/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/ |
H A D | IpSecMain.c | 35 @param[in, out] FragmentTable Pointer to a list of fragments. 55 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 75 FragmentTable == NULL || 81 IpPayload = (*FragmentTable)[0].FragmentBuffer; 97 FragmentTable, 186 FragmentTable, 47 IpSecProcess( IN EFI_IPSEC2_PROTOCOL *This, IN EFI_HANDLE NicHandle, IN UINT8 IpVersion, IN OUT VOID *IpHead, IN OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, IN EFI_IPSEC_TRAFFIC_DIR TrafficDirection, OUT EFI_EVENT *RecycleSignal ) argument
|
H A D | IpSecImpl.c | 721 if (RecycleContext->FragmentTable != NULL) { 722 FreePool (RecycleContext->FragmentTable); 1191 @param[in, out] FragmentTable Pointer to a list of fragments to be protected by 1208 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 1263 (NET_FRAGMENT *)(*FragmentTable), 1364 @param[in, out] FragmentTable Pointer to a list of fragments in the form of IPsec 1386 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 1424 (NET_FRAGMENT *) *FragmentTable, 1583 *FragmentTable = AllocateZeroPool (sizeof (EFI_IPSEC_FRAGMENT_DATA)); 1584 if (*FragmentTable 1201 IpSecTunnelOutboundPacket( IN OUT UINT8 *IpHead, IN UINT8 IpVersion, IN IPSEC_SAD_DATA *SadData, IN OUT UINT8 *LastHead, IN VOID **OptionsBuffer, IN UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN UINT32 *FragmentCount ) argument 1380 IpSecEspInboundPacket( IN UINT8 IpVersion, IN OUT VOID *IpHead, OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, OUT EFI_IPSEC_SPD_SELECTOR **SpdSelector, OUT EFI_EVENT *RecycleEvent ) argument 1690 IpSecEspOutboundPacket( IN UINT8 IpVersion, IN OUT VOID *IpHead, IN OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, IN IPSEC_SAD_ENTRY *SadEntry, OUT EFI_EVENT *RecycleEvent ) argument 2089 IpSecProtectInboundPacket( IN UINT8 IpVersion, IN OUT VOID *IpHead, IN OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, OUT EFI_IPSEC_SPD_SELECTOR **SpdEntry, OUT EFI_EVENT *RecycleEvent ) argument 2148 IpSecProtectOutboundPacket( IN UINT8 IpVersion, IN OUT VOID *IpHead, IN OUT UINT8 *LastHead, IN OUT VOID **OptionsBuffer, IN OUT UINT32 *OptionsLength, IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, IN OUT UINT32 *FragmentCount, IN IPSEC_SAD_ENTRY *SadEntry, OUT EFI_EVENT *RecycleEvent ) argument [all...] |
H A D | IpSecImpl.h | 120 EFI_IPSEC_FRAGMENT_DATA *FragmentTable; member in struct:_IPSEC_RECYCLE_CONTEXT 154 returns without an IPsec protected IP Header and FragmentTable. 163 @param[in, out] FragmentTable Pointer to a list of fragments in form of IPsec 181 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 201 @param[in, out] FragmentTable Pointer to a list of fragments to be protected by 219 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 356 @param[in, out] FragmentTable Pointer to a list of fragments. 376 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable,
|
/vbox/src/VBox/Devices/EFI/Firmware/MdePkg/Include/Protocol/ |
H A D | IpSec.h | 69 @param[in, out] FragmentTable Pointer to a list of fragments. 89 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable, 156 @param[in, out] FragmentTable Pointer to a list of fragments. On input, 188 If FragmentTable is NULL; 202 IN OUT EFI_IPSEC_FRAGMENT_DATA **FragmentTable,
|
H A D | Udp6.h | 205 EFI_UDP6_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12366 214 /// FragmentTable could contain multiple buffers that are not in the continuous memory locations. 215 /// The EFI UDPv6 Protocol client might need to combine two or more buffers in FragmentTable to 243 EFI_UDP6_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12367 429 - One or more of the Token.Packet.TxData.FragmentTable[].FragmentLength 431 - One or more of the Token.Packet.TxData.FragmentTable[].FragmentBuffer
|
H A D | Ip4.h | 216 EFI_IP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12167 236 EFI_IP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12169
|
H A D | Tcp4.h | 164 EFI_TCP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12332 172 EFI_TCP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12333 440 the sum of all FragmentBuffer length in FragmentTable.
|
H A D | Tcp6.h | 358 /// Fragmentbuffer in FragmentTable allocated by user. 370 EFI_TCP6_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12347 402 EFI_TCP6_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12348 695 will be copied into the FragmentTable, at the same time the full length of received data will 715 sum of all FragmentBuffer length in FragmentTable.
