]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - MdeModulePkg/Include/Library/NetLib.h
Base on the value type to get the value for default opcode.
[mirror_edk2.git] / MdeModulePkg / Include / Library / NetLib.h
... / ...
CommitLineData
1/** @file\r
2 This library is only intended to be used by UEFI network stack modules.\r
3 It provides basic functions for the UEFI network stack.\r
4\r
5Copyright (c) 2005 - 2012, Intel Corporation. All rights reserved.<BR>\r
6This program and the accompanying materials\r
7are licensed and made available under the terms and conditions of the BSD License\r
8which accompanies this distribution. The full text of the license may be found at<BR>\r
9http://opensource.org/licenses/bsd-license.php\r
10\r
11THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
12WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
13\r
14**/\r
15\r
16#ifndef _NET_LIB_H_\r
17#define _NET_LIB_H_\r
18\r
19#include <Protocol/Ip6.h>\r
20\r
21#include <Library/BaseLib.h>\r
22#include <Library/BaseMemoryLib.h>\r
23\r
24typedef UINT32 IP4_ADDR;\r
25typedef UINT32 TCP_SEQNO;\r
26typedef UINT16 TCP_PORTNO;\r
27\r
28\r
29#define NET_ETHER_ADDR_LEN 6\r
30#define NET_IFTYPE_ETHERNET 0x01\r
31\r
32#define NET_VLAN_TAG_LEN 4\r
33#define ETHER_TYPE_VLAN 0x8100\r
34\r
35#define EFI_IP_PROTO_UDP 0x11\r
36#define EFI_IP_PROTO_TCP 0x06\r
37#define EFI_IP_PROTO_ICMP 0x01\r
38#define IP4_PROTO_IGMP 0x02\r
39#define IP6_ICMP 58\r
40\r
41//\r
42// The address classification\r
43//\r
44#define IP4_ADDR_CLASSA 1\r
45#define IP4_ADDR_CLASSB 2\r
46#define IP4_ADDR_CLASSC 3\r
47#define IP4_ADDR_CLASSD 4\r
48#define IP4_ADDR_CLASSE 5\r
49\r
50#define IP4_MASK_NUM 33\r
51#define IP6_PREFIX_NUM 129\r
52\r
53#define IP6_HOP_BY_HOP 0\r
54#define IP6_DESTINATION 60\r
55#define IP6_ROUTING 43\r
56#define IP6_FRAGMENT 44\r
57#define IP6_AH 51\r
58#define IP6_ESP 50\r
59#define IP6_NO_NEXT_HEADER 59\r
60\r
61#define IP_VERSION_4 4\r
62#define IP_VERSION_6 6\r
63\r
64#define IP6_PREFIX_LENGTH 64\r
65\r
66#pragma pack(1)\r
67\r
68//\r
69// Ethernet head definition\r
70//\r
71typedef struct {\r
72 UINT8 DstMac [NET_ETHER_ADDR_LEN];\r
73 UINT8 SrcMac [NET_ETHER_ADDR_LEN];\r
74 UINT16 EtherType;\r
75} ETHER_HEAD;\r
76\r
77//\r
78// 802.1Q VLAN Tag Control Information\r
79//\r
80typedef union {\r
81 struct {\r
82 UINT16 Vid : 12; // Unique VLAN identifier (0 to 4094)\r
83 UINT16 Cfi : 1; // Canonical Format Indicator\r
84 UINT16 Priority : 3; // 802.1Q priority level (0 to 7)\r
85 } Bits;\r
86 UINT16 Uint16;\r
87} VLAN_TCI;\r
88\r
89#define VLAN_TCI_CFI_CANONICAL_MAC 0\r
90#define VLAN_TCI_CFI_NON_CANONICAL_MAC 1\r
91\r
92//\r
93// The EFI_IP4_HEADER is hard to use because the source and\r
94// destination address are defined as EFI_IPv4_ADDRESS, which\r
95// is a structure. Two structures can't be compared or masked\r
96// directly. This is why there is an internal representation.\r
97//\r
98typedef struct {\r
99 UINT8 HeadLen : 4;\r
100 UINT8 Ver : 4;\r
101 UINT8 Tos;\r
102 UINT16 TotalLen;\r
103 UINT16 Id;\r
104 UINT16 Fragment;\r
105 UINT8 Ttl;\r
106 UINT8 Protocol;\r
107 UINT16 Checksum;\r
108 IP4_ADDR Src;\r
109 IP4_ADDR Dst;\r
110} IP4_HEAD;\r
111\r
112\r
113//\r
114// ICMP head definition. Each ICMP message is categorized as either an error\r
115// message or query message. Two message types have their own head format.\r
116//\r
117typedef struct {\r
118 UINT8 Type;\r
119 UINT8 Code;\r
120 UINT16 Checksum;\r
121} IP4_ICMP_HEAD;\r
122\r
123typedef struct {\r
124 IP4_ICMP_HEAD Head;\r
125 UINT32 Fourth; // 4th filed of the head, it depends on Type.\r
126 IP4_HEAD IpHead;\r
127} IP4_ICMP_ERROR_HEAD;\r
128\r
129typedef struct {\r
130 IP4_ICMP_HEAD Head;\r
131 UINT16 Id;\r
132 UINT16 Seq;\r
133} IP4_ICMP_QUERY_HEAD;\r
134\r
135typedef struct {\r
136 UINT8 Type;\r
137 UINT8 Code;\r
138 UINT16 Checksum;\r
139} IP6_ICMP_HEAD;\r
140\r
141typedef struct {\r
142 IP6_ICMP_HEAD Head;\r
143 UINT32 Fourth;\r
144 EFI_IP6_HEADER IpHead;\r
145} IP6_ICMP_ERROR_HEAD;\r
146\r
147typedef struct {\r
148 IP6_ICMP_HEAD Head;\r
149 UINT32 Fourth;\r
150} IP6_ICMP_INFORMATION_HEAD;\r
151\r
152//\r
153// UDP header definition\r
154//\r
155typedef struct {\r
156 UINT16 SrcPort;\r
157 UINT16 DstPort;\r
158 UINT16 Length;\r
159 UINT16 Checksum;\r
160} EFI_UDP_HEADER;\r
161\r
162//\r
163// TCP header definition\r
164//\r
165typedef struct {\r
166 TCP_PORTNO SrcPort;\r
167 TCP_PORTNO DstPort;\r
168 TCP_SEQNO Seq;\r
169 TCP_SEQNO Ack;\r
170 UINT8 Res : 4;\r
171 UINT8 HeadLen : 4;\r
172 UINT8 Flag;\r
173 UINT16 Wnd;\r
174 UINT16 Checksum;\r
175 UINT16 Urg;\r
176} TCP_HEAD;\r
177\r
178#pragma pack()\r
179\r
180#define NET_MAC_EQUAL(pMac1, pMac2, Len) \\r
181 (CompareMem ((pMac1), (pMac2), Len) == 0)\r
182\r
183#define NET_MAC_IS_MULTICAST(Mac, BMac, Len) \\r
184 (((*((UINT8 *) Mac) & 0x01) == 0x01) && (!NET_MAC_EQUAL (Mac, BMac, Len)))\r
185\r
186#define NTOHL(x) SwapBytes32 (x)\r
187\r
188#define HTONL(x) NTOHL(x)\r
189\r
190#define NTOHS(x) SwapBytes16 (x)\r
191\r
192#define HTONS(x) NTOHS(x)\r
193#define NTOHLL(x) SwapBytes64 (x)\r
194#define HTONLL(x) NTOHLL(x)\r
195#define NTOHLLL(x) Ip6Swap128 (x)\r
196#define HTONLLL(x) NTOHLLL(x)\r
197\r
198//\r
199// Test the IP's attribute, All the IPs are in host byte order.\r
200//\r
201#define IP4_IS_MULTICAST(Ip) (((Ip) & 0xF0000000) == 0xE0000000)\r
202#define IP4_IS_LOCAL_BROADCAST(Ip) ((Ip) == 0xFFFFFFFF)\r
203#define IP4_NET_EQUAL(Ip1, Ip2, NetMask) (((Ip1) & (NetMask)) == ((Ip2) & (NetMask)))\r
204#define IP4_IS_VALID_NETMASK(Ip) (NetGetMaskLength (Ip) != IP4_MASK_NUM)\r
205\r
206#define IP6_IS_MULTICAST(Ip6) (((Ip6)->Addr[0]) == 0xFF)\r
207\r
208//\r
209// Convert the EFI_IP4_ADDRESS to plain UINT32 IP4 address.\r
210//\r
211#define EFI_IP4(EfiIpAddr) (*(IP4_ADDR *) ((EfiIpAddr).Addr))\r
212#define EFI_NTOHL(EfiIp) (NTOHL (EFI_IP4 ((EfiIp))))\r
213#define EFI_IP4_EQUAL(Ip1, Ip2) (CompareMem ((Ip1), (Ip2), sizeof (EFI_IPv4_ADDRESS)) == 0)\r
214\r
215#define EFI_IP6_EQUAL(Ip1, Ip2) (CompareMem ((Ip1), (Ip2), sizeof (EFI_IPv6_ADDRESS)) == 0)\r
216\r
217#define IP4_COPY_ADDRESS(Dest, Src) (CopyMem ((Dest), (Src), sizeof (EFI_IPv4_ADDRESS)))\r
218#define IP6_COPY_ADDRESS(Dest, Src) (CopyMem ((Dest), (Src), sizeof (EFI_IPv6_ADDRESS)))\r
219#define IP6_COPY_LINK_ADDRESS(Mac1, Mac2) (CopyMem ((Mac1), (Mac2), sizeof (EFI_MAC_ADDRESS)))\r
220\r
221//\r
222// The debug level definition. This value is also used as the\r
223// syslog's servity level. Don't change it.\r
224//\r
225#define NETDEBUG_LEVEL_TRACE 5\r
226#define NETDEBUG_LEVEL_WARNING 4\r
227#define NETDEBUG_LEVEL_ERROR 3\r
228\r
229//\r
230// Network debug message is sent out as syslog packet.\r
231//\r
232#define NET_SYSLOG_FACILITY 16 // Syslog local facility local use\r
233#define NET_SYSLOG_PACKET_LEN 512\r
234#define NET_SYSLOG_TX_TIMEOUT (500 * 1000 * 10) // 500ms\r
235#define NET_DEBUG_MSG_LEN 470 // 512 - (ether+ip4+udp4 head length)\r
236\r
237//\r
238// The debug output expects the ASCII format string, Use %a to print ASCII\r
239// string, and %s to print UNICODE string. PrintArg must be enclosed in ().\r
240// For example: NET_DEBUG_TRACE ("Tcp", ("State transit to %a\n", Name));\r
241//\r
242#define NET_DEBUG_TRACE(Module, PrintArg) \\r
243 NetDebugOutput ( \\r
244 NETDEBUG_LEVEL_TRACE, \\r
245 Module, \\r
246 __FILE__, \\r
247 __LINE__, \\r
248 NetDebugASPrint PrintArg \\r
249 )\r
250\r
251#define NET_DEBUG_WARNING(Module, PrintArg) \\r
252 NetDebugOutput ( \\r
253 NETDEBUG_LEVEL_WARNING, \\r
254 Module, \\r
255 __FILE__, \\r
256 __LINE__, \\r
257 NetDebugASPrint PrintArg \\r
258 )\r
259\r
260#define NET_DEBUG_ERROR(Module, PrintArg) \\r
261 NetDebugOutput ( \\r
262 NETDEBUG_LEVEL_ERROR, \\r
263 Module, \\r
264 __FILE__, \\r
265 __LINE__, \\r
266 NetDebugASPrint PrintArg \\r
267 )\r
268\r
269/**\r
270 Allocate a buffer, then format the message to it. This is a\r
271 help function for the NET_DEBUG_XXX macros. The PrintArg of\r
272 these macros treats the variable length print parameters as a\r
273 single parameter, and pass it to the NetDebugASPrint. For\r
274 example, NET_DEBUG_TRACE ("Tcp", ("State transit to %a\n", Name))\r
275 if extracted to:\r
276\r
277 NetDebugOutput (\r
278 NETDEBUG_LEVEL_TRACE,\r
279 "Tcp",\r
280 __FILE__,\r
281 __LINE__,\r
282 NetDebugASPrint ("State transit to %a\n", Name)\r
283 )\r
284\r
285 @param Format The ASCII format string.\r
286 @param ... The variable length parameter whose format is determined\r
287 by the Format string.\r
288\r
289 @return The buffer containing the formatted message,\r
290 or NULL if memory allocation failed.\r
291\r
292**/\r
293CHAR8 *\r
294EFIAPI\r
295NetDebugASPrint (\r
296 IN CHAR8 *Format,\r
297 ...\r
298 );\r
299\r
300/**\r
