VirtualBox

Ignore:
Timestamp:
Apr 14, 2023 3:17:44 PM (23 months ago)
Author:
vboxsync
svn:sync-xref-src-repo-rev:
156854
Message:

Devices/EFI/FirmwareNew: Update to edk2-stable202302 and make it build, bugref:4643

Location:
trunk/src/VBox/Devices/EFI/FirmwareNew
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/Devices/EFI/FirmwareNew

  • trunk/src/VBox/Devices/EFI/FirmwareNew/MdePkg/Include/Protocol/Tcp6.h

    r80721 r99404  
    2929  }
    3030
    31 
    3231typedef struct _EFI_TCP6_PROTOCOL EFI_TCP6_PROTOCOL;
    3332
     
    4140  /// address/port pair.
    4241  ///
    43   EFI_HANDLE        InstanceHandle;
     42  EFI_HANDLE          InstanceHandle;
    4443  ///
    4544  /// The local IPv6 address to which this TCP instance is bound. Set
     
    4746  /// available source addresses.
    4847  ///
    49   EFI_IPv6_ADDRESS  LocalAddress;
     48  EFI_IPv6_ADDRESS    LocalAddress;
    5049  ///
    5150  /// The local port number in host byte order.
    5251  ///
    53   UINT16            LocalPort;
     52  UINT16              LocalPort;
    5453  ///
    5554  /// The remote IPv6 address. It may be 0::/128 if this TCP instance is
    5655  /// not connected to any remote host.
    5756  ///
    58   EFI_IPv6_ADDRESS  RemoteAddress;
     57  EFI_IPv6_ADDRESS    RemoteAddress;
    5958  ///
    6059  /// The remote port number in host byte order. It may be zero if this
    6160  /// TCP instance is not connected to any remote host.
    6261  ///
    63   UINT16            RemotePort;
     62  UINT16              RemotePort;
    6463} EFI_TCP6_SERVICE_POINT;
    6564
     
    6968///
    7069typedef struct {
    71   EFI_HANDLE             DriverHandle; ///< The handle of the driver that creates this entry.
    72   UINT32                 ServiceCount; ///< The number of address/port pairs following this data structure.
    73   EFI_TCP6_SERVICE_POINT Services[1];  ///< List of address/port pairs that are currently in use.
     70  EFI_HANDLE                DriverHandle; ///< The handle of the driver that creates this entry.
     71  UINT32                    ServiceCount; ///< The number of address/port pairs following this data structure.
     72  EFI_TCP6_SERVICE_POINT    Services[1];  ///< List of address/port pairs that are currently in use.
    7473} EFI_TCP6_VARIABLE_DATA;
    7574
     
    8685  /// IPv6 driver.
    8786  ///
    88   EFI_IPv6_ADDRESS  StationAddress;
     87  EFI_IPv6_ADDRESS    StationAddress;
    8988  ///
    9089  /// The local port number to which this EFI TCPv6 Protocol instance
     
    9291  /// StationPort to zero to use an ephemeral port.
    9392  ///
    94   UINT16            StationPort;
     93  UINT16              StationPort;
    9594  ///
    9695  /// The remote IP address to which this EFI TCPv6 Protocol instance
     
    104103  /// from any address will be accepted.
    105104  ///
    106   EFI_IPv6_ADDRESS  RemoteAddress;
     105  EFI_IPv6_ADDRESS    RemoteAddress;
    107106  ///
    108107  /// The remote port to which this EFI TCPv6 Protocol instance
     
    113112  /// ActiveFlag is TRUE.
    114113  ///
    115   UINT16            RemotePort;
     114  UINT16     RemotePort;
    116115  ///
    117116  /// Set it to TRUE to initiate an active open. Set it to FALSE to
    118117  /// initiate a passive open to act as a server.
    119118  ///
    120   BOOLEAN           ActiveFlag;
     119  BOOLEAN    ActiveFlag;
    121120} EFI_TCP6_ACCESS_POINT;
    122121
     
