Changeset 99404 in vbox for trunk/src/VBox/Devices/EFI/FirmwareNew/MdePkg/Include/Protocol/Tcp6.h
- Timestamp:
- Apr 14, 2023 3:17:44 PM (23 months ago)
- svn:sync-xref-src-repo-rev:
- 156854
- Location:
- trunk/src/VBox/Devices/EFI/FirmwareNew
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/Devices/EFI/FirmwareNew
-
Property svn:mergeinfo
changed from (toggle deleted branches)
to (toggle deleted branches)/vendor/edk2/current 103735-103757,103769-103776,129194-145445 /vendor/edk2/current 103735-103757,103769-103776,129194-156846
-
Property svn:mergeinfo
changed from (toggle deleted branches)
-
trunk/src/VBox/Devices/EFI/FirmwareNew/MdePkg/Include/Protocol/Tcp6.h
r80721 r99404 29 29 } 30 30 31 32 31 typedef struct _EFI_TCP6_PROTOCOL EFI_TCP6_PROTOCOL; 33 32 … … 41 40 /// address/port pair. 42 41 /// 43 EFI_HANDLE InstanceHandle;42 EFI_HANDLE InstanceHandle; 44 43 /// 45 44 /// The local IPv6 address to which this TCP instance is bound. Set … … 47 46 /// available source addresses. 48 47 /// 49 EFI_IPv6_ADDRESS LocalAddress;48 EFI_IPv6_ADDRESS LocalAddress; 50 49 /// 51 50 /// The local port number in host byte order. 52 51 /// 53 UINT16 LocalPort;52 UINT16 LocalPort; 54 53 /// 55 54 /// The remote IPv6 address. It may be 0::/128 if this TCP instance is 56 55 /// not connected to any remote host. 57 56 /// 58 EFI_IPv6_ADDRESS RemoteAddress;57 EFI_IPv6_ADDRESS RemoteAddress; 59 58 /// 60 59 /// The remote port number in host byte order. It may be zero if this 61 60 /// TCP instance is not connected to any remote host. 62 61 /// 63 UINT16 RemotePort;62 UINT16 RemotePort; 64 63 } EFI_TCP6_SERVICE_POINT; 65 64 … … 69 68 /// 70 69 typedef struct { 71 EFI_HANDLE DriverHandle; ///< The handle of the driver that creates this entry.72 UINT32 ServiceCount; ///< The number of address/port pairs following this data structure.73 EFI_TCP6_SERVICE_POINT Services[1]; ///< List of address/port pairs that are currently in use.70 EFI_HANDLE DriverHandle; ///< The handle of the driver that creates this entry. 71 UINT32 ServiceCount; ///< The number of address/port pairs following this data structure. 72 EFI_TCP6_SERVICE_POINT Services[1]; ///< List of address/port pairs that are currently in use. 74 73 } EFI_TCP6_VARIABLE_DATA; 75 74 … … 86 85 /// IPv6 driver. 87 86 /// 88 EFI_IPv6_ADDRESS StationAddress;87 EFI_IPv6_ADDRESS StationAddress; 89 88 /// 90 89 /// The local port number to which this EFI TCPv6 Protocol instance … … 92 91 /// StationPort to zero to use an ephemeral port. 93 92 /// 94 UINT16 StationPort;93 UINT16 StationPort; 95 94 /// 96 95 /// The remote IP address to which this EFI TCPv6 Protocol instance … … 104 103 /// from any address will be accepted. 105 104 /// 106 EFI_IPv6_ADDRESS RemoteAddress;105 EFI_IPv6_ADDRESS RemoteAddress; 107 106 /// 108 107 /// The remote port to which this EFI TCPv6 Protocol instance … … 113 112 /// ActiveFlag is TRUE. 114 113 /// 115 UINT16 114 UINT16 RemotePort; 116 115 /// 117 116 /// Set it to TRUE to initiate an active open. Set it to FALSE to 118 117 /// initiate a passive open to act as a server. 119 118 /// 120 BOOLEAN 119 BOOLEAN ActiveFlag; 121 120 } EFI_TCP6_ACCESS_POINT; 122 121 … … 128 127 /// The size of the TCP receive buffer. 129 128 /// 130 UINT32 ReceiveBufferSize;129 UINT32 ReceiveBufferSize; 131 130 /// 132 131 /// The size of the TCP send buffer. 133 132 /// 134 UINT32 SendBufferSize;133 UINT32 SendBufferSize; 135 134 /// 136 135 /// The length of incoming connect request queue for a passive 137 136 /// instance. When set to zero, the value is implementation specific. 138 137 /// 139 UINT32 MaxSynBackLog;138 UINT32 MaxSynBackLog; 140 139 /// 141 140 /// The maximum seconds a TCP instance will wait for before a TCP … … 143 142 /// implementation specific. 