301 Builds an UDP4 syslog packet and send it using SNP.\r
302\r
303 This function will locate a instance of SNP then send the message through it.\r
304 Because it isn't open the SNP BY_DRIVER, apply caution when using it.\r
305\r
306 @param Level The servity level of the message.\r
307 @param Module The Moudle that generates the log.\r
308 @param File The file that contains the log.\r
309 @param Line The exact line that contains the log.\r
310 @param Message The user message to log.\r
311\r
312 @retval EFI_INVALID_PARAMETER Any input parameter is invalid.\r
313 @retval EFI_OUT_OF_RESOURCES Failed to allocate memory for the packet\r
314 @retval EFI_SUCCESS The log is discard because that it is more verbose\r
315 than the mNetDebugLevelMax. Or, it has been sent out.\r
316**/\r
317EFI_STATUS\r
318EFIAPI\r
319NetDebugOutput (\r
320 IN UINT32 Level,\r
321 IN UINT8 *Module,\r
322 IN UINT8 *File,\r
323 IN UINT32 Line,\r
324 IN UINT8 *Message\r
325 );\r
326\r
327\r
328/**\r
329 Return the length of the mask.\r
330\r
331 Return the length of the mask. Valid values are 0 to 32.\r
332 If the mask is invalid, return the invalid length 33, which is IP4_MASK_NUM.\r
333 NetMask is in the host byte order.\r
334\r
335 @param[in] NetMask The netmask to get the length from.\r
336\r
337 @return The length of the netmask, or IP4_MASK_NUM (33) if the mask is invalid.\r
338\r
339**/\r
340INTN\r
341EFIAPI\r
342NetGetMaskLength (\r
343 IN IP4_ADDR NetMask\r
344 );\r
345\r
346/**\r
347 Return the class of the IP address, such as class A, B, C.\r
348 Addr is in host byte order.\r
349\r
350 The address of class A starts with 0.\r
351 If the address belong to class A, return IP4_ADDR_CLASSA.\r
352 The address of class B starts with 10.\r
353 If the address belong to class B, return IP4_ADDR_CLASSB.\r
354 The address of class C starts with 110.\r
355 If the address belong to class C, return IP4_ADDR_CLASSC.\r
356 The address of class D starts with 1110.\r
357 If the address belong to class D, return IP4_ADDR_CLASSD.\r
358 The address of class E starts with 1111.\r
359 If the address belong to class E, return IP4_ADDR_CLASSE.\r
360\r
361\r
362 @param[in] Addr The address to get the class from.\r
363\r
364 @return IP address class, such as IP4_ADDR_CLASSA.\r
365\r
366**/\r
367INTN\r
368EFIAPI\r
369NetGetIpClass (\r
370 IN IP4_ADDR Addr\r
371 );\r
372\r
373/**\r
374 Check whether the IP is a valid unicast address according to\r
375 the netmask. If NetMask is zero, use the IP address's class to get the default mask.\r
376\r
377 If Ip is 0, IP is not a valid unicast address.\r
378 Class D address is used for multicasting and class E address is reserved for future. If Ip\r
379 belongs to class D or class E, Ip is not a valid unicast address.\r
380 If all bits of the host address of Ip are 0 or 1, Ip is not a valid unicast address.\r
381\r
382 @param[in] Ip The IP to check against.\r
383 @param[in] NetMask The mask of the IP.\r
384\r
385 @return TRUE if Ip is a valid unicast address on the network, otherwise FALSE.\r
386\r
387**/\r
388BOOLEAN\r
389EFIAPI\r
390NetIp4IsUnicast (\r
391 IN IP4_ADDR Ip,\r
392 IN IP4_ADDR NetMask\r
393 );\r
394\r
395/**\r
396 Check whether the incoming IPv6 address is a valid unicast address.\r
397\r
398 If the address is a multicast address has binary 0xFF at the start, it is not\r
399 a valid unicast address. If the address is unspecified ::, it is not a valid\r
400 unicast address to be assigned to any node. If the address is loopback address\r
401 ::1, it is also not a valid unicast address to be assigned to any physical\r
402 interface.\r
403\r
404 @param[in] Ip6 The IPv6 address to check against.\r
405\r
406 @return TRUE if Ip6 is a valid unicast address on the network, otherwise FALSE.\r
407\r
408**/\r
409BOOLEAN\r
410EFIAPI\r
411NetIp6IsValidUnicast (\r
412 IN EFI_IPv6_ADDRESS *Ip6\r
413 );\r
414\r
415\r
416/**\r
417 Check whether the incoming Ipv6 address is the unspecified address or not.\r
418\r
419 @param[in] Ip6 - Ip6 address, in network order.\r
420\r
421 @retval TRUE - Yes, incoming Ipv6 address is the unspecified address.\r
422 @retval FALSE - The incoming Ipv6 address is not the unspecified address\r
423\r
424**/\r
425BOOLEAN\r
426EFIAPI\r
427NetIp6IsUnspecifiedAddr (\r
428 IN EFI_IPv6_ADDRESS *Ip6\r
429 );\r
430\r
431/**\r
432 Check whether the incoming Ipv6 address is a link-local address.\r
433\r
434 @param[in] Ip6 - Ip6 address, in network order.\r
435\r
436 @retval TRUE - The incoming Ipv6 address is a link-local address.\r
437 @retval FALSE - The incoming Ipv6 address is not a link-local address.\r
438\r
439**/\r
440BOOLEAN\r
441EFIAPI\r
442NetIp6IsLinkLocalAddr (\r
443 IN EFI_IPv6_ADDRESS *Ip6\r
444 );\r
445\r
446/**\r
447 Check whether the Ipv6 address1 and address2 are on the connected network.\r
448\r
449 @param[in] Ip1 - Ip6 address1, in network order.\r
450 @param[in] Ip2 - Ip6 address2, in network order.\r
451 @param[in] PrefixLength - The prefix length of the checking net.\r
452\r
453 @retval TRUE - Yes, the Ipv6 address1 and address2 are connected.\r
454 @retval FALSE - No the Ipv6 address1 and address2 are not connected.\r
455\r
456**/\r
457BOOLEAN\r
458EFIAPI\r
459NetIp6IsNetEqual (\r
460 EFI_IPv6_ADDRESS *Ip1,\r
461 EFI_IPv6_ADDRESS *Ip2,\r
462 UINT8 PrefixLength\r
463 );\r
464\r
465/**\r
466 Switches the endianess of an IPv6 address.\r
467\r
468 This function swaps the bytes in a 128-bit IPv6 address to switch the value\r
469 from little endian to big endian or vice versa. The byte swapped value is\r
470 returned.\r
471\r
472 @param Ip6 Points to an IPv6 address.\r
473\r
474 @return The byte swapped IPv6 address.\r
475\r
476**/\r
477EFI_IPv6_ADDRESS *\r
478EFIAPI\r
479Ip6Swap128 (\r
480 EFI_IPv6_ADDRESS *Ip6\r
481 );\r
482\r
483extern IP4_ADDR gIp4AllMasks[IP4_MASK_NUM];\r
484\r
485\r
486extern EFI_IPv4_ADDRESS mZeroIp4Addr;\r
487\r
488#define NET_IS_DIGIT(Ch) (('0' <= (Ch)) && ((Ch) <= '9'))\r
489#define NET_ROUNDUP(size, unit) (((size) + (unit) - 1) & (~((unit) - 1)))\r
490#define NET_IS_LOWER_CASE_CHAR(Ch) (('a' <= (Ch)) && ((Ch) <= 'z'))\r
491#define NET_IS_UPPER_CASE_CHAR(Ch) (('A' <= (Ch)) && ((Ch) <= 'Z'))\r
492\r
493#define TICKS_PER_MS 10000U\r
494#define TICKS_PER_SECOND 10000000U\r
495\r
496#define NET_RANDOM(Seed) ((UINT32) ((UINT32) (Seed) * 1103515245UL + 12345) % 4294967295UL)\r
497\r
498/**\r
499 Extract a UINT32 from a byte stream.\r
500\r
501 This function copies a UINT32 from a byte stream, and then converts it from Network\r
502 byte order to host byte order. Use this function to avoid alignment error.\r
503\r
504 @param[in] Buf The buffer to extract the UINT32.\r
505\r
506 @return The UINT32 extracted.\r
507\r
508**/\r
509UINT32\r
510EFIAPI\r
511NetGetUint32 (\r
512 IN UINT8 *Buf\r
513 );\r
514\r
515/**\r
516 Puts a UINT32 into the byte stream in network byte order.\r
517\r
518 Converts a UINT32 from host byte order to network byte order, then copies it to the\r
519 byte stream.\r
520\r
521 @param[in, out] Buf The buffer in which to put the UINT32.\r
522 @param[in] Data The data to be converted and put into the byte stream.\r
523\r
524**/\r
525VOID\r
526EFIAPI\r
527NetPutUint32 (\r
528 IN OUT UINT8 *Buf,\r
529 IN UINT32 Data\r
530 );\r
531\r
532/**\r
533 Initialize a random seed using current time.\r
534\r
535 Get current time first. Then initialize a random seed based on some basic\r
536 mathematical operations on the hour, day, minute, second, nanosecond and year\r
537 of the current time.\r
538\r
539 @return The random seed, initialized with current time.\r
540\r
541**/\r
542UINT32\r
543EFIAPI\r
544NetRandomInitSeed (\r
545 VOID\r
546 );\r
547\r
548\r
549#define NET_LIST_USER_STRUCT(Entry, Type, Field) \\r
550 BASE_CR(Entry, Type, Field)\r
551\r
552#define NET_LIST_USER_STRUCT_S(Entry, Type, Field, Sig) \\r
553 CR(Entry, Type, Field, Sig)\r
554\r
555//\r
556// Iterate through the double linked list. It is NOT delete safe\r
557//\r
558#define NET_LIST_FOR_EACH(Entry, ListHead) \\r
559 for(Entry = (ListHead)->ForwardLink; Entry != (ListHead); Entry = Entry->ForwardLink)\r
560\r
561//\r
562// Iterate through the double linked list. This is delete-safe.\r
563// Don't touch NextEntry. Also, don't use this macro if list\r
564// entries other than the Entry may be deleted when processing\r
565// the current Entry.\r
566//\r
567#define NET_LIST_FOR_EACH_SAFE(Entry, NextEntry, ListHead) \\r
568 for(Entry = (ListHead)->ForwardLink, NextEntry = Entry->ForwardLink; \\r
569 Entry != (ListHead); \\r
570 Entry = NextEntry, NextEntry = Entry->ForwardLink \\r
571 )\r
572\r
573//\r
574// Make sure the list isn't empty before getting the first/last record.\r
575//\r
576#define NET_LIST_HEAD(ListHead, Type, Field) \\r
