Searched refs:Packet (Results 1 - 25 of 156) sorted by relevance

1234567

/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Ip6Dxe/
H A DIp6Input.c55 Assemble->Packet = NULL;
82 if (Assemble->Packet != NULL) {
83 NetbufFree (Assemble->Packet);
110 @param[in, out] Packet Packet to trim.
117 IN OUT NET_BUF *Packet,
125 Info = IP6_GET_CLIP_INFO (Packet);
133 NetbufTrim (Packet, (UINT32) Len, NET_BUF_HEAD);
141 NetbufTrim (Packet, (UINT32) Len, NET_BUF_TAIL);
154 if the Packet i
116 Ip6TrimPacket( IN OUT NET_BUF *Packet, IN INTN Start, IN INTN End ) argument
519 NET_BUF *Packet; local
745 Ip6PreProcessPacket( IN IP6_SERVICE *IpSb, IN OUT NET_BUF **Packet, IN UINT32 Flag, OUT UINT8 **Payload, OUT UINT8 **LastHead, OUT UINT32 *ExtHdrsLen, OUT UINT32 *UnFragmentLen, OUT BOOLEAN *Fragmented, OUT EFI_IP6_HEADER **Head ) argument
987 Ip6AcceptFrame( IN NET_BUF *Packet, IN EFI_STATUS IoStatus, IN UINT32 Flag, IN VOID *Context ) argument
1481 NET_BUF *Packet; local
1570 Ip6InterfaceEnquePacket( IN IP6_SERVICE *IpSb, IN EFI_IP6_HEADER *Head, IN NET_BUF *Packet, IN IP6_INTERFACE *IpIf ) argument
1760 NET_BUF *Packet; local
[all...]
H A DIp6Icmp.c125 @param[in] Packet The content of the ICMPv6 message with the IP head
137 IN NET_BUF *Packet
150 Data = NetbufDuplicate (Packet, NULL, IP6_MAX_HEADLEN);
177 ReplyHead.PayloadLength = HTONS ((UINT16) (Packet->TotalSize));
202 NetbufFree (Packet);
207 Process Packet Too Big message sent by a router in response to a packet that
210 if Packet Too Big message is still received, do not reduce the packet size, but
215 @param[in] Packet The content of the ICMPv6 error with the IP head
228 IN NET_BUF *Packet
236 NetbufCopy (Packet,
570 Ip6SendIcmpError( IN IP6_SERVICE *IpSb, IN NET_BUF *Packet, IN EFI_IPv6_ADDRESS *SourceAddress OPTIONAL, IN EFI_IPv6_ADDRESS *DestinationAddress, IN UINT8 Type, IN UINT8 Code, IN UINT32 *Pointer OPTIONAL ) argument
[all...]
H A DIp6Icmp.h41 @param[in] Packet The content of the ICMPv6 packet with IP head
53 IN NET_BUF *Packet
78 @param[in] Packet The packet which invoking ICMPv6 error.
99 IN NET_BUF *Packet,
H A DIp6Output.c335 @param[in] Packet The packet that transmitted.
344 NET_BUF *Packet,
350 NetbufFree (Packet);
351 Packet = NULL;
356 to the Packet. Used for IP6 fragmentation.
359 @param[in] Packet The packet to prefix the IP6 header to.
368 Packet.
375 IN NET_BUF *Packet,
395 PacketHead = (EFI_IP6_HEADER *) NetbufAllocSpace (Packet, HeadLen, NET_BUF_HEAD);
404 PacketHead->PayloadLength = HTONS ((UINT16) (Packet
343 Ip6SysPacketSent( NET_BUF *Packet, EFI_STATUS IoStatus, UINT32 LinkFlag, VOID *Context ) argument
373 Ip6PrependHead( IN IP6_SERVICE *IpSb, IN NET_BUF *Packet, IN EFI_IP6_HEADER *Head, IN UINT16 FragmentOffset, IN UINT8 *ExtHdrs, IN UINT32 ExtHdrsLen, IN UINT8 LastHeader, IN UINT32 HeadLen ) argument
480 Ip6Output( IN IP6_SERVICE *IpSb, IN IP6_INTERFACE *Interface OPTIONAL, IN IP6_PROTOCOL *IpInstance OPTIONAL, IN NET_BUF *Packet, IN EFI_IP6_HEADER *Head, IN UINT8 *ExtHdrs, IN UINT32 ExtHdrsLen, IN IP6_FRAME_CALLBACK Callback, IN VOID *Context ) argument
1081 Ip6CancelPacket( IN IP6_INTERFACE *IpIf, IN NET_BUF *Packet, IN EFI_STATUS IoStatus ) argument
[all...]