144 143 /// 145 UINT32 ConnectionTimeout;146 /// 147 /// The number of times TCP will attempt to retransmit a packet on148 /// an established connection. When set to zero, the value is149 /// implementation specific.150 /// 151 UINT32 DataRetries;144 UINT32 ConnectionTimeout; 145 /// 146 /// The number of times TCP will attempt to retransmit a packet on 147 /// an established connection. When set to zero, the value is 148 /// implementation specific. 149 /// 150 UINT32 DataRetries; 152 151 /// 153 152 /// How many seconds to wait in the FIN_WAIT_2 states for a final … … 159 158 /// against the standard. The default value is 60. 160 159 /// 161 UINT32 FinTimeout;160 UINT32 FinTimeout; 162 161 /// 163 162 /// How many seconds to wait in TIME_WAIT state before the TCP … … 166 165 /// is against the related RFC documents. 167 166 /// 168 UINT32 TimeWaitTimeout;167 UINT32 TimeWaitTimeout; 169 168 /// 170 169 /// The maximum number of TCP keep-alive probes to send before … … 172 171 /// other end. Set to zero to disable keep-alive probe. 173 172 /// 174 UINT32 KeepAliveProbes;173 UINT32 KeepAliveProbes; 175 174 /// 176 175 /// The number of seconds a connection needs to be idle before TCP … … 179 178 /// alive probe is disabled. 180 179 /// 181 UINT32 KeepAliveTime;180 UINT32 KeepAliveTime; 182 181 /// 183 182 /// The number of seconds between TCP keep-alive probes after the … … 186 185 /// alive probe is disabled. 187 186 /// 188 UINT32 KeepAliveInterval;187 UINT32 KeepAliveInterval; 189 188 /// 190 189 /// Set it to TRUE to enable the Nagle algorithm as defined in 191 190 /// RFC896. Set it to FALSE to disable it. 192 191 /// 193 BOOLEAN EnableNagle;192 BOOLEAN EnableNagle; 194 193 /// 195 194 /// Set it to TRUE to enable TCP timestamps option as defined in 196 195 /// RFC1323. Set to FALSE to disable it. 197 196 /// 198 BOOLEAN EnableTimeStamp;197 BOOLEAN EnableTimeStamp; 199 198 /// 200 199 /// Set it to TRUE to enable TCP window scale option as defined in 201 200 /// RFC1323. Set it to FALSE to disable it. 202 201 /// 203 BOOLEAN EnableWindowScaling;202 BOOLEAN EnableWindowScaling; 204 203 /// 205 204 /// Set it to TRUE to enable selective acknowledge mechanism … … 208 207 /// DSAK as defined in RFC 2883. 209 208 /// 210 BOOLEAN EnableSelectiveAck;209 BOOLEAN EnableSelectiveAck; 211 210 /// 212 211 /// Set it to TRUE to enable path MTU discovery as defined in 213 212 /// RFC 1191. Set to FALSE to disable it. 214 213 /// 215 BOOLEAN EnablePathMtuDiscovery;214 BOOLEAN EnablePathMtuDiscovery; 216 215 } EFI_TCP6_OPTION; 217 216 … … 223 222 /// TrafficClass field in transmitted IPv6 packets. 224 223 /// 225 UINT8 TrafficClass;224 UINT8 TrafficClass; 226 225 /// 227 226 /// HopLimit field in transmitted IPv6 packets. 228 227 /// 229 UINT8 HopLimit;228 UINT8 HopLimit; 230 229 /// 231 230 /// Used to specify TCP communication end settings for a TCP instance. 232 231 /// 233 EFI_TCP6_ACCESS_POINT AccessPoint;232 EFI_TCP6_ACCESS_POINT AccessPoint; 234 233 /// 235 234 /// Used to configure the advance TCP option for a connection. If set 236 235 /// to NULL, implementation specific options for TCP connection will be used. 237 236 /// 238 EFI_TCP6_OPTION *ControlOption;237 EFI_TCP6_OPTION *ControlOption; 239 238 } EFI_TCP6_CONFIG_DATA; 240 239 … … 265 264 /// updated by the EFI TCPv6 Protocol driver. 266 265 /// 267 EFI_EVENT Event;266 EFI_EVENT Event; 268 267 /// 269 268 /// The result of the completed operation. 270 269 /// 271 EFI_STATUS Status;270 EFI_STATUS Status; 272 271 } EFI_TCP6_COMPLETION_TOKEN; 273 272 … … 305 304 /// EFI_NO_MEDIA: There was a media error. 306 305 /// 307 EFI_TCP6_COMPLETION_TOKEN CompletionToken;306 EFI_TCP6_COMPLETION_TOKEN CompletionToken; 308 307 } EFI_TCP6_CONNECTION_TOKEN; 309 308 … … 324 323 /// EFI_SECURITY_VIOLATION: The accept operation was failed because of IPSec policy check. 