577 NET_LIST_USER_STRUCT((ListHead)->ForwardLink, Type, Field)\r
578\r
579#define NET_LIST_TAIL(ListHead, Type, Field) \\r
580 NET_LIST_USER_STRUCT((ListHead)->BackLink, Type, Field)\r
581\r
582\r
583/**\r
584 Remove the first node entry on the list, and return the removed node entry.\r
585\r
586 Removes the first node entry from a doubly linked list. It is up to the caller of\r
587 this function to release the memory used by the first node, if that is required. On\r
588 exit, the removed node is returned.\r
589\r
590 If Head is NULL, then ASSERT().\r
591 If Head was not initialized, then ASSERT().\r
592 If PcdMaximumLinkedListLength is not zero, and the number of nodes in the\r
593 linked list including the head node is greater than or equal to PcdMaximumLinkedListLength,\r
594 then ASSERT().\r
595\r
596 @param[in, out] Head The list header.\r
597\r
598 @return The first node entry that is removed from the list, NULL if the list is empty.\r
599\r
600**/\r
601LIST_ENTRY *\r
602EFIAPI\r
603NetListRemoveHead (\r
604 IN OUT LIST_ENTRY *Head\r
605 );\r
606\r
607/**\r
608 Remove the last node entry on the list and return the removed node entry.\r
609\r
610 Removes the last node entry from a doubly linked list. It is up to the caller of\r
611 this function to release the memory used by the first node, if that is required. On\r
612 exit, the removed node is returned.\r
613\r
614 If Head is NULL, then ASSERT().\r
615 If Head was not initialized, then ASSERT().\r
616 If PcdMaximumLinkedListLength is not zero, and the number of nodes in the\r
617 linked list including the head node is greater than or equal to PcdMaximumLinkedListLength,\r
618 then ASSERT().\r
619\r
620 @param[in, out] Head The list head.\r
621\r
622 @return The last node entry that is removed from the list, NULL if the list is empty.\r
623\r
624**/\r
625LIST_ENTRY *\r
626EFIAPI\r
627NetListRemoveTail (\r
628 IN OUT LIST_ENTRY *Head\r
629 );\r
630\r
631/**\r
632 Insert a new node entry after a designated node entry of a doubly linked list.\r
633\r
634 Inserts a new node entry designated by NewEntry after the node entry designated by PrevEntry\r
635 of the doubly linked list.\r
636\r
637 @param[in, out] PrevEntry The entry after which to insert.\r
638 @param[in, out] NewEntry The new entry to insert.\r
639\r
640**/\r
641VOID\r
642EFIAPI\r
643NetListInsertAfter (\r
644 IN OUT LIST_ENTRY *PrevEntry,\r
645 IN OUT LIST_ENTRY *NewEntry\r
646 );\r
647\r
648/**\r
649 Insert a new node entry before a designated node entry of a doubly linked list.\r
650\r
651 Inserts a new node entry designated by NewEntry before the node entry designated by PostEntry\r
652 of the doubly linked list.\r
653\r
654 @param[in, out] PostEntry The entry to insert before.\r
655 @param[in, out] NewEntry The new entry to insert.\r
656\r
657**/\r
658VOID\r
659EFIAPI\r
660NetListInsertBefore (\r
661 IN OUT LIST_ENTRY *PostEntry,\r
662 IN OUT LIST_ENTRY *NewEntry\r
663 );\r
664\r
665/**\r
666 Callback function which provided by user to remove one node in NetDestroyLinkList process.\r
667 \r
668 @param[in] Entry The entry to be removed.\r
669 @param[in] Context Pointer to the callback context corresponds to the Context in NetDestroyLinkList.\r
670\r
671 @retval EFI_SUCCESS The entry has been removed successfully.\r
672 @retval Others Fail to remove the entry.\r
673\r
674**/\r
675typedef\r
676EFI_STATUS\r
677(EFIAPI *NET_DESTROY_LINK_LIST_CALLBACK) (\r
678 IN LIST_ENTRY *Entry,\r
679 IN VOID *Context OPTIONAL\r
680);\r
681\r
682/**\r
683 Safe destroy nodes in a linked list, and return the length of the list after all possible operations finished.\r
684\r
685 Destroy network children list by list traversals is not safe due to graph dependencies between nodes.\r
686 This function performs a safe traversal to destroy these nodes by checking to see if the node being destroyed\r
687 has been removed from the list or not.\r
688 If it has been removed, then restart the traversal from the head.\r
689 If it hasn't been removed, then continue with the next node directly.\r
690 This function will end the iterate and return the CallBack's last return value if error happens,\r
691 or retrun EFI_SUCCESS if 2 complete passes are made with no changes in the number of children in the list. \r
692\r
693 @param[in] List The head of the list.\r
694 @param[in] CallBack Pointer to the callback function to destroy one node in the list.\r
695 @param[in] Context Pointer to the callback function's context: corresponds to the\r
696 parameter Context in NET_DESTROY_LINK_LIST_CALLBACK.\r
697 @param[out] ListLength The length of the link list if the function returns successfully.\r
698\r
699 @retval EFI_SUCCESS Two complete passes are made with no changes in the number of children.\r
700 @retval EFI_INVALID_PARAMETER The input parameter is invalid.\r
701 @retval Others Return the CallBack's last return value.\r
702\r
703**/\r
704EFI_STATUS\r
705EFIAPI\r
706NetDestroyLinkList (\r
707 IN LIST_ENTRY *List,\r
708 IN NET_DESTROY_LINK_LIST_CALLBACK CallBack,\r
709 IN VOID *Context, OPTIONAL\r
710 OUT UINTN *ListLength OPTIONAL\r
711);\r
712\r
713/**\r
714 This function checks the input Handle to see if it's one of these handles in ChildHandleBuffer.\r
715\r
716 @param[in] Handle Handle to be checked.\r
717 @param[in] NumberOfChildren Number of Handles in ChildHandleBuffer.\r
718 @param[in] ChildHandleBuffer An array of child handles to be freed. May be NULL\r
719 if NumberOfChildren is 0.\r
720\r
721 @retval TURE Found the input Handle in ChildHandleBuffer.\r
722 @retval FALSE Can't find the input Handle in ChildHandleBuffer.\r
723\r
724**/\r
725BOOLEAN\r
726NetIsInHandleBuffer (\r
727 IN EFI_HANDLE Handle,\r
728 IN UINTN NumberOfChildren,\r
729 IN EFI_HANDLE *ChildHandleBuffer OPTIONAL\r
730);\r
731\r
732//\r
733// Object container: EFI network stack spec defines various kinds of\r
734// tokens. The drivers can share code to manage those objects.\r
735//\r
736typedef struct {\r
737 LIST_ENTRY Link;\r
738 VOID *Key;\r
739 VOID *Value;\r
740} NET_MAP_ITEM;\r
741\r
742typedef struct {\r
743 LIST_ENTRY Used;\r
744 LIST_ENTRY Recycled;\r
745 UINTN Count;\r
746} NET_MAP;\r
747\r
748#define NET_MAP_INCREAMENT 64\r
749\r
750/**\r
751 Initialize the netmap. Netmap is a reposity to keep the <Key, Value> pairs.\r
752\r
753 Initialize the forward and backward links of two head nodes donated by Map->Used\r
754 and Map->Recycled of two doubly linked lists.\r
755 Initializes the count of the <Key, Value> pairs in the netmap to zero.\r
756\r
757 If Map is NULL, then ASSERT().\r
758 If the address of Map->Used is NULL, then ASSERT().\r
759 If the address of Map->Recycled is NULl, then ASSERT().\r
760\r
761 @param[in, out] Map The netmap to initialize.\r
762\r
763**/\r
764VOID\r
765EFIAPI\r
766NetMapInit (\r
767 IN OUT NET_MAP *Map\r
768 );\r
769\r
770/**\r
771 To clean up the netmap, that is, release allocated memories.\r
772\r
773 Removes all nodes of the Used doubly linked list and frees memory of all related netmap items.\r
774 Removes all nodes of the Recycled doubly linked list and free memory of all related netmap items.\r
775 The number of the <Key, Value> pairs in the netmap is set to zero.\r
776\r
777 If Map is NULL, then ASSERT().\r
778\r
779 @param[in, out] Map The netmap to clean up.\r
780\r
781**/\r
782VOID\r
783EFIAPI\r
784NetMapClean (\r
785 IN OUT NET_MAP *Map\r
786 );\r
787\r
788/**\r
789 Test whether the netmap is empty and return true if it is.\r
790\r
791 If the number of the <Key, Value> pairs in the netmap is zero, return TRUE.\r
792\r
793 If Map is NULL, then ASSERT().\r
794\r
795\r
796 @param[in] Map The net map to test.\r
797\r
798 @return TRUE if the netmap is empty, otherwise FALSE.\r
799\r
800**/\r
801BOOLEAN\r
802EFIAPI\r
803NetMapIsEmpty (\r
804 IN NET_MAP *Map\r
805 );\r
806\r
807/**\r
808 Return the number of the <Key, Value> pairs in the netmap.\r
809\r
810 @param[in] Map The netmap to get the entry number.\r
811\r
812 @return The entry number in the netmap.\r
813\r
814**/\r
815UINTN\r
816EFIAPI\r
817NetMapGetCount (\r
818 IN NET_MAP *Map\r
819 );\r
820\r
821/**\r
822 Allocate an item to save the <Key, Value> pair to the head of the netmap.\r
823\r
824 Allocate an item to save the <Key, Value> pair and add corresponding node entry\r
825 to the beginning of the Used doubly linked list. The number of the <Key, Value>\r
826 pairs in the netmap increase by 1.\r
827\r
828 If Map is NULL, then ASSERT().\r
829\r
830 @param[in, out] Map The netmap to insert into.\r
831 @param[in] Key The user's key.\r
832 @param[in] Value The user's value for the key.\r
833\r
834 @retval EFI_OUT_OF_RESOURCES Failed to allocate the memory for the item.\r