H A DIp6Input.h35 #define IP6_GET_CLIP_INFO(Packet) ((IP6_CLIP_INFO *) ((Packet)->ProtoData))
89 NET_BUF *Packet; // The first fragment of the packet member in struct:__anon12499
105 @param[in] Packet The IP6 packet received.
114 IN NET_BUF *Packet,
210 @param[in] Packet The data of the received packet.
221 IN NET_BUF *Packet
H A DIp6Option.c24 @param[in] Packet The to be validated packet.
38 IN NET_BUF *Packet,
86 Packet,
88 &Packet->Ip.Ip6->SourceAddress,
95 if (!IP6_IS_MULTICAST (&Packet->Ip.Ip6->DestinationAddress)) {
99 Packet,
101 &Packet->Ip.Ip6->SourceAddress,
237 @param[in] Packet The data of the packet. Ignored if NULL.
262 IN NET_BUF *Packet OPTIONAL,
331 if ((IpSb != NULL) && (Packet !
36 Ip6IsOptionValid( IN IP6_SERVICE *IpSb, IN NET_BUF *Packet, IN UINT8 *Option, IN UINT8 OptionLen, IN UINT32 Pointer ) argument
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Dhcp6Dxe/
H A DDhcp6Io.c23 @param[in] Packet The pointer to the Dhcp6 packet to retry.
37 IN EFI_DHCP6_PACKET *Packet,
45 ASSERT (Packet != NULL);
57 TxCb->TxPacket = Packet;
58 TxCb->Xid = Packet->Dhcp6.Header.TransactionId;
68 switch (Packet->Dhcp6.Header.MessageType) {
448 @param[in, out] Packet The pointer to the packet sending or received.
460 IN OUT EFI_DHCP6_PACKET **Packet
468 ASSERT (Packet != NULL);
487 *Packet,
35 Dhcp6EnqueueRetry( IN DHCP6_INSTANCE *Instance, IN EFI_DHCP6_PACKET *Packet, IN UINT16 *Elapsed, IN EFI_DHCP6_RETRANSMISSION *RetryCtl OPTIONAL ) argument
664 Dhcp6SeekStsOption( IN DHCP6_INSTANCE *Instance, IN EFI_DHCP6_PACKET *Packet, OUT UINT8 **Option ) argument
796 Dhcp6TransmitPacket( IN DHCP6_INSTANCE *Instance, IN EFI_DHCP6_PACKET *Packet, IN UINT16 *Elapsed ) argument
891 EFI_DHCP6_PACKET *Packet; local
1049 EFI_DHCP6_PACKET *Packet; local
1208 EFI_DHCP6_PACKET *Packet; local
1342 EFI_DHCP6_PACKET *Packet; local
1476 EFI_DHCP6_PACKET *Packet; local
1660 EFI_DHCP6_PACKET *Packet; local
1788 EFI_DHCP6_PACKET *Packet; local
2629 EFI_DHCP6_PACKET *Packet; local
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Ip4Dxe/
H A DIp4Icmp.c86 @param[in] Packet The content of the ICMP redirect packet with IP
99 IN NET_BUF *Packet,
124 NetbufFree (Packet);
151 NetbufFree (Packet);
163 @param[in] Packet The content of the ICMP error with IP head
175 IN NET_BUF *Packet
180 if (Packet->TotalSize < sizeof (Icmp)) {
181 NetbufFree (Packet);
185 NetbufCopy (Packet, 0, sizeof (Icmp), (UINT8 *) &Icmp);
192 return Ip4ProcessIcmpRedirect (IpSb, Head, Packet,
96 Ip4ProcessIcmpRedirect( IN IP4_SERVICE *IpSb, IN IP4_HEAD *Head, IN NET_BUF *Packet, IN IP4_ICMP_ERROR_HEAD *Icmp ) argument
[all...]
H A DIp4Input.c144 @param Packet Packet to trim
151 IN OUT NET_BUF *Packet,
159 Info = IP4_GET_CLIP_INFO (Packet);
167 NetbufTrim (Packet, (UINT32) Len, NET_BUF_HEAD);
175 NetbufTrim (Packet, (UINT32) Len, NET_BUF_TAIL);
207 if the Packet is from a new chain of fragments.
