![]() |
![]() |
NWAL Packet meta data information for outgoing packet. More...
#include <nwal.h>
Data Fields | |
Ti_Pkt * | pPkt |
nwal_txFlag1_t | txFlag1 |
nwal_enetPort_t | enetPort |
uint32_t | startOffset |
uint16_t | saOffBytes |
uint16_t | saPayloadLen |
uint16_t | saAhIcvOffBytes |
uint16_t | saAhMacSize |
uint16_t | etherLenOffBytes |
uint16_t | ipOffBytes |
uint16_t | l4OffBytes |
uint16_t | l4HdrLen |
uint16_t | pseudoHdrChecksum |
uint16_t | ploadLen |
NWAL Packet meta data information for outgoing packet.
The parameters in this structure are used to provide additional details for the outgoing packet. In the case of NWAL updating the packet header structure content will be modified internally within NWAL to reflect correct offset of the packet headers
nwal_enetPort_t nwalTxPktInfo_t::enetPort |
Loopback the packet at NetCP PASS. Useful for debugging any classification action at NetCP TX Enet Port 1 based.Eg: For transmitting through first port configure as 1
uint16_t nwalTxPktInfo_t::etherLenOffBytes |
Byte offset for updating Ethernet Length in the case of 802.3 header Length field is assumed to be of 2 octet length by NWAL. The update will be done along with fragmentation by NetCP.In the case of tunnel packet only outer IP fragmentation is supported through NetCP
uint16_t nwalTxPktInfo_t::ipOffBytes |
Offset in bytes indicating start for inner most IP header. Would be required for packet with only one level IP header. The configuration will be used for IP header checksum offload to hardware
uint16_t nwalTxPktInfo_t::l4HdrLen |
Length of L4 TCP/UDP Header
uint16_t nwalTxPktInfo_t::l4OffBytes |
Offset in bytes indicating start of UDP/TCP Header for checksum computation
uint16_t nwalTxPktInfo_t::ploadLen |
Length of L4 payload
Ti_Pkt* nwalTxPktInfo_t::pPkt |
Packet to be transmitted through NetCP: PA/SA/EMAC
uint16_t nwalTxPktInfo_t::pseudoHdrChecksum |
Pseudo Header checksum for L4
uint16_t nwalTxPktInfo_t::saAhIcvOffBytes |
Offset to the ICV field in the case of IPSec AH mode for authentication tag insertion by NETCP.Reset to zero in the case of ESP mode
uint16_t nwalTxPktInfo_t::saAhMacSize |
Size of the authentication tag to be inserted by NetCP in the case of IPSec AH mode. Reset to zero in the case of ESP mode Max size: NWAL_IPSEC_AH_MAX_AUTH_TAG_BYTES
uint16_t nwalTxPktInfo_t::saOffBytes |
Offset from base of the packet to the header of protocol per the following list: IPSEC ESP with AH: IP header IPSEC ESP: ESP Header
uint16_t nwalTxPktInfo_t::saPayloadLen |
Length of the payload starting from saOffBytes to the end of the protocol
uint32_t nwalTxPktInfo_t::startOffset |
Maximum MTU size for the IP fragmentation functionality at NetCP. In the case of tunnel IP outer IP only will be fragmented Configuring NULL will disable the fragmentation at NetCP Start Offset for the packet
nwal_txFlag1_t nwalTxPktInfo_t::txFlag1 |
NetCP completed actions