835 @retval EFI_SUCCESS The item is inserted to the head.\r
836\r
837**/\r
838EFI_STATUS\r
839EFIAPI\r
840NetMapInsertHead (\r
841 IN OUT NET_MAP *Map,\r
842 IN VOID *Key,\r
843 IN VOID *Value OPTIONAL\r
844 );\r
845\r
846/**\r
847 Allocate an item to save the <Key, Value> pair to the tail of the netmap.\r
848\r
849 Allocate an item to save the <Key, Value> pair and add corresponding node entry\r
850 to the tail of the Used doubly linked list. The number of the <Key, Value>\r
851 pairs in the netmap increase by 1.\r
852\r
853 If Map is NULL, then ASSERT().\r
854\r
855 @param[in, out] Map The netmap to insert into.\r
856 @param[in] Key The user's key.\r
857 @param[in] Value The user's value for the key.\r
858\r
859 @retval EFI_OUT_OF_RESOURCES Failed to allocate the memory for the item.\r
860 @retval EFI_SUCCESS The item is inserted to the tail.\r
861\r
862**/\r
863EFI_STATUS\r
864EFIAPI\r
865NetMapInsertTail (\r
866 IN OUT NET_MAP *Map,\r
867 IN VOID *Key,\r
868 IN VOID *Value OPTIONAL\r
869 );\r
870\r
871/**\r
872 Finds the key in the netmap and returns the point to the item containing the Key.\r
873\r
874 Iterate the Used doubly linked list of the netmap to get every item. Compare the key of every\r
875 item with the key to search. It returns the point to the item contains the Key if found.\r
876\r
877 If Map is NULL, then ASSERT().\r
878\r
879 @param[in] Map The netmap to search within.\r
880 @param[in] Key The key to search.\r
881\r
882 @return The point to the item contains the Key, or NULL if Key isn't in the map.\r
883\r
884**/\r
885NET_MAP_ITEM *\r
886EFIAPI\r
887NetMapFindKey (\r
888 IN NET_MAP *Map,\r
889 IN VOID *Key\r
890 );\r
891\r
892/**\r
893 Remove the node entry of the item from the netmap and return the key of the removed item.\r
894\r
895 Remove the node entry of the item from the Used doubly linked list of the netmap.\r
896 The number of the <Key, Value> pairs in the netmap decrease by 1. Then add the node\r
897 entry of the item to the Recycled doubly linked list of the netmap. If Value is not NULL,\r
898 Value will point to the value of the item. It returns the key of the removed item.\r
899\r
900 If Map is NULL, then ASSERT().\r
901 If Item is NULL, then ASSERT().\r
902 if item in not in the netmap, then ASSERT().\r
903\r
904 @param[in, out] Map The netmap to remove the item from.\r
905 @param[in, out] Item The item to remove.\r
906 @param[out] Value The variable to receive the value if not NULL.\r
907\r
908 @return The key of the removed item.\r
909\r
910**/\r
911VOID *\r
912EFIAPI\r
913NetMapRemoveItem (\r
914 IN OUT NET_MAP *Map,\r
915 IN OUT NET_MAP_ITEM *Item,\r
916 OUT VOID **Value OPTIONAL\r
917 );\r
918\r
919/**\r
920 Remove the first node entry on the netmap and return the key of the removed item.\r
921\r
922 Remove the first node entry from the Used doubly linked list of the netmap.\r
923 The number of the <Key, Value> pairs in the netmap decrease by 1. Then add the node\r
924 entry to the Recycled doubly linked list of the netmap. If parameter Value is not NULL,\r
925 parameter Value will point to the value of the item. It returns the key of the removed item.\r
926\r
927 If Map is NULL, then ASSERT().\r
928 If the Used doubly linked list is empty, then ASSERT().\r
929\r
930 @param[in, out] Map The netmap to remove the head from.\r
931 @param[out] Value The variable to receive the value if not NULL.\r
932\r
933 @return The key of the item removed.\r
934\r
935**/\r
936VOID *\r
937EFIAPI\r
938NetMapRemoveHead (\r
939 IN OUT NET_MAP *Map,\r
940 OUT VOID **Value OPTIONAL\r
941 );\r
942\r
943/**\r
944 Remove the last node entry on the netmap and return the key of the removed item.\r
945\r
946 Remove the last node entry from the Used doubly linked list of the netmap.\r
947 The number of the <Key, Value> pairs in the netmap decrease by 1. Then add the node\r
948 entry to the Recycled doubly linked list of the netmap. If parameter Value is not NULL,\r
949 parameter Value will point to the value of the item. It returns the key of the removed item.\r
950\r
951 If Map is NULL, then ASSERT().\r
952 If the Used doubly linked list is empty, then ASSERT().\r
953\r
954 @param[in, out] Map The netmap to remove the tail from.\r
955 @param[out] Value The variable to receive the value if not NULL.\r
956\r
957 @return The key of the item removed.\r
958\r
959**/\r
960VOID *\r
961EFIAPI\r
962NetMapRemoveTail (\r
963 IN OUT NET_MAP *Map,\r
964 OUT VOID **Value OPTIONAL\r
965 );\r
966\r
967typedef\r
968EFI_STATUS\r
969(EFIAPI *NET_MAP_CALLBACK) (\r
970 IN NET_MAP *Map,\r
971 IN NET_MAP_ITEM *Item,\r
972 IN VOID *Arg\r
973 );\r
974\r
975/**\r
976 Iterate through the netmap and call CallBack for each item.\r
977\r
978 It will contiue the traverse if CallBack returns EFI_SUCCESS, otherwise, break\r
979 from the loop. It returns the CallBack's last return value. This function is\r
980 delete safe for the current item.\r
981\r
982 If Map is NULL, then ASSERT().\r
983 If CallBack is NULL, then ASSERT().\r
984\r
985 @param[in] Map The Map to iterate through.\r
986 @param[in] CallBack The callback function to call for each item.\r
987 @param[in] Arg The opaque parameter to the callback.\r
988\r
989 @retval EFI_SUCCESS There is no item in the netmap, or CallBack for each item\r
990 returns EFI_SUCCESS.\r
991 @retval Others It returns the CallBack's last return value.\r
992\r
993**/\r
994EFI_STATUS\r
995EFIAPI\r
996NetMapIterate (\r
997 IN NET_MAP *Map,\r
998 IN NET_MAP_CALLBACK CallBack,\r
999 IN VOID *Arg OPTIONAL\r
1000 );\r
1001\r
1002\r
1003//\r
1004// Helper functions to implement driver binding and service binding protocols.\r
1005//\r
1006/**\r
1007 Create a child of the service that is identified by ServiceBindingGuid.\r
1008\r
1009 Get the ServiceBinding Protocol first, then use it to create a child.\r
1010\r
1011 If ServiceBindingGuid is NULL, then ASSERT().\r
1012 If ChildHandle is NULL, then ASSERT().\r
1013\r
1014 @param[in] Controller The controller which has the service installed.\r
1015 @param[in] Image The image handle used to open service.\r
1016 @param[in] ServiceBindingGuid The service's Guid.\r
1017 @param[in, out] ChildHandle The handle to receive the created child.\r
1018\r
1019 @retval EFI_SUCCESS The child was successfully created.\r
1020 @retval Others Failed to create the child.\r
1021\r
1022**/\r
1023EFI_STATUS\r
1024EFIAPI\r
1025NetLibCreateServiceChild (\r
1026 IN EFI_HANDLE Controller,\r
1027 IN EFI_HANDLE Image,\r
1028 IN EFI_GUID *ServiceBindingGuid,\r
1029 IN OUT EFI_HANDLE *ChildHandle\r
1030 );\r
1031\r
1032/**\r
1033 Destroy a child of the service that is identified by ServiceBindingGuid.\r
1034\r
1035 Get the ServiceBinding Protocol first, then use it to destroy a child.\r
1036\r
1037 If ServiceBindingGuid is NULL, then ASSERT().\r
1038\r
1039 @param[in] Controller The controller which has the service installed.\r
1040 @param[in] Image The image handle used to open service.\r
1041 @param[in] ServiceBindingGuid The service's Guid.\r
1042 @param[in] ChildHandle The child to destroy.\r
1043\r
1044 @retval EFI_SUCCESS The child was destroyed.\r
1045 @retval Others Failed to destroy the child.\r
1046\r
1047**/\r
1048EFI_STATUS\r
1049EFIAPI\r
1050NetLibDestroyServiceChild (\r
1051 IN EFI_HANDLE Controller,\r
1052 IN EFI_HANDLE Image,\r
1053 IN EFI_GUID *ServiceBindingGuid,\r
1054 IN EFI_HANDLE ChildHandle\r
1055 );\r
1056\r
1057/**\r
1058 Get handle with Simple Network Protocol installed on it.\r
1059\r
1060 There should be MNP Service Binding Protocol installed on the input ServiceHandle.\r
1061 If Simple Network Protocol is already installed on the ServiceHandle, the\r
1062 ServiceHandle will be returned. If SNP is not installed on the ServiceHandle,\r
1063 try to find its parent handle with SNP installed.\r
1064\r
1065 @param[in] ServiceHandle The handle where network service binding protocols are\r
1066 installed on.\r
1067 @param[out] Snp The pointer to store the address of the SNP instance.\r
1068 This is an optional parameter that may be NULL.\r
1069\r
1070 @return The SNP handle, or NULL if not found.\r
1071\r
1072**/\r
1073EFI_HANDLE\r
1074EFIAPI\r
1075NetLibGetSnpHandle (\r
1076 IN EFI_HANDLE ServiceHandle,\r
1077 OUT EFI_SIMPLE_NETWORK_PROTOCOL **Snp OPTIONAL\r
1078 );\r
1079\r
1080/**\r
1081 Retrieve VLAN ID of a VLAN device handle.\r
1082\r
1083 Search VLAN device path node in Device Path of specified ServiceHandle and\r
1084 return its VLAN ID. If no VLAN device path node found, then this ServiceHandle\r
1085 is not a VLAN device handle, and 0 will be returned.\r
1086\r
1087 @param[in] ServiceHandle The handle where network service binding protocols are\r
1088 installed on.\r
1089\r