208 @param Packet The fragment to assemble. It might be freed if the fragment
218 IN OUT NET_BUF *Packet
232 IpHead = Packet
150 Ip4TrimPacket( IN OUT NET_BUF *Packet, IN INTN Start, IN INTN End ) argument
508 NET_BUF *Packet; local
702 Ip4PreProcessPacket( IN IP4_SERVICE *IpSb, IN OUT NET_BUF **Packet, IN IP4_HEAD *Head, IN UINT8 *Option, IN UINT32 OptionLen, IN UINT32 Flag ) argument
830 Ip4AccpetFrame( IN IP4_PROTOCOL *Ip4Instance, IN NET_BUF *Packet, IN EFI_STATUS IoStatus, IN UINT32 Flag, IN VOID *Context ) argument
1244 NET_BUF *Packet; local
1336 Ip4InterfaceEnquePacket( IN IP4_SERVICE *IpSb, IN IP4_HEAD *Head, IN NET_BUF *Packet, IN IP4_INTERFACE *IpIf ) argument
1524 NET_BUF *Packet; local
[all...]
H A DIp4Output.h23 @param Packet The packet that transmitted.
33 NET_BUF *Packet,
48 @param[in] Packet The user data to send, excluding the IP header.
74 IN NET_BUF *Packet,
84 Cancel the Packet and all its fragments.
86 @param IpIf The interface from which the Packet is sent
87 @param Packet The Packet to cancel
94 IN NET_BUF *Packet,
99 Prepend an IP4 head to the Packet
[all...]
H A DIp4Output.c21 Prepend an IP4 head to the Packet. It will copy the options and
24 @param Packet The packet to prepend IP4 header to
34 Packet.
40 IN OUT NET_BUF *Packet,
62 PacketHead = (IP4_HEAD *) NetbufAllocSpace (Packet, HeadLen, NET_BUF_HEAD);
76 PacketHead->TotalLen = HTONS ((UINT16) Packet->TotalSize);
86 Packet->Ip.Ip4 = PacketHead;
159 @param Packet The packet that transmitted.
169 NET_BUF *Packet,
175 NetbufFree (Packet);
39 Ip4PrependHead( IN OUT NET_BUF *Packet, IN IP4_HEAD *Head, IN UINT8 *Option, IN UINT32 OptLen ) argument
167 Ip4SysPacketSent( IP4_PROTOCOL *Ip4Instance, NET_BUF *Packet, EFI_STATUS IoStatus, UINT32 LinkFlag, VOID *Context ) argument
211 Ip4Output( IN IP4_SERVICE *IpSb, IN IP4_PROTOCOL *IpInstance OPTIONAL, IN NET_BUF *Packet, IN IP4_HEAD *Head, IN UINT8 *Option, IN UINT32 OptLen, IN IP4_ADDR GateWay, IN IP4_FRAME_CALLBACK Callback, IN VOID *Context ) argument
460 Ip4CancelPacket( IN IP4_INTERFACE *IpIf, IN NET_BUF *Packet, IN EFI_STATUS IoStatus ) argument
[all...]
H A DIp4Input.h81 #define IP4_GET_CLIP_INFO(Packet) ((IP4_CLIP_INFO *) ((Packet)->ProtoData))
119 @param[in] Packet The IP4 packet received.
129 IN NET_BUF *Packet,
146 @param[in] Packet The data of the received packet
157 IN NET_BUF *Packet
166 @param[in] Packet The data of the received packet
176 IN NET_BUF *Packet,
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Bus/Ata/AtaBusDxe/
H A DAtaPassThruExecute.c105 @param[in, out] TaskPacket Pointer to a Pass Thru Command Packet. Optional,
108 and pass down this Packet.
127 EFI_ATA_PASS_THRU_COMMAND_PACKET *Packet; local
134 Packet = TaskPacket;
135 Packet->Asb = AllocateAlignedBuffer (AtaDevice, sizeof (EFI_ATA_STATUS_BLOCK));
136 CopyMem (Packet->Asb, AtaDevice->Asb, sizeof (EFI_ATA_STATUS_BLOCK));
137 Packet->Acb = AllocateCopyPool (sizeof (EFI_ATA_COMMAND_BLOCK), &AtaDevice->Acb);
139 Packet = &AtaDevice->Packet;
140 Packet
395 EFI_ATA_PASS_THRU_COMMAND_PACKET *Packet; local
470 EFI_ATA_PASS_THRU_COMMAND_PACKET *Packet; local
897 EFI_ATA_PASS_THRU_COMMAND_PACKET *Packet; local
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/
H A DIpSecDebug.c189 Print the IKE Packet.
191 @param[in] Packet Point to IKE packet to be printed.
198 IN IKE_PACKET *Packet,
208 ASSERT (Packet != NULL);
210 PacketSize = Packet->PayloadTotalSize + sizeof (IKE_HEADER);
211 InitCookie = (Direction == EfiIPsecOutBound) ? HTONLL (Packet->Header->InitiatorCookie) : Packet->Header->InitiatorCookie;
212 RespCookie = (Direction == EfiIPsecOutBound) ? HTONLL (Packet->Header->ResponderCookie) : Packet->Header->ResponderCookie;
214 switch (Packet
197 IpSecDumpPacket( IN IKE_PACKET *Packet, IN EFI_IPSEC_TRAFFIC_DIR Direction, IN UINT8 IpVersion ) argument
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Bus/Usb/UsbBotPei/
H A DPeiAtapi.c23 Sends out ATAPI Inquiry Packet Command to the specified device. This command will
39 ATAPI_PACKET_COMMAND Packet; local
46 ZeroMem (&Packet, sizeof (ATAPI_PACKET_COMMAND));
49 Packet.Inquiry.opcode = ATA_CMD_INQUIRY;
50 Packet.Inquiry.page_code = 0;
51 Packet.Inquiry.allocation_length = 36;
61 &Packet,
85 Sends out ATAPI Test Unit Ready Packet Command to the specified device
101 ATAPI_PACKET_COMMAND Packet; local
107 ZeroMem (&Packet, sizeo
152 ATAPI_PACKET_COMMAND Packet; local
245 ATAPI_PACKET_COMMAND Packet; local
297 ATAPI_PACKET_COMMAND Packet; local
367 ATAPI_PACKET_COMMAND Packet; local
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Mtftp6Dxe/
H A DMtftp6Wrq.c37 EFI_MTFTP6_PACKET *Packet; local
54 Packet = (EFI_MTFTP6_PACKET *) NetbufAllocSpace (
59 ASSERT (Packet != NULL);
61 Packet->Data.OpCode = HTONS (EFI_MTFTP6_OPCODE_DATA);
62 Packet->Data.Block = HTONS (BlockNum);
81 CopyMem (Packet->Data.Data, (UINT8 *) Token->Buffer + Start, DataLen);
114 CopyMem (Packet->Data.Data, DataBuf, DataLen);
134 @param[in] Packet The pointer to the received packet.
148 IN EFI_MTFTP6_PACKET *Packet,
159 AckNum = NTOHS (Packet
146 Mtftp6WrqHandleAck( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument
282 Mtftp6WrqHandleOack( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument
391 EFI_MTFTP6_PACKET *Packet; local
[all...]
H A DMtftp6Rrq.c37 NET_BUF *Packet; local
42 Packet = NetbufAlloc (sizeof (EFI_MTFTP6_ACK_HEADER));
44 if (Packet == NULL) {
49 Packet,
63 return Mtftp6TransmitPacket (Instance, Packet);
72 @param[in] Packet The pointer to the received packet.
86 IN EFI_MTFTP6_PACKET *Packet,
101 Block = NTOHS (Packet->Data.Block);
132 Status = Token->CheckPacket (&Instance->Mtftp6, Token, (UINT16) Len, Packet);
158 CopyMem ((UINT8 *) Token->Buffer + Start, Packet
84 Mtftp6RrqSaveBlock( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket ) argument
213 Mtftp6RrqHandleData( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument
443 Mtftp6RrqHandleOack( IN MTFTP6_INSTANCE *Instance, IN EFI_MTFTP6_PACKET *Packet, IN UINT32 Len, OUT NET_BUF **UdpPacket, OUT BOOLEAN *IsCompleted ) argument
646 EFI_MTFTP6_PACKET *Packet; local
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Mtftp4Dxe/
H A DMtftp4Wrq.c37 EFI_MTFTP4_PACKET *Packet; local
54 Packet = (EFI_MTFTP4_PACKET *) NetbufAllocSpace (UdpPacket, MTFTP4_DATA_HEAD_LEN, FALSE);
55 ASSERT (Packet != NULL);
57 Packet->Data.OpCode = HTONS (EFI_MTFTP4_OPCODE_DATA);
58 Packet->Data.Block = HTONS (BlockNum);
77 CopyMem (Packet->Data.Data, (UINT8 *) Token->Buffer + Start, DataLen);
113 CopyMem (Packet->Data.Data, DataBuf, DataLen);
129 @param Packet The MTFTP packet received
141 IN EFI_MTFTP4_PACKET *Packet,
151 AckNum = NTOHS (Packet
139 Mtftp4WrqHandleAck( IN MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, OUT BOOLEAN *Completed ) argument
258 Mtftp4WrqHandleOack( IN OUT MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, OUT BOOLEAN *Completed ) argument
348 EFI_MTFTP4_PACKET *Packet; local
[all...]
