Searched refs:Payload (Results 1 - 9 of 9) sorted by relevance

/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Ip6Dxe/
H A DIp6Input.c731 @param[out] Payload The pointer to the payload of the recieved packet.
749 OUT UINT8 **Payload,
858 *Payload = AllocatePool ((UINTN) PayloadLen);
859 if (*Payload == NULL) {
863 NetbufCopy (*Packet, sizeof (EFI_IP6_HEADER), PayloadLen, *Payload);
870 *Payload,
937 if (*Payload != NULL) {
938 FreePool (*Payload);
941 *Payload = AllocatePool ((UINTN) PayloadLen);
942 if (*Payload
745 Ip6PreProcessPacket( IN IP6_SERVICE *IpSb, IN OUT NET_BUF **Packet, IN UINT32 Flag, OUT UINT8 **Payload, OUT UINT8 **LastHead, OUT UINT32 *ExtHdrsLen, OUT UINT32 *UnFragmentLen, OUT BOOLEAN *Fragmented, OUT EFI_IP6_HEADER **Head ) argument
996 UINT8 *Payload; local
[all...]
/vbox/tools/darwin.x86/bin/
H A Dxcode-4.1-extrator.sh134 if ! mv -f "${MY_TMP_DIR}/x/InstallXcodeLion.pkg/Payload" "${MY_TMP_DIR}/x/MainPayload.tar"; then
164 rm -f -- "${MY_TMP_DIR}/x/Payload";
166 if ! xar -xvf "${MY_TMP_DIR}/x/${i}" -C "${MY_TMP_DIR}/x" Payload; then
170 if ! tar xvf "${MY_TMP_DIR}/x/Payload" -C "${MY_DST_DIR}"; then
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/
H A DIpSecImpl.c222 @param[in] IpPayload Point to IP Payload to be check.
420 @param[in] IpPayload The IP Payload to be sent out.
983 // RFC2402, Payload length is specified in 32-bit words, minus "2".
1393 NET_BUF *Payload; local
1413 Payload = NULL;
1423 Payload = NetbufFromExt (
1431 if (Payload == NULL) {
1439 EspSize = Payload->TotalSize;
1440 EspHeader = (EFI_ESP_HEADER *) NetbufGetByte (Payload, 0, NULL);
1487 NetbufCopy (Payload,
[all...]
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/RuntimeDxe/
H A DAuthService.c883 UINT8 *Payload; local
923 Payload = (UINT8 *) Data + AUTHINFO2_SIZE (Data);
926 Status = CheckSignatureListFormat(VariableName, VendorGuid, Payload, PayloadSize);
934 Payload,
989 UINT8 *Payload; local
1020 Payload = (UINT8 *) Data + AUTHINFO2_SIZE (Data);
1026 Payload,
/vbox/src/VBox/Devices/EFI/Firmware/CryptoPkg/Application/Cryptest/
H A DRsaVerify2.c191 // Payload for PKCS#7 Signing & Verification Validation.
193 GLOBAL_REMOVE_IF_UNREFERENCED CONST CHAR8 *Payload = "Payload Data for PKCS#7 Signing"; variable
348 // Create PKCS#7 signedData on Payload.
355 (UINT8 *) Payload,
356 AsciiStrLen (Payload),
376 (UINT8 *) Payload,
377 AsciiStrLen (Payload)
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/
H A DSecureBootConfigImpl.c137 UINT8 *Payload; local
153 Payload = *Data;
162 if ((Payload != NULL) && (PayloadSize != 0)) {
163 CopyMem (NewData + DescriptorSize, Payload, PayloadSize);
186 if (Payload != NULL) {
187 FreePool(Payload);
/vbox/src/VBox/Main/include/
H A DGuestCtrlImplPrivate.h509 GuestWaitEventPayload & Payload(void) { return mPayload; } function in class:GuestWaitEventBase
/vbox/src/VBox/Devices/EFI/Firmware/BaseTools/Source/Python/Eot/
H A DFvImage.py906 Payload = m._SectionSubImages[m.Type]()
907 Payload.frombuffer(m._BUF_, m._OFF_ + m._HEADER_SIZE_, PayloadLen)
908 m._SubImages[PayloadOffset] = Payload
/vbox/include/VBox/RemoteDesktop/
H A DVRDEVideoIn.h102 * - Payload Format
754 * Payload transfers. How frames are sent to the server:
759 /* Payload header */
911 VRDEVIDEOINPAYLOADHDR Payload; member in struct:VRDEVIDEOINMSG_FRAME

Completed in 104 milliseconds