1090 @return VLAN ID of the device handle, or 0 if not a VLAN device.\r
1091\r
1092**/\r
1093UINT16\r
1094EFIAPI\r
1095NetLibGetVlanId (\r
1096 IN EFI_HANDLE ServiceHandle\r
1097 );\r
1098\r
1099/**\r
1100 Find VLAN device handle with specified VLAN ID.\r
1101\r
1102 The VLAN child device handle is created by VLAN Config Protocol on ControllerHandle.\r
1103 This function will append VLAN device path node to the parent device path,\r
1104 and then use LocateDevicePath() to find the correct VLAN device handle.\r
1105\r
1106 @param[in] ControllerHandle The handle where network service binding protocols are\r
1107 installed on.\r
1108 @param[in] VlanId The configured VLAN ID for the VLAN device.\r
1109\r
1110 @return The VLAN device handle, or NULL if not found.\r
1111\r
1112**/\r
1113EFI_HANDLE\r
1114EFIAPI\r
1115NetLibGetVlanHandle (\r
1116 IN EFI_HANDLE ControllerHandle,\r
1117 IN UINT16 VlanId\r
1118 );\r
1119\r
1120/**\r
1121 Get MAC address associated with the network service handle.\r
1122\r
1123 There should be MNP Service Binding Protocol installed on the input ServiceHandle.\r
1124 If SNP is installed on the ServiceHandle or its parent handle, MAC address will\r
1125 be retrieved from SNP. If no SNP found, try to get SNP mode data use MNP.\r
1126\r
1127 @param[in] ServiceHandle The handle where network service binding protocols are\r
1128 installed on.\r
1129 @param[out] MacAddress The pointer to store the returned MAC address.\r
1130 @param[out] AddressSize The length of returned MAC address.\r
1131\r
1132 @retval EFI_SUCCESS MAC address was returned successfully.\r
1133 @retval Others Failed to get SNP mode data.\r
1134\r
1135**/\r
1136EFI_STATUS\r
1137EFIAPI\r
1138NetLibGetMacAddress (\r
1139 IN EFI_HANDLE ServiceHandle,\r
1140 OUT EFI_MAC_ADDRESS *MacAddress,\r
1141 OUT UINTN *AddressSize\r
1142 );\r
1143\r
1144/**\r
1145 Convert MAC address of the NIC associated with specified Service Binding Handle\r
1146 to a unicode string. Callers are responsible for freeing the string storage.\r
1147\r
1148 Locate simple network protocol associated with the Service Binding Handle and\r
1149 get the mac address from SNP. Then convert the mac address into a unicode\r
1150 string. It takes 2 unicode characters to represent a 1 byte binary buffer.\r
1151 Plus one unicode character for the null-terminator.\r
1152\r
1153 @param[in] ServiceHandle The handle where network service binding protocol is\r
1154 installed.\r
1155 @param[in] ImageHandle The image handle used to act as the agent handle to\r
1156 get the simple network protocol. This parameter is\r
1157 optional and may be NULL.\r
1158 @param[out] MacString The pointer to store the address of the string\r
1159 representation of the mac address.\r
1160\r
1161 @retval EFI_SUCCESS Converted the mac address a unicode string successfully.\r
1162 @retval EFI_OUT_OF_RESOURCES There are not enough memory resources.\r
1163 @retval Others Failed to open the simple network protocol.\r
1164\r
1165**/\r
1166EFI_STATUS\r
1167EFIAPI\r
1168NetLibGetMacString (\r
1169 IN EFI_HANDLE ServiceHandle,\r
1170 IN EFI_HANDLE ImageHandle, OPTIONAL\r
1171 OUT CHAR16 **MacString\r
1172 );\r
1173\r
1174/**\r
1175 Detect media status for specified network device.\r
1176\r
1177 The underlying UNDI driver may or may not support reporting media status from\r
1178 GET_STATUS command (PXE_STATFLAGS_GET_STATUS_NO_MEDIA_SUPPORTED). This routine\r
1179 will try to invoke Snp->GetStatus() to get the media status. If media is already\r
1180 present, it returns directly. If media is not present, it will stop SNP and then\r
1181 restart SNP to get the latest media status. This provides an opportunity to get \r
1182 the correct media status for old UNDI driver, which doesn't support reporting \r
1183 media status from GET_STATUS command.\r
1184 Note: there are two limitations for the current algorithm:\r
1185 1) For UNDI with this capability, when the cable is not attached, there will\r
1186 be an redundant Stop/Start() process.\r
1187 2) for UNDI without this capability, in case that network cable is attached when\r
1188 Snp->Initialize() is invoked while network cable is unattached later,\r
1189 NetLibDetectMedia() will report MediaPresent as TRUE, causing upper layer\r
1190 apps to wait for timeout time.\r
1191\r
1192 @param[in] ServiceHandle The handle where network service binding protocols are\r
1193 installed.\r
1194 @param[out] MediaPresent The pointer to store the media status.\r
1195\r
1196 @retval EFI_SUCCESS Media detection success.\r
1197 @retval EFI_INVALID_PARAMETER ServiceHandle is not a valid network device handle.\r
1198 @retval EFI_UNSUPPORTED The network device does not support media detection.\r
1199 @retval EFI_DEVICE_ERROR SNP is in an unknown state.\r
1200\r
1201**/\r
1202EFI_STATUS\r
1203EFIAPI\r
1204NetLibDetectMedia (\r
1205 IN EFI_HANDLE ServiceHandle,\r
1206 OUT BOOLEAN *MediaPresent\r
1207 );\r
1208\r
1209/**\r
1210 Create an IPv4 device path node.\r
1211\r
1212 The header type of IPv4 device path node is MESSAGING_DEVICE_PATH.\r
1213 The header subtype of IPv4 device path node is MSG_IPv4_DP.\r
1214 The length of the IPv4 device path node in bytes is 19.\r
1215 Get other information from parameters to make up the whole IPv4 device path node.\r
1216\r
1217 @param[in, out] Node The pointer to the IPv4 device path node.\r
1218 @param[in] Controller The controller handle.\r
1219 @param[in] LocalIp The local IPv4 address.\r
1220 @param[in] LocalPort The local port.\r
1221 @param[in] RemoteIp The remote IPv4 address.\r
1222 @param[in] RemotePort The remote port.\r
1223 @param[in] Protocol The protocol type in the IP header.\r
1224 @param[in] UseDefaultAddress Whether this instance is using default address or not.\r
1225\r
1226**/\r
1227VOID\r
1228EFIAPI\r
1229NetLibCreateIPv4DPathNode (\r
1230 IN OUT IPv4_DEVICE_PATH *Node,\r
1231 IN EFI_HANDLE Controller,\r
1232 IN IP4_ADDR LocalIp,\r
1233 IN UINT16 LocalPort,\r
1234 IN IP4_ADDR RemoteIp,\r
1235 IN UINT16 RemotePort,\r
1236 IN UINT16 Protocol,\r
1237 IN BOOLEAN UseDefaultAddress\r
1238 );\r
1239\r
1240/**\r
1241 Create an IPv6 device path node.\r
1242\r
1243 The header type of IPv6 device path node is MESSAGING_DEVICE_PATH.\r
1244 The header subtype of IPv6 device path node is MSG_IPv6_DP.\r
1245 The length of the IPv6 device path node in bytes is 43.\r
1246 Get other information from parameters to make up the whole IPv6 device path node.\r
1247\r
1248 @param[in, out] Node The pointer to the IPv6 device path node.\r
1249 @param[in] Controller The controller handle.\r
1250 @param[in] LocalIp The local IPv6 address.\r
1251 @param[in] LocalPort The local port.\r
1252 @param[in] RemoteIp The remote IPv6 address.\r
1253 @param[in] RemotePort The remote port.\r
1254 @param[in] Protocol The protocol type in the IP header.\r
1255\r
1256**/\r
1257VOID\r
1258EFIAPI\r
1259NetLibCreateIPv6DPathNode (\r
1260 IN OUT IPv6_DEVICE_PATH *Node,\r
1261 IN EFI_HANDLE Controller,\r
1262 IN EFI_IPv6_ADDRESS *LocalIp,\r
1263 IN UINT16 LocalPort,\r
1264 IN EFI_IPv6_ADDRESS *RemoteIp,\r
1265 IN UINT16 RemotePort,\r
1266 IN UINT16 Protocol\r
1267 );\r
1268\r
1269\r
1270/**\r
1271 Find the UNDI/SNP handle from controller and protocol GUID.\r
1272\r
1273 For example, IP will open an MNP child to transmit/receive\r
1274 packets. When MNP is stopped, IP should also be stopped. IP\r
1275 needs to find its own private data that is related the IP's\r
1276 service binding instance that is installed on the UNDI/SNP handle.\r
1277 The controller is then either an MNP or an ARP child handle. Note that\r
1278 IP opens these handles using BY_DRIVER. Use that infomation to get the\r
1279 UNDI/SNP handle.\r
1280\r
1281 @param[in] Controller The protocol handle to check.\r
1282 @param[in] ProtocolGuid The protocol that is related with the handle.\r
1283\r
1284 @return The UNDI/SNP handle or NULL for errors.\r
1285\r
1286**/\r
1287EFI_HANDLE\r
1288EFIAPI\r
1289NetLibGetNicHandle (\r
1290 IN EFI_HANDLE Controller,\r
1291 IN EFI_GUID *ProtocolGuid\r
1292 );\r
1293\r
1294/**\r
1295 This is the default unload handle for all the network drivers.\r
1296\r
1297 Disconnect the driver specified by ImageHandle from all the devices in the handle database.\r
1298 Uninstall all the protocols installed in the driver entry point.\r
1299\r
1300 @param[in] ImageHandle The drivers' driver image.\r
1301\r
1302 @retval EFI_SUCCESS The image is unloaded.\r
1303 @retval Others Failed to unload the image.\r
1304\r
1305**/\r
1306EFI_STATUS\r
1307EFIAPI\r
1308NetLibDefaultUnload (\r
1309 IN EFI_HANDLE ImageHandle\r
1310 );\r
1311\r
1312/**\r
1313 Convert one Null-terminated ASCII string (decimal dotted) to EFI_IPv4_ADDRESS.\r
1314\r