325 324 /// 326 EFI_TCP6_COMPLETION_TOKEN CompletionToken;327 EFI_HANDLE NewChildHandle;325 EFI_TCP6_COMPLETION_TOKEN CompletionToken; 326 EFI_HANDLE NewChildHandle; 328 327 } EFI_TCP6_LISTEN_TOKEN; 329 328 … … 334 333 /// 335 334 typedef struct { 336 UINT32 FragmentLength;///< Length of data buffer in the fragment.337 VOID *FragmentBuffer;///< Pointer to the data buffer in the fragment.335 UINT32 FragmentLength; ///< Length of data buffer in the fragment. 336 VOID *FragmentBuffer; ///< Pointer to the data buffer in the fragment. 338 337 } EFI_TCP6_FRAGMENT_DATA; 339 338 … … 349 348 /// urgent mode. 350 349 /// 351 BOOLEAN UrgentFlag;350 BOOLEAN UrgentFlag; 352 351 /// 353 352 /// When calling Receive() function, it is the byte counts of all … … 356 355 /// received data in the fragments. 357 356 /// 358 UINT32 DataLength;357 UINT32 DataLength; 359 358 /// 360 359 /// Number of fragments. 361 360 /// 362 UINT32 FragmentCount;361 UINT32 FragmentCount; 363 362 /// 364 363 /// An array of fragment descriptors. 365 364 /// 366 EFI_TCP6_FRAGMENT_DATA FragmentTable[1];365 EFI_TCP6_FRAGMENT_DATA FragmentTable[1]; 367 366 } EFI_TCP6_RECEIVE_DATA; 368 367 … … 379 378 /// subsequent Transmit()s for efficiency. 380 379 /// 381 BOOLEAN Push;380 BOOLEAN Push; 382 381 /// 383 382 /// The data in the fragment table are urgent and urgent point is in 384 383 /// effect if TRUE. Otherwise those data are NOT considered urgent. 385 384 /// 386 BOOLEAN Urgent;385 BOOLEAN Urgent; 387 386 /// 388 387 /// Length of the data in the fragments. 389 388 /// 390 UINT32 DataLength;389 UINT32 DataLength; 391 390 /// 392 391 /// Number of fragments. 393 392 /// 394 UINT32 FragmentCount;393 UINT32 FragmentCount; 395 394 /// 396 395 /// An array of fragment descriptors. 397 396 /// 398 EFI_TCP6_FRAGMENT_DATA FragmentTable[1];397 EFI_TCP6_FRAGMENT_DATA FragmentTable[1]; 399 398 } EFI_TCP6_TRANSMIT_DATA; 400 399 … … 433 432 /// EFI_NO_MEDIA: There was a media error. 434 433 /// 435 EFI_TCP6_COMPLETION_TOKEN CompletionToken;434 EFI_TCP6_COMPLETION_TOKEN CompletionToken; 436 435 union { 437 436 /// … … 439 438 /// EFI_TCP6_RECEIVE_DATA. 440 439 /// 441 EFI_TCP6_RECEIVE_DATA *RxData;440 EFI_TCP6_RECEIVE_DATA *RxData; 442 441 /// 443 442 /// When this token is used for transmitting, TxData is a pointer to 444 443 /// EFI_TCP6_TRANSMIT_DATA. 445 444 /// 446 EFI_TCP6_TRANSMIT_DATA *TxData;445 EFI_TCP6_TRANSMIT_DATA *TxData; 447 446 } Packet; 448 447 } EFI_TCP6_IO_TOKEN; … … 460 459 /// EFI_SECURITY_VIOLATION: The close operation was failed because of IPSec policy check. 461 460 /// 462 EFI_TCP6_COMPLETION_TOKEN CompletionToken;461 EFI_TCP6_COMPLETION_TOKEN CompletionToken; 463 462 /// 464 463 /// Abort the TCP connection on close instead of the standard TCP … … 466 465 /// satisfy a fast disconnect. 467 466 /// 468 BOOLEAN AbortOnClose;467 BOOLEAN AbortOnClose; 469 468 } EFI_TCP6_CLOSE_TOKEN; 470 469 … … 841 840 /// 842 841 struct _EFI_TCP6_PROTOCOL { 843 EFI_TCP6_GET_MODE_DATA GetModeData;844 EFI_TCP6_CONFIGURE Configure;845 EFI_TCP6_CONNECT Connect;846 EFI_TCP6_ACCEPT Accept;847 EFI_TCP6_TRANSMIT Transmit;848 EFI_TCP6_RECEIVE Receive;849 EFI_TCP6_CLOSE Close;850 EFI_TCP6_CANCEL Cancel;851 EFI_TCP6_POLL Poll;842 EFI_TCP6_GET_MODE_DATA GetModeData; 843 EFI_TCP6_CONFIGURE Configure; 844 EFI_TCP6_CONNECT Connect; 845 EFI_TCP6_ACCEPT Accept; 846 EFI_TCP6_TRANSMIT Transmit; 847 EFI_TCP6_RECEIVE Receive; 848 EFI_TCP6_CLOSE Close; 849 EFI_TCP6_CANCEL Cancel; 850 EFI_TCP6_POLL Poll; 852 851 }; 853 852 854 extern EFI_GUID gEfiTcp6ServiceBindingProtocolGuid;855 extern EFI_GUID gEfiTcp6ProtocolGuid;853 extern EFI_GUID gEfiTcp6ServiceBindingProtocolGuid; 854 extern EFI_GUID gEfiTcp6ProtocolGuid; 856 855 857 856 #endif 858
Note:
See TracChangeset
for help on using the changeset viewer.