|
H A D | Udp4.h | 97 EFI_UDP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12357 106 EFI_UDP4_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12358
|
H A D | ManagedNetwork.h | 121 EFI_MANAGED_NETWORK_FRAGMENT_DATA FragmentTable[1]; member in struct:__anon12212
|
H A D | Ip6.h | 450 /// Sum of the lengths of IPv6 packet buffers in FragmentTable. May 461 EFI_IP6_FRAGMENT_DATA FragmentTable[1]; member in struct:_EFI_IP6_RECEIVE_DATA 505 /// Total length in bytes of the FragmentTable data to transmit. 515 EFI_IP6_FRAGMENT_DATA FragmentTable[1]; member in struct:_EFI_IP6_TRANSMIT_DATA 800 - One or more of the Token.Packet.TxData.FragmentTable[].FragmentLength fields is zero. 801 - One or more of the Token.Packet.TxData.FragmentTable[].FragmentBuffer fields is NULL.
|
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/MnpDxe/ |
H A D | MnpIo.c | 38 EFI_MANAGED_NETWORK_FRAGMENT_DATA *FragmentTable; local 64 FragmentTable = TxData->FragmentTable; 67 if ((FragmentTable[Index].FragmentLength == 0) || (FragmentTable[Index].FragmentBuffer == NULL)) { 75 TotalLength += FragmentTable[Index].FragmentLength; 78 if ((TxData->DestinationAddress == NULL) && (FragmentTable[0].FragmentLength < TxData->HeaderLength)) { 133 // Media header is in FragmentTable and there is only one fragment, 136 *PktBuf = TxData->FragmentTable[0].FragmentBuffer; 137 *PktLen = TxData->FragmentTable[ [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/UefiPxeBcDxe/ |
H A D | PxeBcSupport.c | 293 Type = *((UINT8 *) RxData->FragmentTable[0].FragmentBuffer); 314 CopiedLen += RxData->FragmentTable[Index].FragmentLength; 318 RxData->FragmentTable[Index].FragmentBuffer, 319 RxData->FragmentTable[Index].FragmentLength 324 RxData->FragmentTable[Index].FragmentBuffer, 429 Type = *((UINT8 *) RxData->FragmentTable[0].FragmentBuffer); 449 CopiedLen += RxData->FragmentTable[Index].FragmentLength; 453 RxData->FragmentTable[Index].FragmentBuffer, 454 RxData->FragmentTable[Index].FragmentLength 459 RxData->FragmentTable[Inde [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Tcp4Dxe/ |
H A D | Tcp4Main.c | 24 @param FragmentTable Pointer to the fragment table of the data 35 IN EFI_TCP4_FRAGMENT_DATA *FragmentTable 43 Len = Len + (UINT32) FragmentTable[Index].FragmentLength; 445 Token->Packet.TxData->FragmentTable 468 will be copy into the FragmentTable, in the same time the full length of received 527 Token->Packet.RxData->FragmentTable
|
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/IScsiDxe/ |
H A D | IScsiTcp4Io.c | 366 NetbufBuildExt (Packet, (NET_FRAGMENT *) &TxData->FragmentTable[0], &TxData->FragmentCount); 442 RxData.FragmentTable[0].FragmentLength = Fragment[CurrentFragment].Len; 443 RxData.FragmentTable[0].FragmentBuffer = Fragment[CurrentFragment].Bulk; 474 Fragment[CurrentFragment].Len -= RxData.FragmentTable[0].FragmentLength; 478 Fragment[CurrentFragment].Bulk += RxData.FragmentTable[0].FragmentLength;
|
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/TcpDxe/ |
H A D | TcpMain.c | 23 @param[in] FragmentTable Pointer to the fragment table of the data 34 IN EFI_TCP4_FRAGMENT_DATA *FragmentTable 42 Len = Len + FragmentTable[Index].FragmentLength; 366 Token->Packet.TxData->FragmentTable 431 Token->Packet.RxData->FragmentTable 863 (EFI_TCP4_FRAGMENT_DATA *) Token->Packet.TxData->FragmentTable 883 will be copied into the FragmentTable; at the same time the full length of received data will 903 sum of all FragmentBuffer length in FragmentTable. 943 (EFI_TCP4_FRAGMENT_DATA *) Token->Packet.RxData->FragmentTable
|
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Ip4Dxe/ |
H A D | Ip4Input.c | 503 NET_FRAGMENT *FragmentTable; local 518 FragmentTable = NULL; 550 FragmentTable = AllocateZeroPool (FragmentCount * sizeof (NET_FRAGMENT)); 552 if (FragmentTable == NULL) { 557 Status = NetbufBuildExt (Packet, FragmentTable, &FragmentCount); 560 // Record the original FragmentTable and count. 562 OriginalFragmentTable = FragmentTable; 566 FreePool (FragmentTable); 583 (EFI_IPSEC_FRAGMENT_DATA **) (&FragmentTable), 598 if (OriginalFragmentTable == FragmentTable [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Ip6Dxe/ |