1315 @param[in] String The pointer to the Ascii string.\r
1316 @param[out] Ip4Address The pointer to the converted IPv4 address.\r
1317\r
1318 @retval EFI_SUCCESS Converted to an IPv4 address successfully.\r
1319 @retval EFI_INVALID_PARAMETER The string is malformated, or Ip4Address is NULL.\r
1320\r
1321**/\r
1322EFI_STATUS\r
1323EFIAPI\r
1324NetLibAsciiStrToIp4 (\r
1325 IN CONST CHAR8 *String,\r
1326 OUT EFI_IPv4_ADDRESS *Ip4Address\r
1327 );\r
1328\r
1329/**\r
1330 Convert one Null-terminated ASCII string to EFI_IPv6_ADDRESS. The format of the\r
1331 string is defined in RFC 4291 - Text Pepresentation of Addresses.\r
1332\r
1333 @param[in] String The pointer to the Ascii string.\r
1334 @param[out] Ip6Address The pointer to the converted IPv6 address.\r
1335\r
1336 @retval EFI_SUCCESS Converted to an IPv6 address successfully.\r
1337 @retval EFI_INVALID_PARAMETER The string is malformated, or Ip6Address is NULL.\r
1338\r
1339**/\r
1340EFI_STATUS\r
1341EFIAPI\r
1342NetLibAsciiStrToIp6 (\r
1343 IN CONST CHAR8 *String,\r
1344 OUT EFI_IPv6_ADDRESS *Ip6Address\r
1345 );\r
1346\r
1347/**\r
1348 Convert one Null-terminated Unicode string (decimal dotted) to EFI_IPv4_ADDRESS.\r
1349\r
1350 @param[in] String The pointer to the Ascii string.\r
1351 @param[out] Ip4Address The pointer to the converted IPv4 address.\r
1352\r
1353 @retval EFI_SUCCESS Converted to an IPv4 address successfully.\r
1354 @retval EFI_INVALID_PARAMETER The string is mal-formated or Ip4Address is NULL.\r
1355 @retval EFI_OUT_OF_RESOURCES Failed to perform the operation due to lack of resources.\r
1356\r
1357**/\r
1358EFI_STATUS\r
1359EFIAPI\r
1360NetLibStrToIp4 (\r
1361 IN CONST CHAR16 *String,\r
1362 OUT EFI_IPv4_ADDRESS *Ip4Address\r
1363 );\r
1364\r
1365/**\r
1366 Convert one Null-terminated Unicode string to EFI_IPv6_ADDRESS. The format of\r
1367 the string is defined in RFC 4291 - Text Pepresentation of Addresses.\r
1368\r
1369 @param[in] String The pointer to the Ascii string.\r
1370 @param[out] Ip6Address The pointer to the converted IPv6 address.\r
1371\r
1372 @retval EFI_SUCCESS Converted to an IPv6 address successfully.\r
1373 @retval EFI_INVALID_PARAMETER The string is malformated or Ip6Address is NULL.\r
1374 @retval EFI_OUT_OF_RESOURCES Failed to perform the operation due to a lack of resources.\r
1375\r
1376**/\r
1377EFI_STATUS\r
1378EFIAPI\r
1379NetLibStrToIp6 (\r
1380 IN CONST CHAR16 *String,\r
1381 OUT EFI_IPv6_ADDRESS *Ip6Address\r
1382 );\r
1383\r
1384/**\r
1385 Convert one Null-terminated Unicode string to EFI_IPv6_ADDRESS and prefix length.\r
1386 The format of the string is defined in RFC 4291 - Text Pepresentation of Addresses\r
1387 Prefixes: ipv6-address/prefix-length.\r
1388\r
1389 @param[in] String The pointer to the Ascii string.\r
1390 @param[out] Ip6Address The pointer to the converted IPv6 address.\r
1391 @param[out] PrefixLength The pointer to the converted prefix length.\r
1392\r
1393 @retval EFI_SUCCESS Converted to an IPv6 address successfully.\r
1394 @retval EFI_INVALID_PARAMETER The string is malformated, or Ip6Address is NULL.\r
1395 @retval EFI_OUT_OF_RESOURCES Failed to perform the operation due to a lack of resources.\r
1396\r
1397**/\r
1398EFI_STATUS\r
1399EFIAPI\r
1400NetLibStrToIp6andPrefix (\r
1401 IN CONST CHAR16 *String,\r
1402 OUT EFI_IPv6_ADDRESS *Ip6Address,\r
1403 OUT UINT8 *PrefixLength\r
1404 );\r
1405\r
1406/**\r
1407\r
1408 Convert one EFI_IPv6_ADDRESS to Null-terminated Unicode string.\r
1409 The text representation of address is defined in RFC 4291.\r
1410 \r
1411 @param[in] Ip6Address The pointer to the IPv6 address.\r
1412 @param[out] String The buffer to return the converted string.\r
1413 @param[in] StringSize The length in bytes of the input String.\r
1414 \r
1415 @retval EFI_SUCCESS Convert to string successfully.\r
1416 @retval EFI_INVALID_PARAMETER The input parameter is invalid.\r
1417 @retval EFI_BUFFER_TOO_SMALL The BufferSize is too small for the result. BufferSize has been \r
1418 updated with the size needed to complete the request.\r
1419**/\r
1420EFI_STATUS\r
1421EFIAPI\r
1422NetLibIp6ToStr (\r
1423 IN EFI_IPv6_ADDRESS *Ip6Address,\r
1424 OUT CHAR16 *String,\r
1425 IN UINTN StringSize\r
1426 );\r
1427\r
1428//\r
1429// Various signatures\r
1430//\r
1431#define NET_BUF_SIGNATURE SIGNATURE_32 ('n', 'b', 'u', 'f')\r
1432#define NET_VECTOR_SIGNATURE SIGNATURE_32 ('n', 'v', 'e', 'c')\r
1433#define NET_QUE_SIGNATURE SIGNATURE_32 ('n', 'b', 'q', 'u')\r
1434\r
1435\r
1436#define NET_PROTO_DATA 64 // Opaque buffer for protocols\r
1437#define NET_BUF_HEAD 1 // Trim or allocate space from head\r
1438#define NET_BUF_TAIL 0 // Trim or allocate space from tail\r
1439#define NET_VECTOR_OWN_FIRST 0x01 // We allocated the 1st block in the vector\r
1440\r
1441#define NET_CHECK_SIGNATURE(PData, SIGNATURE) \\r
1442 ASSERT (((PData) != NULL) && ((PData)->Signature == (SIGNATURE)))\r
1443\r
1444//\r
1445// Single memory block in the vector.\r
1446//\r
1447typedef struct {\r
1448 UINT32 Len; // The block's length\r
1449 UINT8 *Bulk; // The block's Data\r
1450} NET_BLOCK;\r
1451\r
1452typedef VOID (EFIAPI *NET_VECTOR_EXT_FREE) (VOID *Arg);\r
1453\r
1454//\r
1455//NET_VECTOR contains several blocks to hold all packet's\r
1456//fragments and other house-keeping stuff for sharing. It\r
1457//doesn't specify the where actual packet fragment begins.\r
1458//\r
1459typedef struct {\r
1460 UINT32 Signature;\r
1461 INTN RefCnt; // Reference count to share NET_VECTOR.\r
1462 NET_VECTOR_EXT_FREE Free; // external function to free NET_VECTOR\r
1463 VOID *Arg; // opeque argument to Free\r
1464 UINT32 Flag; // Flags, NET_VECTOR_OWN_FIRST\r
1465 UINT32 Len; // Total length of the assocated BLOCKs\r
1466\r
1467 UINT32 BlockNum;\r
1468 NET_BLOCK Block[1];\r
1469} NET_VECTOR;\r
1470\r
1471//\r
1472//NET_BLOCK_OP operates on the NET_BLOCK. It specifies\r
1473//where the actual fragment begins and ends\r
1474//\r
1475typedef struct {\r
1476 UINT8 *BlockHead; // Block's head, or the smallest valid Head\r
1477 UINT8 *BlockTail; // Block's tail. BlockTail-BlockHead=block length\r
1478 UINT8 *Head; // 1st byte of the data in the block\r
1479 UINT8 *Tail; // Tail of the data in the block, Tail-Head=Size\r
1480 UINT32 Size; // The size of the data\r
1481} NET_BLOCK_OP;\r
1482\r
1483typedef union {\r
1484 IP4_HEAD *Ip4;\r
1485 EFI_IP6_HEADER *Ip6;\r
1486} NET_IP_HEAD;\r
1487\r
1488//\r
1489//NET_BUF is the buffer manage structure used by the\r
1490//network stack. Every network packet may be fragmented. The Vector points to\r
1491//memory blocks used by each fragment, and BlockOp\r
1492//specifies where each fragment begins and ends.\r
1493//\r
1494//It also contains an opaque area for the protocol to store\r
1495//per-packet information. Protocol must be careful not\r
1496//to overwrite the members after that.\r
1497//\r
1498typedef struct {\r
1499 UINT32 Signature;\r
1500 INTN RefCnt;\r
1501 LIST_ENTRY List; // The List this NET_BUF is on\r
1502\r
1503 NET_IP_HEAD Ip; // Network layer header, for fast access\r
1504 TCP_HEAD *Tcp; // Transport layer header, for fast access\r
1505 EFI_UDP_HEADER *Udp; // User Datagram Protocol header\r
1506 UINT8 ProtoData [NET_PROTO_DATA]; //Protocol specific data\r
1507\r
1508 NET_VECTOR *Vector; // The vector containing the packet\r
1509\r
1510 UINT32 BlockOpNum; // Total number of BlockOp in the buffer\r
1511 UINT32 TotalSize; // Total size of the actual packet\r
1512 NET_BLOCK_OP BlockOp[1]; // Specify the position of actual packet\r
1513} NET_BUF;\r
1514\r
1515//\r
1516//A queue of NET_BUFs. It is a thin extension of\r
1517//NET_BUF functions.\r
1518//\r
1519typedef struct {\r
1520 UINT32 Signature;\r
1521 INTN RefCnt;\r
1522 LIST_ENTRY List; // The List this buffer queue is on\r
1523\r
1524 LIST_ENTRY BufList; // list of queued buffers\r
1525 UINT32 BufSize; // total length of DATA in the buffers\r
1526 UINT32 BufNum; // total number of buffers on the chain\r
1527} NET_BUF_QUEUE;\r
1528\r
1529//\r
1530// Pseudo header for TCP and UDP checksum\r
1531//\r
1532#pragma pack(1)\r
1533typedef struct {\r
1534 IP4_ADDR SrcIp;\r
1535 IP4_ADDR DstIp;\r
1536 UINT8 Reserved;\r
1537 UINT8 Protocol;\r
1538 UINT16 Len;\r
1539} NET_PSEUDO_HDR;\r
1540\r
1541typedef struct {\r
1542 EFI_IPv6_ADDRESS SrcIp;\r
1543 EFI_IPv6_ADDRESS DstIp;\r
1544 UINT32 Len;\r
1545 UINT32 Reserved:24;\r
1546 UINT32 NextHeader:8;\r
1547} NET_IP6_PSEUDO_HDR;\r
1548#pragma pack()\r
1549\r
1550//\r
1551// The fragment entry table used in network interfaces. This is\r
1552// the same as NET_BLOCK now. Use two different to distinguish\r
1553// the two in case that NET_BLOCK be enhanced later.\r
1554//\r
1555typedef struct {\r
1556 UINT32 Len;\r
1557 UINT8 *Bulk;\r
1558} NET_FRAGMENT;\r
