Searched refs:Pad (Results 1 - 18 of 18) sorted by relevance

/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Application/IpsecConfig/
H A DIndexer.h38 PAD_ENTRY_INDEXER Pad; member in union:__anon12467
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Bus/Usb/UsbMassStorageDxe/
H A DUsbMassBoot.h103 UINT8 Pad[6]; member in struct:__anon10888
121 UINT8 Pad[2]; member in struct:__anon10890
133 UINT8 Pad[6]; member in struct:__anon10892
144 UINT8 Pad[2]; member in struct:__anon10893
162 UINT8 Pad[2]; member in struct:__anon10895
172 UINT8 Pad[2]; member in struct:__anon10896
181 UINT8 Pad[6]; member in struct:__anon10897
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/Ikev2/
H A DExchange.c82 IkeSaSession->Pad = PadEntry;
118 Handler = mIkev2Initial[IkeSaSession->Pad->Data->AuthMethod][SessionCommon->State];
445 IkeSaSession->Pad = PadEntry;
505 Handler = mIkev2Initial[IkeSaSession->Pad->Data->AuthMethod][IkeSaCommon->State];
535 Handler = mIkev2Initial[IkeSaSession->Pad->Data->AuthMethod][IkeSaCommon->State];
H A DIkev2.h176 IPSEC_PAD_ENTRY *Pad; member in struct:__anon12530
H A DSa.c1004 ChildSaSession->IkeSaSession->Pad->Data->AuthData,
1005 ChildSaSession->IkeSaSession->Pad->Data->AuthDataSize
1015 ChildSaSession->IkeSaSession->Pad->Data->AuthData,
1016 ChildSaSession->IkeSaSession->Pad->Data->AuthDataSize
1481 IPSEC_PAD_ENTRY *Pad; local
1506 Pad = IkeSaSession->Pad;
H A DPayload.c22 // The Constant String of "Key Pad for IKEv2" for Authentication Payload generation.
381 // Auth = Prf(Prf(Secret,"Key Pad for IKEv2),IKE_SA_INIi/r|Ni/r|Prf(SK_Pr, IDi/r))
410 // Calcualte Prf(Seceret, "Key Pad for IKEv2");
417 IkeSaSession->Pad->Data->AuthData,
418 IkeSaSession->Pad->Data->AuthDataSize,
523 if (IkeSaSession->Pad->Data->AuthMethod == EfiIPsecAuthMethodPreSharedSecret) {
787 if (IkeSaSession->Pad->Data->AuthMethod == EfiIPsecAuthMethodCertificates) {
/vbox/src/VBox/Devices/Graphics/shaderlib/wine/include/
H A Dwindns.h282 WORD Pad; member in struct:__anon13944
289 WORD Pad; member in struct:__anon13945
357 WORD Pad; member in struct:__anon13953
371 WORD Pad; member in struct:__anon13954
409 WORD Pad; member in struct:__anon13958
418 WORD Pad; member in struct:__anon13959
H A Drpcndr.h208 unsigned char Pad; member in struct:_MIDL_STUB_MESSAGE
388 short Pad; member in struct:_MIDL_FORMAT_STRING
/vbox/src/VBox/Additions/WINNT/Graphics/Wine/include/
H A Dwindns.h282 WORD Pad; member in struct:__anon1289
289 WORD Pad; member in struct:__anon1290
357 WORD Pad; member in struct:__anon1298
371 WORD Pad; member in struct:__anon1299
409 WORD Pad; member in struct:__anon1303
418 WORD Pad; member in struct:__anon1304
H A Drpcndr.h193 unsigned char Pad; member in struct:_MIDL_STUB_MESSAGE
373 short Pad; member in struct:_MIDL_FORMAT_STRING
/vbox/src/VBox/Devices/EFI/Firmware/IntelFrameworkModulePkg/Csm/BiosThunk/BlockIoDxe/
H A DEdd.h187 UINT16 Pad; member in struct:__anon10368
/vbox/src/VBox/Devices/EFI/Firmware/IntelFrameworkModulePkg/Csm/BiosThunk/VideoDxe/
H A DVesaBiosExtensions.h228 UINT8 OemData[256]; // Data area for OEM strings. Pad to 512 byte block size
349 UINT8 Pad[190]; // Pad to 256 byte block size member in struct:__anon10417
432 UINT8 Reserved[40]; // Pad
/vbox/src/VBox/ValidationKit/bootsectors/
H A Dbootsector2-boot-registers-1.asm72 ; Pad the image so it loads cleanly.
/vbox/src/VBox/Devices/EFI/Firmware/BaseTools/Source/C/Include/Protocol/
H A DHiiFramework.h228 UINT8 Pad[3]; member in struct:__anon10222
/vbox/src/VBox/Devices/EFI/Firmware/BaseTools/Source/C/Include/Common/
H A DUefiInternalFormRepresentation.h126 UINT8 Pad[3]; member in struct:__anon10061
/vbox/src/VBox/Devices/PC/ipxe/src/include/ipxe/efi/Uefi/
H A DUefiInternalFormRepresentation.h148 /// sizeof (EFI_NARROW_GLYPH). The contents of Pad must
151 UINT8 Pad[3]; member in struct:__anon15679
/vbox/src/VBox/Devices/EFI/Firmware/MdePkg/Include/Uefi/
H A DUefiInternalFormRepresentation.h146 /// sizeof (EFI_NARROW_GLYPH). The contents of Pad must
149 UINT8 Pad[3]; member in struct:__anon12403
/vbox/src/VBox/Additions/common/VBoxGuest/
H A DVBoxGuestA-os2.asm1671 ; Pad the data packet.

Completed in 159 milliseconds