Data Fields
nwalTxPktInfo_t Struct Reference

NWAL Packet meta data information for outgoing packet. More...

#include <nwal.h>

Data Fields

Ti_Pkt * pPkt
nwal_txFlag1_t txFlag1
nwal_enetPort_t enetPort
uint32_t startOffset
uint16_t saOffBytes
uint16_t saPayloadLen
uint16_t saAhIcvOffBytes
uint16_t saAhMacSize
uint16_t etherLenOffBytes
uint16_t ipOffBytes
uint16_t l4OffBytes
uint16_t l4HdrLen
uint16_t pseudoHdrChecksum
uint16_t ploadLen

Detailed Description

NWAL Packet meta data information for outgoing packet.

The parameters in this structure are used to provide additional details for the outgoing packet. In the case of NWAL updating the packet header structure content will be modified internally within NWAL to reflect correct offset of the packet headers


Field Documentation

nwal_enetPort_t nwalTxPktInfo_t::enetPort

Loopback the packet at NetCP PASS. Useful for debugging any classification action at NetCP TX Enet Port 1 based.Eg: For transmitting through first port configure as 1

See also:
nwal_enetPort_t Configuring to NWAL_ENET_PORT_UNKNOWN will let CPSW decide on outgoing port. In case of application invoking nwal_initPSCmdInfo API it would need to either select a port or or configure to NWAL_ENET_PORT_UNKNOWN. Switching between types during packet TX is not supported

Byte offset for updating Ethernet Length in the case of 802.3 header Length field is assumed to be of 2 octet length by NWAL. The update will be done along with fragmentation by NetCP.In the case of tunnel packet only outer IP fragmentation is supported through NetCP

Offset in bytes indicating start for inner most IP header. Would be required for packet with only one level IP header. The configuration will be used for IP header checksum offload to hardware

Length of L4 TCP/UDP Header

Offset in bytes indicating start of UDP/TCP Header for checksum computation

Length of L4 payload

Packet to be transmitted through NetCP: PA/SA/EMAC

Pseudo Header checksum for L4

Offset to the ICV field in the case of IPSec AH mode for authentication tag insertion by NETCP.Reset to zero in the case of ESP mode

Size of the authentication tag to be inserted by NetCP in the case of IPSec AH mode. Reset to zero in the case of ESP mode Max size: NWAL_IPSEC_AH_MAX_AUTH_TAG_BYTES

Offset from base of the packet to the header of protocol per the following list: IPSEC ESP with AH: IP header IPSEC ESP: ESP Header

Length of the payload starting from saOffBytes to the end of the protocol

Maximum MTU size for the IP fragmentation functionality at NetCP. In the case of tunnel IP outer IP only will be fragmented Configuring NULL will disable the fragmentation at NetCP Start Offset for the packet

nwal_txFlag1_t nwalTxPktInfo_t::txFlag1

NetCP completed actions

See also:
nwal_txFlag1_t

The documentation for this struct was generated from the following file:

Copyright 2014, Texas Instruments Incorporated