1559\r
1560#define NET_GET_REF(PData) ((PData)->RefCnt++)\r
1561#define NET_PUT_REF(PData) ((PData)->RefCnt--)\r
1562#define NETBUF_FROM_PROTODATA(Info) BASE_CR((Info), NET_BUF, ProtoData)\r
1563\r
1564#define NET_BUF_SHARED(Buf) \\r
1565 (((Buf)->RefCnt > 1) || ((Buf)->Vector->RefCnt > 1))\r
1566\r
1567#define NET_VECTOR_SIZE(BlockNum) \\r
1568 (sizeof (NET_VECTOR) + ((BlockNum) - 1) * sizeof (NET_BLOCK))\r
1569\r
1570#define NET_BUF_SIZE(BlockOpNum) \\r
1571 (sizeof (NET_BUF) + ((BlockOpNum) - 1) * sizeof (NET_BLOCK_OP))\r
1572\r
1573#define NET_HEADSPACE(BlockOp) \\r
1574 (UINTN)((BlockOp)->Head - (BlockOp)->BlockHead)\r
1575\r
1576#define NET_TAILSPACE(BlockOp) \\r
1577 (UINTN)((BlockOp)->BlockTail - (BlockOp)->Tail)\r
1578\r
1579/**\r
1580 Allocate a single block NET_BUF. Upon allocation, all the\r
1581 free space is in the tail room.\r
1582\r
1583 @param[in] Len The length of the block.\r
1584\r
1585 @return The pointer to the allocated NET_BUF, or NULL if the\r
1586 allocation failed due to resource limitations.\r
1587\r
1588**/\r
1589NET_BUF *\r
1590EFIAPI\r
1591NetbufAlloc (\r
1592 IN UINT32 Len\r
1593 );\r
1594\r
1595/**\r
1596 Free the net buffer and its associated NET_VECTOR.\r
1597\r
1598 Decrease the reference count of the net buffer by one. Free the associated net\r
1599 vector and itself if the reference count of the net buffer is decreased to 0.\r
1600 The net vector free operation decreases the reference count of the net\r
1601 vector by one, and performs the resource free operation when the reference count\r
1602 of the net vector is 0.\r
1603\r
1604 @param[in] Nbuf The pointer to the NET_BUF to be freed.\r
1605\r
1606**/\r
1607VOID\r
1608EFIAPI\r
1609NetbufFree (\r
1610 IN NET_BUF *Nbuf\r
1611 );\r
1612\r
1613/**\r
1614 Get the index of NET_BLOCK_OP that contains the byte at Offset in the net\r
1615 buffer.\r
1616\r
1617 For example, this function can be used to retrieve the IP header in the packet. It\r
1618 also can be used to get the fragment that contains the byte used\r
1619 mainly by the library implementation itself.\r
1620\r
1621 @param[in] Nbuf The pointer to the net buffer.\r
1622 @param[in] Offset The offset of the byte.\r
1623 @param[out] Index Index of the NET_BLOCK_OP that contains the byte at\r
1624 Offset.\r
1625\r
1626 @return The pointer to the Offset'th byte of data in the net buffer, or NULL\r
1627 if there is no such data in the net buffer.\r
1628\r
1629**/\r
1630UINT8 *\r
1631EFIAPI\r
1632NetbufGetByte (\r
1633 IN NET_BUF *Nbuf,\r
1634 IN UINT32 Offset,\r
1635 OUT UINT32 *Index OPTIONAL\r
1636 );\r
1637\r
1638/**\r
1639 Create a copy of the net buffer that shares the associated net vector.\r
1640\r
1641 The reference count of the newly created net buffer is set to 1. The reference\r
1642 count of the associated net vector is increased by one.\r
1643\r
1644 @param[in] Nbuf The pointer to the net buffer to be cloned.\r
1645\r
1646 @return The pointer to the cloned net buffer, or NULL if the\r
1647 allocation failed due to resource limitations.\r
1648\r
1649**/\r
1650NET_BUF *\r
1651EFIAPI\r
1652NetbufClone (\r
1653 IN NET_BUF *Nbuf\r
1654 );\r
1655\r
1656/**\r
1657 Create a duplicated copy of the net buffer with data copied and HeadSpace\r
1658 bytes of head space reserved.\r
1659\r
1660 The duplicated net buffer will allocate its own memory to hold the data of the\r
1661 source net buffer.\r
1662\r
1663 @param[in] Nbuf The pointer to the net buffer to be duplicated from.\r
1664 @param[in, out] Duplicate The pointer to the net buffer to duplicate to. If\r
1665 NULL, a new net buffer is allocated.\r
1666 @param[in] HeadSpace The length of the head space to reserve.\r
1667\r
1668 @return The pointer to the duplicated net buffer, or NULL if\r
1669 the allocation failed due to resource limitations.\r
1670\r
1671**/\r
1672NET_BUF *\r
1673EFIAPI\r
1674NetbufDuplicate (\r
1675 IN NET_BUF *Nbuf,\r
1676 IN OUT NET_BUF *Duplicate OPTIONAL,\r
1677 IN UINT32 HeadSpace\r
1678 );\r
1679\r
1680/**\r
1681 Create a NET_BUF structure which contains Len byte data of Nbuf starting from\r
1682 Offset.\r
1683\r
1684 A new NET_BUF structure will be created but the associated data in NET_VECTOR\r
1685 is shared. This function exists to perform IP packet fragmentation.\r
1686\r
1687 @param[in] Nbuf The pointer to the net buffer to be extracted.\r
1688 @param[in] Offset Starting point of the data to be included in the new\r
1689 net buffer.\r
1690 @param[in] Len The bytes of data to be included in the new net buffer.\r
1691 @param[in] HeadSpace The bytes of the head space to reserve for the protocol header.\r
1692\r
1693 @return The pointer to the cloned net buffer, or NULL if the\r
1694 allocation failed due to resource limitations.\r
1695\r
1696**/\r
1697NET_BUF *\r
1698EFIAPI\r
1699NetbufGetFragment (\r
1700 IN NET_BUF *Nbuf,\r
1701 IN UINT32 Offset,\r
1702 IN UINT32 Len,\r
1703 IN UINT32 HeadSpace\r
1704 );\r
1705\r
1706/**\r
1707 Reserve some space in the header room of the net buffer.\r
1708\r
1709 Upon allocation, all the space is in the tail room of the buffer. Call this\r
1710 function to move space to the header room. This function is quite limited\r
1711 in that it can only reserve space from the first block of an empty NET_BUF not\r
1712 built from the external. However, it should be enough for the network stack.\r
1713\r
1714 @param[in, out] Nbuf The pointer to the net buffer.\r
1715 @param[in] Len The length of buffer to be reserved from the header.\r
1716\r
1717**/\r
1718VOID\r
1719EFIAPI\r
1720NetbufReserve (\r
1721 IN OUT NET_BUF *Nbuf,\r
1722 IN UINT32 Len\r
1723 );\r
1724\r
1725/**\r
1726 Allocate Len bytes of space from the header or tail of the buffer.\r
1727\r
1728 @param[in, out] Nbuf The pointer to the net buffer.\r
1729 @param[in] Len The length of the buffer to be allocated.\r
1730 @param[in] FromHead The flag to indicate whether to reserve the data\r
1731 from head (TRUE) or tail (FALSE).\r
1732\r
1733 @return The pointer to the first byte of the allocated buffer,\r
1734 or NULL, if there is no sufficient space.\r
1735\r
1736**/\r
1737UINT8*\r
1738EFIAPI\r
1739NetbufAllocSpace (\r
1740 IN OUT NET_BUF *Nbuf,\r
1741 IN UINT32 Len,\r
1742 IN BOOLEAN FromHead\r
1743 );\r
1744\r
1745/**\r
1746 Trim Len bytes from the header or the tail of the net buffer.\r
1747\r
1748 @param[in, out] Nbuf The pointer to the net buffer.\r
1749 @param[in] Len The length of the data to be trimmed.\r
1750 @param[in] FromHead The flag to indicate whether trim data is from the \r
1751 head (TRUE) or the tail (FALSE).\r
1752\r
1753 @return The length of the actual trimmed data, which may be less\r
1754 than Len if the TotalSize of Nbuf is less than Len.\r
1755\r
1756**/\r
1757UINT32\r
1758EFIAPI\r
1759NetbufTrim (\r
1760 IN OUT NET_BUF *Nbuf,\r
1761 IN UINT32 Len,\r
1762 IN BOOLEAN FromHead\r
1763 );\r
1764\r
1765/**\r
1766 Copy Len bytes of data from the specific offset of the net buffer to the\r
1767 destination memory.\r
1768\r
1769 The Len bytes of data may cross several fragments of the net buffer.\r
1770\r
1771 @param[in] Nbuf The pointer to the net buffer.\r
1772 @param[in] Offset The sequence number of the first byte to copy.\r
1773 @param[in] Len The length of the data to copy.\r
1774 @param[in] Dest The destination of the data to copy to.\r
1775\r
1776 @return The length of the actual copied data, or 0 if the offset\r
1777 specified exceeds the total size of net buffer.\r
1778\r
1779**/\r
1780UINT32\r
1781EFIAPI\r
1782NetbufCopy (\r
1783 IN NET_BUF *Nbuf,\r
1784 IN UINT32 Offset,\r
1785 IN UINT32 Len,\r
1786 IN UINT8 *Dest\r
1787 );\r
1788\r
1789/**\r
1790 Build a NET_BUF from external blocks.\r
1791\r
1792 A new NET_BUF structure will be created from external blocks. An additional block\r
1793 of memory will be allocated to hold reserved HeadSpace bytes of header room\r
1794 and existing HeadLen bytes of header, but the external blocks are shared by the\r
1795 net buffer to avoid data copying.\r
1796\r
1797 @param[in] ExtFragment The pointer to the data block.\r
1798 @param[in] ExtNum The number of the data blocks.\r
1799 @param[in] HeadSpace The head space to be reserved.\r
1800 @param[in] HeadLen The length of the protocol header. The function\r
1801 pulls this amount of data into a linear block.\r
1802 @param[in] ExtFree The pointer to the caller-provided free function.\r
1803 @param[in] Arg The argument passed to ExtFree when ExtFree is\r
1804 called.\r
1805\r
1806 @return The pointer to the net buffer built from the data blocks,\r
1807 or NULL if the allocation failed due to resource\r
1808 limit.\r
1809\r
1810**/\r
1811NET_BUF *\r
1812EFIAPI\r
1813NetbufFromExt (\r
1814 IN NET_FRAGMENT *ExtFragment,\r
1815 IN UINT32 ExtNum,\r
