP head
137 IN NET_BUF *Packet
150 Data = NetbufDuplicate (Packet, NULL, IP6_MAX_HEADLEN);
177 ReplyHead.PayloadLength = HTONS ((UINT16) (Packet->TotalSize));
202 NetbufFree (Packet);
207 Process Packet Too Big message sent by a router in response to a packet that
210 if Packet Too Big message is still received, do not reduce the packet size, but
215 @param[in] Packet The content of the ICMPv6 error with the IP head
228 IN NET_BUF *Packet
236 NetbufCopy (Packet,
570 Ip6SendIcmpError( IN IP6_SERVICE *IpSb, IN NET_BUF *Packet, IN EFI_IPv6_ADDRESS *SourceAddress OPTIONAL, IN EFI_IPv6_ADDRESS *DestinationAddress, IN UINT8 Type, IN UINT8 Code, IN UINT32 *Pointer OPTIONAL ) argument
[all...]
H A DIp6If.h42 NET_BUF *Packet,
71 NET_BUF *Packet; member in struct:__anon12494
231 @param[in] Packet The packet to transmit.
245 IN NET_BUF *Packet,
H A DIp6Input.h35 #define IP6_GET_CLIP_INFO(Packet) ((IP6_CLIP_INFO *) ((Packet)->ProtoData))
89 NET_BUF *Packet; // The first fragment of the packet member in struct:__anon12499
105 @param[in] Packet The IP6 packet received.
114 IN NET_BUF *Packet,
210 @param[in] Packet The data of the received packet.
221 IN NET_BUF *Packet
H A DIp6Option.c24 @param[in] Packet The to be validated packet.
38 IN NET_BUF *Packet,
86 Packet,
88 &Packet->Ip.Ip6->SourceAddress,
95 if (!IP6_IS_MULTICAST (&Packet->Ip.Ip6->DestinationAddress)) {
99 Packet,
101 &Packet->Ip.Ip6->SourceAddress,
237 @param[in] Packet The data of the packet. Ignored if NULL.
262 IN NET_BUF *Packet OPTIONAL,
331 if ((IpSb != NULL) && (Packet !
36 Ip6IsOptionValid( IN IP6_SERVICE *IpSb, IN NET_BUF *Packet, IN UINT8 *Option, IN UINT8 OptionLen, IN UINT32 Pointer ) argument
[all...]

Completed in 72 milliseconds

1234