    128127  /// The size of the TCP receive buffer.
    129128  ///
    130   UINT32   ReceiveBufferSize;
     129  UINT32    ReceiveBufferSize;
    131130  ///
    132131  /// The size of the TCP send buffer.
    133132  ///
    134   UINT32   SendBufferSize;
     133  UINT32    SendBufferSize;
    135134  ///
    136135  /// The length of incoming connect request queue for a passive
    137136  /// instance. When set to zero, the value is implementation specific.
    138137  ///
    139   UINT32   MaxSynBackLog;
     138  UINT32    MaxSynBackLog;
    140139  ///
    141140  /// The maximum seconds a TCP instance will wait for before a TCP
     
    143142  /// implementation specific.
    144143  ///
    145   UINT32   ConnectionTimeout;
    146   ///
    147   ///The number of times TCP will attempt to retransmit a packet on
    148   ///an established connection. When set to zero, the value is
    149   ///implementation specific.
    150   ///
    151   UINT32   DataRetries;
     144  UINT32    ConnectionTimeout;
     145  ///
     146  /// The number of times TCP will attempt to retransmit a packet on
     147  /// an established connection. When set to zero, the value is
     148  /// implementation specific.
     149  ///
     150  UINT32    DataRetries;
    152151  ///
    153152  /// How many seconds to wait in the FIN_WAIT_2 states for a final
     
    159158  /// against the standard. The default value is 60.
    160159  ///
    161   UINT32   FinTimeout;
     160  UINT32     FinTimeout;
    162161  ///
    163162  /// How many seconds to wait in TIME_WAIT state before the TCP
     
    166165  /// is against the related RFC documents.
    167166  ///
    168   UINT32   TimeWaitTimeout;
     167  UINT32     TimeWaitTimeout;
    169168  ///
    170169  /// The maximum number of TCP keep-alive probes to send before
     
    172171  /// other end. Set to zero to disable keep-alive probe.
    173172  ///
    174   UINT32   KeepAliveProbes;
     173  UINT32     KeepAliveProbes;
    175174  ///
    176175  /// The number of seconds a connection needs to be idle before TCP
     
    179178  /// alive probe is disabled.
    180179  ///
    181   UINT32   KeepAliveTime;
     180  UINT32     KeepAliveTime;
    182181  ///
    183182  /// The number of seconds between TCP keep-alive probes after the
     
    186185  /// alive probe is disabled.
    187186  ///
    188   UINT32   KeepAliveInterval;
     187  UINT32     KeepAliveInterval;
    189188  ///
    190189  /// Set it to TRUE to enable the Nagle algorithm as defined in
    191190  /// RFC896. Set it to FALSE to disable it.
    192191  ///
    193   BOOLEAN  EnableNagle;
     192  BOOLEAN    EnableNagle;
    194193  ///
    195194  /// Set it to TRUE to enable TCP timestamps option as defined in
    196195  /// RFC1323. Set to FALSE to disable it.
    197196  ///
    198   BOOLEAN  EnableTimeStamp;
     197  BOOLEAN    EnableTimeStamp;
    199198  ///
    200199  /// Set it to TRUE to enable TCP window scale option as defined in
    201200  /// RFC1323. Set it to FALSE to disable it.
    202201  ///
    203   BOOLEAN  EnableWindowScaling;
     202  BOOLEAN    EnableWindowScaling;
    204203  ///
    205204  /// Set it to TRUE to enable selective acknowledge mechanism
     
    208207  /// DSAK as defined in RFC 2883.
    209208  ///
    210   BOOLEAN  EnableSelectiveAck;
     209  BOOLEAN    EnableSelectiveAck;
    211210  ///
    212211  /// Set it to TRUE to enable path MTU discovery as defined in
    213212  /// RFC 1191. Set to FALSE to disable it.
    214213  ///
    215   BOOLEAN  EnablePathMtuDiscovery;
     214  BOOLEAN    EnablePathMtuDiscovery;
    216215} EFI_TCP6_OPTION;
    217216
     