H A D | Ip6Input.c | 514 NET_FRAGMENT *FragmentTable; local 531 FragmentTable = NULL; 576 FragmentTable = AllocateZeroPool (FragmentCount * sizeof (NET_FRAGMENT)); 578 if (FragmentTable == NULL) { 583 Status = NetbufBuildExt (Packet, FragmentTable, &FragmentCount); 584 OriginalFragmentTable = FragmentTable; 588 FreePool (FragmentTable); 605 (EFI_IPSEC_FRAGMENT_DATA **) (&FragmentTable), 620 if (OriginalFragmentCount == FragmentCount && OriginalFragmentTable == FragmentTable) { 624 FreePool (FragmentTable); [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/ShellPkg/Library/UefiShellNetwork1CommandsLib/ |
H A D | Ping.c | 351 FragData = Ip6TxData->FragmentTable[Index].FragmentBuffer; 364 FragData = Ip4TxData->FragmentTable[Index].FragmentBuffer; 464 Reply = ((EFI_IP6_RECEIVE_DATA*)Private->RxToken.Packet.RxData)->FragmentTable[0].FragmentBuffer; 478 Reply = ((EFI_IP4_RECEIVE_DATA*)Private->RxToken.Packet.RxData)->FragmentTable[0].FragmentBuffer; 613 ((EFI_IP6_TRANSMIT_DATA*)TxData)->FragmentTable[0].FragmentBuffer = (VOID *) Request; 614 ((EFI_IP6_TRANSMIT_DATA*)TxData)->FragmentTable[0].FragmentLength = Private->BufferSize; 621 ((EFI_IP4_TRANSMIT_DATA*)TxData)->FragmentTable[0].FragmentBuffer = (VOID *) Request; 622 ((EFI_IP4_TRANSMIT_DATA*)TxData)->FragmentTable[0].FragmentLength = Private->BufferSize;
|
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/UefiPxeBcDxe/ |
H A D | PxeBcImpl.c | 200 CopiedLen += RxData->FragmentTable[Index].FragmentLength; 204 RxData->FragmentTable[Index].FragmentBuffer, 205 RxData->FragmentTable[Index].FragmentLength 210 RxData->FragmentTable[Index].FragmentBuffer, 1454 Udp4TxData->FragmentTable[FragCount - 1].FragmentLength = (UINT32) *BufferSize; 1455 Udp4TxData->FragmentTable[FragCount - 1].FragmentBuffer = BufferPtr; 1460 Udp4TxData->FragmentTable[0].FragmentLength = (UINT32) *HeaderSize; 1461 Udp4TxData->FragmentTable[0].FragmentBuffer = HeaderPtr; 1814 FragmentLength = RxData->FragmentTable[FragmentIndex].FragmentLength; 1815 FragmentBuffer = RxData->FragmentTable[FragmentInde [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Library/DxeTcpIoLib/ |
H A D | DxeTcpIoLib.c | 797 (NET_FRAGMENT *) &((EFI_TCP4_TRANSMIT_DATA *) Data)->FragmentTable[0], 946 RxData->FragmentTable[0].FragmentLength = Fragment[CurrentFragment].Len; 947 RxData->FragmentTable[0].FragmentBuffer = Fragment[CurrentFragment].Bulk; 992 Fragment[CurrentFragment].Len -= RxData->FragmentTable[0].FragmentLength; 996 Fragment[CurrentFragment].Bulk += RxData->FragmentTable[0].FragmentLength;
|
/vbox/src/VBox/Devices/EFI/Firmware/StdLib/EfiSocketLib/ |
H A D | Udp4.c | 353 (EFI_IP4_FRAGMENT_DATA *)&pRxData->FragmentTable[0], 832 pTxData->TxData.FragmentTable[0].FragmentLength = (UINT32) BufferLength; 833 pTxData->TxData.FragmentTable[0].FragmentBuffer = &pPacket->Op.Udp4Tx.Buffer[0];
|
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Library/DxeUdpIoLib/ |
H A D | DxeUdpIoLib.c | 220 (NET_FRAGMENT *)((EFI_UDP4_RECEIVE_DATA *) RxData)->FragmentTable, 257 (NET_FRAGMENT *)((EFI_UDP6_RECEIVE_DATA *) RxData)->FragmentTable, 473 (NET_FRAGMENT *)((EFI_UDP4_TRANSMIT_DATA *) Data)->FragmentTable, 529 (NET_FRAGMENT *)((EFI_UDP6_TRANSMIT_DATA *) Data)->FragmentTable,
|
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/Network/Udp4Dxe/ |
H A D | Udp4Impl.c | 768 Token.Packet.TxData.FragmentTable[]. 770 Token.Packet.TxData.FragmentTable[]. 808 if ((TxData->FragmentTable[Index].FragmentBuffer == NULL) || 809 (TxData->FragmentTable[Index].FragmentLength == 0)) { 816 TotalLen += TxData->FragmentTable[Index].FragmentLength; 1533 // Build the FragmentTable and set the FragmentCount in RxData. 1540 (NET_FRAGMENT *) RxData->FragmentTable,
|
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Application/Ping6/ |
H A D | Ping6.c | 158 FragData = TxData->FragmentTable[Index].FragmentBuffer; 255 Reply = RxData->FragmentTable[0].FragmentBuffer; 389 TxData->FragmentTable[0].FragmentBuffer = (VOID *) Request; 390 TxData->FragmentTable[0].FragmentLength = Private->BufferSize;
|