H A DMtftp4Rrq.c100 NET_BUF *Packet; local
102 Packet = NetbufAlloc (sizeof (EFI_MTFTP4_ACK_HEADER));
103 if (Packet == NULL) {
108 Packet,
117 return Mtftp4SendPacket (Instance, Packet);
126 @param Packet The received data packet
139 IN EFI_MTFTP4_PACKET *Packet,
153 Block = NTOHS (Packet->Data.Block);
181 Status = Token->CheckPacket (&Instance->Mtftp4, Token, (UINT16) Len, Packet);
198 CopyMem ((UINT8 *) Token->Buffer + Start, Packet
137 Mtftp4RrqSaveBlock( IN OUT MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len ) argument
246 Mtftp4RrqHandleData( IN MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, IN BOOLEAN Multicast, OUT BOOLEAN *Completed ) argument
478 Mtftp4RrqHandleOack( IN OUT MTFTP4_PROTOCOL *Instance, IN EFI_MTFTP4_PACKET *Packet, IN UINT32 Len, IN BOOLEAN Multicast, OUT BOOLEAN *Completed ) argument
626 EFI_MTFTP4_PACKET *Packet; local
[all...]
H A DMtftp4Support.c278 EFI_MTFTP4_PACKET *Packet; local
317 Packet = (EFI_MTFTP4_PACKET *) NetbufAllocSpace (Nbuf, Len, FALSE);
318 ASSERT (Packet != NULL);
320 Packet->OpCode = HTONS (Instance->Operation);
321 Cur = Packet->Rrq.Filename;
358 NET_BUF *Packet; local
363 Packet = NetbufAlloc (Len);
364 if (Packet == NULL) {
368 TftpError = (EFI_MTFTP4_PACKET *) NetbufAllocSpace (Packet, Len, FALSE);
376 return Mtftp4SendPacket (Instance, Packet);
393 Mtftp4OnPacketSent( IN NET_BUF *Packet, IN UDP_END_POINT *EndPoint, IN EFI_STATUS IoStatus, IN VOID *Context ) argument
[all...]
H A DMtftp4Option.h41 Allocate and fill in a array of Mtftp options from the Packet.
46 @param Packet The packet to parse
59 IN EFI_MTFTP4_PACKET *Packet,
93 @param Packet The OACK packet to parse
104 IN EFI_MTFTP4_PACKET *Packet,
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Dhcp4Dxe/
H A DDhcp4Io.c75 @param[in] Packet The current packet trigger the event
87 IN EFI_DHCP4_PACKET *Packet, OPTIONAL
120 Packet,
611 @param[in] Packet The DHCP packet received
622 IN EFI_DHCP4_PACKET *Packet,
648 Status = DhcpCallUser (DhcpSb, Dhcp4RcvdOffer, Packet, NULL);
655 DhcpSb->LastOffer = Packet;
664 DhcpSb->LastOffer = Packet;
677 FreePool (Packet);
686 @param[in] Packet Th
84 DhcpCallUser( IN DHCP_SERVICE *DhcpSb, IN EFI_DHCP4_EVENT Event, IN EFI_DHCP4_PACKET *Packet, OPTIONAL OUT EFI_DHCP4_PACKET **NewPacket OPTIONAL ) argument
620 DhcpHandleSelect( IN DHCP_SERVICE *DhcpSb, IN EFI_DHCP4_PACKET *Packet, IN DHCP_PARAMETER *Para ) argument
695 DhcpHandleRequest( IN DHCP_SERVICE *DhcpSb, IN EFI_DHCP4_PACKET *Packet, IN DHCP_PARAMETER *Para ) argument
788 DhcpHandleRenewRebind( IN DHCP_SERVICE *DhcpSb, IN EFI_DHCP4_PACKET *Packet, IN DHCP_PARAMETER *Para ) argument
872 DhcpHandleReboot( IN DHCP_SERVICE *DhcpSb, IN EFI_DHCP4_PACKET *Packet, IN DHCP_PARAMETER *Para ) argument
966 EFI_DHCP4_PACKET *Packet; local