    223222  /// TrafficClass field in transmitted IPv6 packets.
    224223  ///
    225   UINT8                 TrafficClass;
     224  UINT8                    TrafficClass;
    226225  ///
    227226  /// HopLimit field in transmitted IPv6 packets.
    228227  ///
    229   UINT8                 HopLimit;
     228  UINT8                    HopLimit;
    230229  ///
    231230  /// Used to specify TCP communication end settings for a TCP instance.
    232231  ///
    233   EFI_TCP6_ACCESS_POINT AccessPoint;
     232  EFI_TCP6_ACCESS_POINT    AccessPoint;
    234233  ///
    235234  /// Used to configure the advance TCP option for a connection. If set
    236235  /// to NULL, implementation specific options for TCP connection will be used.
    237236  ///
    238   EFI_TCP6_OPTION       *ControlOption;
     237  EFI_TCP6_OPTION          *ControlOption;
    239238} EFI_TCP6_CONFIG_DATA;
    240239
     
    265264  /// updated by the EFI TCPv6 Protocol driver.
    266265  ///
    267   EFI_EVENT   Event;
     266  EFI_EVENT     Event;
    268267  ///
    269268  /// The result of the completed operation.
    270269  ///
    271   EFI_STATUS  Status;
     270  EFI_STATUS    Status;
    272271} EFI_TCP6_COMPLETION_TOKEN;
    273272
     
    305304  /// EFI_NO_MEDIA:             There was a media error.
    306305  ///
    307   EFI_TCP6_COMPLETION_TOKEN CompletionToken;
     306  EFI_TCP6_COMPLETION_TOKEN    CompletionToken;
    308307} EFI_TCP6_CONNECTION_TOKEN;
    309308
     
    324323  /// EFI_SECURITY_VIOLATION: The accept operation was failed because of IPSec policy check.
    325324  ///
    326   EFI_TCP6_COMPLETION_TOKEN CompletionToken;
    327   EFI_HANDLE                NewChildHandle;
     325  EFI_TCP6_COMPLETION_TOKEN    CompletionToken;
     326  EFI_HANDLE                   NewChildHandle;
    328327} EFI_TCP6_LISTEN_TOKEN;
    329328
     
    334333///
    335334typedef struct {
    336   UINT32 FragmentLength;   ///< Length of data buffer in the fragment.
    337   VOID   *FragmentBuffer; ///< Pointer to the data buffer in the fragment.
     335  UINT32    FragmentLength;  ///< Length of data buffer in the fragment.
     336  VOID      *FragmentBuffer; ///< Pointer to the data buffer in the fragment.
    338337} EFI_TCP6_FRAGMENT_DATA;
    339338
     
    349348  /// urgent mode.
    350349  ///
    351   BOOLEAN                 UrgentFlag;
     350  BOOLEAN                   UrgentFlag;
    352351  ///
    353352  /// When calling Receive() function, it is the byte counts of all
     
    356355  /// received data in the fragments.
    357356  ///
    358   UINT32                  DataLength;
     357  UINT32                    DataLength;
    359358  ///
    360359  /// Number of fragments.
    361360  ///
    362   UINT32                  FragmentCount;
     361  UINT32                    FragmentCount;
    363362  ///
    364363  /// An array of fragment descriptors.
    365364  ///
    366   EFI_TCP6_FRAGMENT_DATA  FragmentTable[1];
     365  EFI_TCP6_FRAGMENT_DATA    FragmentTable[1];
    367366} EFI_TCP6_RECEIVE_DATA;
    368367
     