1816 IN UINT32 HeadSpace,\r
1817 IN UINT32 HeadLen,\r
1818 IN NET_VECTOR_EXT_FREE ExtFree,\r
1819 IN VOID *Arg OPTIONAL\r
1820 );\r
1821\r
1822/**\r
1823 Build a fragment table to contain the fragments in the net buffer. This is the\r
1824 opposite operation of the NetbufFromExt.\r
1825\r
1826 @param[in] Nbuf Points to the net buffer.\r
1827 @param[in, out] ExtFragment The pointer to the data block.\r
1828 @param[in, out] ExtNum The number of the data blocks.\r
1829\r
1830 @retval EFI_BUFFER_TOO_SMALL The number of non-empty blocks is bigger than\r
1831 ExtNum.\r
1832 @retval EFI_SUCCESS The fragment table was built successfully.\r
1833\r
1834**/\r
1835EFI_STATUS\r
1836EFIAPI\r
1837NetbufBuildExt (\r
1838 IN NET_BUF *Nbuf,\r
1839 IN OUT NET_FRAGMENT *ExtFragment,\r
1840 IN OUT UINT32 *ExtNum\r
1841 );\r
1842\r
1843/**\r
1844 Build a net buffer from a list of net buffers.\r
1845\r
1846 All the fragments will be collected from the list of NEW_BUF, and then a new\r
1847 net buffer will be created through NetbufFromExt.\r
1848\r
1849 @param[in] BufList A List of the net buffer.\r
1850 @param[in] HeadSpace The head space to be reserved.\r
1851 @param[in] HeaderLen The length of the protocol header. The function\r
1852 pulls this amount of data into a linear block.\r
1853 @param[in] ExtFree The pointer to the caller provided free function.\r
1854 @param[in] Arg The argument passed to ExtFree when ExtFree is called.\r
1855\r
1856 @return The pointer to the net buffer built from the list of net\r
1857 buffers.\r
1858\r
1859**/\r
1860NET_BUF *\r
1861EFIAPI\r
1862NetbufFromBufList (\r
1863 IN LIST_ENTRY *BufList,\r
1864 IN UINT32 HeadSpace,\r
1865 IN UINT32 HeaderLen,\r
1866 IN NET_VECTOR_EXT_FREE ExtFree,\r
1867 IN VOID *Arg OPTIONAL\r
1868 );\r
1869\r
1870/**\r
1871 Free a list of net buffers.\r
1872\r
1873 @param[in, out] Head The pointer to the head of linked net buffers.\r
1874\r
1875**/\r
1876VOID\r
1877EFIAPI\r
1878NetbufFreeList (\r
1879 IN OUT LIST_ENTRY *Head\r
1880 );\r
1881\r
1882/**\r
1883 Initiate the net buffer queue.\r
1884\r
1885 @param[in, out] NbufQue The pointer to the net buffer queue to be initialized.\r
1886\r
1887**/\r
1888VOID\r
1889EFIAPI\r
1890NetbufQueInit (\r
1891 IN OUT NET_BUF_QUEUE *NbufQue\r
1892 );\r
1893\r
1894/**\r
1895 Allocate and initialize a net buffer queue.\r
1896\r
1897 @return The pointer to the allocated net buffer queue, or NULL if the\r
1898 allocation failed due to resource limit.\r
1899\r
1900**/\r
1901NET_BUF_QUEUE *\r
1902EFIAPI\r
1903NetbufQueAlloc (\r
1904 VOID\r
1905 );\r
1906\r
1907/**\r
1908 Free a net buffer queue.\r
1909\r
1910 Decrease the reference count of the net buffer queue by one. The real resource\r
1911 free operation isn't performed until the reference count of the net buffer\r
1912 queue is decreased to 0.\r
1913\r
1914 @param[in] NbufQue The pointer to the net buffer queue to be freed.\r
1915\r
1916**/\r
1917VOID\r
1918EFIAPI\r
1919NetbufQueFree (\r
1920 IN NET_BUF_QUEUE *NbufQue\r
1921 );\r
1922\r
1923/**\r
1924 Remove a net buffer from the head in the specific queue and return it.\r
1925\r
1926 @param[in, out] NbufQue The pointer to the net buffer queue.\r
1927\r
1928 @return The pointer to the net buffer removed from the specific queue,\r
1929 or NULL if there is no net buffer in the specific queue.\r
1930\r
1931**/\r
1932NET_BUF *\r
1933EFIAPI\r
1934NetbufQueRemove (\r
1935 IN OUT NET_BUF_QUEUE *NbufQue\r
1936 );\r
1937\r
1938/**\r
1939 Append a net buffer to the net buffer queue.\r
1940\r
1941 @param[in, out] NbufQue The pointer to the net buffer queue.\r
1942 @param[in, out] Nbuf The pointer to the net buffer to be appended.\r
1943\r
1944**/\r
1945VOID\r
1946EFIAPI\r
1947NetbufQueAppend (\r
1948 IN OUT NET_BUF_QUEUE *NbufQue,\r
1949 IN OUT NET_BUF *Nbuf\r
1950 );\r
1951\r
1952/**\r
1953 Copy Len bytes of data from the net buffer queue at the specific offset to the\r
1954 destination memory.\r
1955\r
1956 The copying operation is the same as NetbufCopy, but applies to the net buffer\r
1957 queue instead of the net buffer.\r
1958\r
1959 @param[in] NbufQue The pointer to the net buffer queue.\r
1960 @param[in] Offset The sequence number of the first byte to copy.\r
1961 @param[in] Len The length of the data to copy.\r
1962 @param[out] Dest The destination of the data to copy to.\r
1963\r
1964 @return The length of the actual copied data, or 0 if the offset\r
1965 specified exceeds the total size of net buffer queue.\r
1966\r
1967**/\r
1968UINT32\r
1969EFIAPI\r
1970NetbufQueCopy (\r
1971 IN NET_BUF_QUEUE *NbufQue,\r
1972 IN UINT32 Offset,\r
1973 IN UINT32 Len,\r
1974 OUT UINT8 *Dest\r
1975 );\r
1976\r
1977/**\r
1978 Trim Len bytes of data from the buffer queue and free any net buffer\r
1979 that is completely trimmed.\r
1980\r
1981 The trimming operation is the same as NetbufTrim but applies to the net buffer\r
1982 queue instead of the net buffer.\r
1983\r
1984 @param[in, out] NbufQue The pointer to the net buffer queue.\r
1985 @param[in] Len The length of the data to trim.\r
1986\r
1987 @return The actual length of the data trimmed.\r
1988\r
1989**/\r
1990UINT32\r
1991EFIAPI\r
1992NetbufQueTrim (\r
1993 IN OUT NET_BUF_QUEUE *NbufQue,\r
1994 IN UINT32 Len\r
1995 );\r
1996\r
1997\r
1998/**\r
1999 Flush the net buffer queue.\r
2000\r
2001 @param[in, out] NbufQue The pointer to the queue to be flushed.\r
2002\r
2003**/\r
2004VOID\r
2005EFIAPI\r
2006NetbufQueFlush (\r
2007 IN OUT NET_BUF_QUEUE *NbufQue\r
2008 );\r
2009\r
2010/**\r
2011 Compute the checksum for a bulk of data.\r
2012\r
2013 @param[in] Bulk The pointer to the data.\r
2014 @param[in] Len The length of the data, in bytes.\r
2015\r
2016 @return The computed checksum.\r
2017\r
2018**/\r
2019UINT16\r
2020EFIAPI\r
2021NetblockChecksum (\r
2022 IN UINT8 *Bulk,\r
2023 IN UINT32 Len\r
2024 );\r
2025\r
2026/**\r
2027 Add two checksums.\r
2028\r
2029 @param[in] Checksum1 The first checksum to be added.\r
2030 @param[in] Checksum2 The second checksum to be added.\r
2031\r
2032 @return The new checksum.\r
2033\r
2034**/\r
2035UINT16\r
2036EFIAPI\r
2037NetAddChecksum (\r
2038 IN UINT16 Checksum1,\r
2039 IN UINT16 Checksum2\r
2040 );\r
2041\r
2042/**\r
2043 Compute the checksum for a NET_BUF.\r
2044\r
2045 @param[in] Nbuf The pointer to the net buffer.\r
2046\r
2047 @return The computed checksum.\r
2048\r
2049**/\r
2050UINT16\r
2051EFIAPI\r
2052NetbufChecksum (\r
2053 IN NET_BUF *Nbuf\r
2054 );\r
2055\r
2056/**\r
2057 Compute the checksum for TCP/UDP pseudo header.\r
2058\r
2059 Src and Dst are in network byte order, and Len is in host byte order.\r
2060\r
2061 @param[in] Src The source address of the packet.\r
2062 @param[in] Dst The destination address of the packet.\r
2063 @param[in] Proto The protocol type of the packet.\r
2064 @param[in] Len The length of the packet.\r
2065\r
2066 @return The computed checksum.\r
2067\r
2068**/\r
2069UINT16\r
2070EFIAPI\r
2071NetPseudoHeadChecksum (\r
2072 IN IP4_ADDR Src,\r
2073 IN IP4_ADDR Dst,\r
2074 IN UINT8 Proto,\r
2075 IN UINT16 Len\r
2076 );\r
2077\r
2078/**\r
2079 Compute the checksum for the TCP6/UDP6 pseudo header.\r
2080\r
2081 Src and Dst are in network byte order, and Len is in host byte order.\r
2082\r
2083 @param[in] Src The source address of the packet.\r
2084 @param[in] Dst The destination address of the packet.\r
2085 @param[in] NextHeader The protocol type of the packet.\r
2086 @param[in] Len The length of the packet.\r
2087\r
2088 @return The computed checksum.\r
2089\r
2090**/\r
2091UINT16\r
2092EFIAPI\r
2093NetIp6PseudoHeadChecksum (\r
2094 IN EFI_IPv6_ADDRESS *Src,\r
2095 IN EFI_IPv6_ADDRESS *Dst,\r
2096 IN UINT8 NextHeader,\r
2097 IN UINT32 Len\r
2098 );\r
2099\r
2100/**\r
2101 The function frees the net buffer which allocated by the IP protocol. It releases \r
2102 only the net buffer and doesn't call the external free function. \r
2103\r
2104 This function should be called after finishing the process of mIpSec->ProcessExt() \r
2105 for outbound traffic. The (EFI_IPSEC2_PROTOCOL)->ProcessExt() allocates a new \r
2106 buffer for the ESP, so there needs a function to free the old net buffer.\r
2107\r
2108 @param[in] Nbuf The network buffer to be freed.\r
2109\r
2110**/\r
2111VOID\r
2112NetIpSecNetbufFree (\r
2113 NET_BUF *Nbuf\r
2114 );\r
2115\r
2116/**\r
2117 This function obtains the system guid from the smbios table.\r
2118\r
2119 @param[out] SystemGuid The pointer of the returned system guid.\r
2120\r
2121 @retval EFI_SUCCESS Successfully obtained the system guid.\r
2122 @retval EFI_NOT_FOUND Did not find the SMBIOS table.\r
2123\r
2124**/\r
2125EFI_STATUS\r
2126EFIAPI\r
2127NetLibGetSystemGuid (\r
2128 OUT EFI_GUID *SystemGuid\r
2129 );\r
2130\r
2131#endif\r