1130 DhcpOnPacketSent( NET_BUF *Packet, UDP_END_POINT *EndPoint, EFI_STATUS IoStatus, VOID *Context ) argument
1171 EFI_DHCP4_PACKET *Packet; local
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Bus/Ata/AtaAtapiPassThru/
H A DAtaAtapiPassThru.c148 @param[in, out] Packet A pointer to the ATA command to send to the ATA device specified by Port
180 IN OUT EFI_ATA_PASS_THRU_COMMAND_PACKET *Packet,
189 Protocol = Packet->Protocol;
208 Packet->Acb,
209 Packet->Asb,
210 Packet->Timeout,
218 Packet->InDataBuffer,
219 Packet->InTransferLength,
221 Packet->Acb,
222 Packet
177 AtaPassThruPassThruExecute( IN UINT16 Port, IN UINT16 PortMultiplierPort, IN OUT EFI_ATA_PASS_THRU_COMMAND_PACKET *Packet, IN ATA_ATAPI_PASS_THRU_INSTANCE *Instance, IN ATA_NONBLOCK_TASK *Task OPTIONAL ) argument
1233 AtaPassThruPassThru( IN EFI_ATA_PASS_THRU_PROTOCOL *This, IN UINT16 Port, IN UINT16 PortMultiplierPort, IN OUT EFI_ATA_PASS_THRU_COMMAND_PACKET *Packet, IN EFI_EVENT Event OPTIONAL ) argument
1848 ExtScsiPassThruPassThru( IN EFI_EXT_SCSI_PASS_THRU_PROTOCOL *This, IN UINT8 *Target, IN UINT64 Lun, IN OUT EFI_EXT_SCSI_PASS_THRU_SCSI_REQUEST_PACKET *Packet, IN EFI_EVENT Event OPTIONAL ) argument
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/TcpDxe/
H A DTcpMain.c356 NULL == Token->Packet.TxData ||
357 0 == Token->Packet.TxData->FragmentCount ||
358 0 == Token->Packet.TxData->DataLength
364 Token->Packet.TxData->DataLength,
365 Token->Packet.TxData->FragmentCount,
366 Token->Packet.TxData->FragmentTable
421 NULL == Token->Packet.RxData ||
422 0 == Token->Packet.RxData->FragmentCount ||
423 0 == Token->Packet.RxData->DataLength
429 Token->Packet
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Udp4Dxe/
H A DUdp4Impl.c82 @param[in] Packet Pointer to the NET_BUF containing the received udp
93 IN NET_BUF *Packet,
154 This function wraps the Packet and the RxData.
157 @param[in] Packet Pointer to the buffer containing the received
162 @return Pointer to the structure wrapping the RxData and the Packet.
168 IN NET_BUF *Packet,
176 @param[in] Packet Pointer to the buffer containing the received
187 IN NET_BUF *Packet,
208 @param[in] Packet Pointer to the buffer containing the received udp
216 IN NET_BUF *Packet
933 Udp4Checksum( IN NET_BUF *Packet, IN UINT16 HeadSum ) argument
1036 Udp4DgramRcvd( IN EFI_STATUS Status, IN UINT8 IcmpError, IN EFI_NET_SESSION_DATA *NetSession, IN NET_BUF *Packet, IN VOID *Context ) argument
1143 NET_BUF *Packet; local
1391 Udp4WrapRxData( IN UDP4_INSTANCE_DATA *Instance, IN NET_BUF *Packet, IN EFI_UDP4_RECEIVE_DATA *RxData ) argument
1448 Udp4EnqueueDgram( IN UDP4_SERVICE_DATA *Udp4Service, IN NET_BUF *Packet, IN EFI_UDP4_RECEIVE_DATA *RxData ) argument
1694 NET_BUF *Packet; local
[all...]

Completed in 93 milliseconds

1234567