    379378  /// subsequent Transmit()s for efficiency.
    380379  ///
    381   BOOLEAN                 Push;
     380  BOOLEAN                   Push;
    382381  ///
    383382  /// The data in the fragment table are urgent and urgent point is in
    384383  /// effect if TRUE. Otherwise those data are NOT considered urgent.
    385384  ///
    386   BOOLEAN                 Urgent;
     385  BOOLEAN                   Urgent;
    387386  ///
    388387  /// Length of the data in the fragments.
    389388  ///
    390   UINT32                  DataLength;
     389  UINT32                    DataLength;
    391390  ///
    392391  /// Number of fragments.
    393392  ///
    394   UINT32                  FragmentCount;
     393  UINT32                    FragmentCount;
    395394  ///
    396395  /// An array of fragment descriptors.
    397396  ///
    398   EFI_TCP6_FRAGMENT_DATA  FragmentTable[1];
     397  EFI_TCP6_FRAGMENT_DATA    FragmentTable[1];
    399398} EFI_TCP6_TRANSMIT_DATA;
    400399
     
    433432  /// EFI_NO_MEDIA:             There was a media error.
    434433  ///
    435   EFI_TCP6_COMPLETION_TOKEN CompletionToken;
     434  EFI_TCP6_COMPLETION_TOKEN    CompletionToken;
    436435  union {
    437436    ///
     
    439438    /// EFI_TCP6_RECEIVE_DATA.
    440439    ///
    441     EFI_TCP6_RECEIVE_DATA   *RxData;
     440    EFI_TCP6_RECEIVE_DATA     *RxData;
    442441    ///
    443442    /// When this token is used for transmitting, TxData is a pointer to
    444443    /// EFI_TCP6_TRANSMIT_DATA.
    445444    ///
    446     EFI_TCP6_TRANSMIT_DATA  *TxData;
     445    EFI_TCP6_TRANSMIT_DATA    *TxData;
    447446  } Packet;
    448447} EFI_TCP6_IO_TOKEN;
     
    460459  /// EFI_SECURITY_VIOLATION: The close operation was failed because of IPSec policy check.
    461460  ///
    462   EFI_TCP6_COMPLETION_TOKEN CompletionToken;
     461  EFI_TCP6_COMPLETION_TOKEN    CompletionToken;
    463462  ///
    464463  /// Abort the TCP connection on close instead of the standard TCP
     
    466465  /// satisfy a fast disconnect.
    467466  ///
    468   BOOLEAN                   AbortOnClose;
     467  BOOLEAN                      AbortOnClose;
    469468} EFI_TCP6_CLOSE_TOKEN;
    470469
     
    841840///
    842841struct _EFI_TCP6_PROTOCOL {
    843   EFI_TCP6_GET_MODE_DATA  GetModeData;
    844   EFI_TCP6_CONFIGURE      Configure;
    845   EFI_TCP6_CONNECT        Connect;
    846   EFI_TCP6_ACCEPT         Accept;
    847   EFI_TCP6_TRANSMIT       Transmit;
    848   EFI_TCP6_RECEIVE        Receive;
    849   EFI_TCP6_CLOSE          Close;
    850   EFI_TCP6_CANCEL         Cancel;
    851   EFI_TCP6_POLL           Poll;
     842  EFI_TCP6_GET_MODE_DATA    GetModeData;
     843  EFI_TCP6_CONFIGURE        Configure;
     844  EFI_TCP6_CONNECT          Connect;
     845  EFI_TCP6_ACCEPT           Accept;
     846  EFI_TCP6_TRANSMIT         Transmit;
     847  EFI_TCP6_RECEIVE          Receive;
     848  EFI_TCP6_CLOSE            Close;
     849  EFI_TCP6_CANCEL           Cancel;
     850  EFI_TCP6_POLL             Poll;
    852851};
    853852
    854 extern EFI_GUID gEfiTcp6ServiceBindingProtocolGuid;
    855 extern EFI_GUID gEfiTcp6ProtocolGuid;
     853extern EFI_GUID  gEfiTcp6ServiceBindingProtocolGuid;
     854extern EFI_GUID  gEfiTcp6ProtocolGuid;
    856855
    857856#endif
    858 
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette