Searched refs:Payload (Results 1 - 9 of 9) sorted by relevance
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/Ip6Dxe/ |
H A D | Ip6Input.c | 731 @param[out] Payload The pointer to the payload of the recieved packet. 749 OUT UINT8 **Payload, 858 *Payload = AllocatePool ((UINTN) PayloadLen); 859 if (*Payload == NULL) { 863 NetbufCopy (*Packet, sizeof (EFI_IP6_HEADER), PayloadLen, *Payload); 870 *Payload, 937 if (*Payload != NULL) { 938 FreePool (*Payload); 941 *Payload = AllocatePool ((UINTN) PayloadLen); 942 if (*Payload 745 Ip6PreProcessPacket( IN IP6_SERVICE *IpSb, IN OUT NET_BUF **Packet, IN UINT32 Flag, OUT UINT8 **Payload, OUT UINT8 **LastHead, OUT UINT32 *ExtHdrsLen, OUT UINT32 *UnFragmentLen, OUT BOOLEAN *Fragmented, OUT EFI_IP6_HEADER **Head ) argument 996 UINT8 *Payload; local [all...] |
/vbox/tools/darwin.x86/bin/ |
H A D | xcode-4.1-extrator.sh | 134 if ! mv -f "${MY_TMP_DIR}/x/InstallXcodeLion.pkg/Payload" "${MY_TMP_DIR}/x/MainPayload.tar"; then 164 rm -f -- "${MY_TMP_DIR}/x/Payload"; 166 if ! xar -xvf "${MY_TMP_DIR}/x/${i}" -C "${MY_TMP_DIR}/x" Payload; then 170 if ! tar xvf "${MY_TMP_DIR}/x/Payload" -C "${MY_DST_DIR}"; then
|
/vbox/src/VBox/Devices/EFI/Firmware/NetworkPkg/IpSecDxe/ |
H A D | IpSecImpl.c | 222 @param[in] IpPayload Point to IP Payload to be check. 420 @param[in] IpPayload The IP Payload to be sent out. 983 // RFC2402, Payload length is specified in 32-bit words, minus "2". 1393 NET_BUF *Payload; local 1413 Payload = NULL; 1423 Payload = NetbufFromExt ( 1431 if (Payload == NULL) { 1439 EspSize = Payload->TotalSize; 1440 EspHeader = (EFI_ESP_HEADER *) NetbufGetByte (Payload, 0, NULL); 1487 NetbufCopy (Payload, [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/RuntimeDxe/ |
H A D | AuthService.c | 883 UINT8 *Payload; local 923 Payload = (UINT8 *) Data + AUTHINFO2_SIZE (Data); 926 Status = CheckSignatureListFormat(VariableName, VendorGuid, Payload, PayloadSize); 934 Payload, 989 UINT8 *Payload; local 1020 Payload = (UINT8 *) Data + AUTHINFO2_SIZE (Data); 1026 Payload,
|
/vbox/src/VBox/Devices/EFI/Firmware/CryptoPkg/Application/Cryptest/ |
H A D | RsaVerify2.c | 191 // Payload for PKCS#7 Signing & Verification Validation. 193 GLOBAL_REMOVE_IF_UNREFERENCED CONST CHAR8 *Payload = "Payload Data for PKCS#7 Signing"; variable 348 // Create PKCS#7 signedData on Payload. 355 (UINT8 *) Payload, 356 AsciiStrLen (Payload), 376 (UINT8 *) Payload, 377 AsciiStrLen (Payload)
|
/vbox/src/VBox/Devices/EFI/Firmware/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/ |
H A D | SecureBootConfigImpl.c | 137 UINT8 *Payload; local 153 Payload = *Data; 162 if ((Payload != NULL) && (PayloadSize != 0)) { 163 CopyMem (NewData + DescriptorSize, Payload, PayloadSize); 186 if (Payload != NULL) { 187 FreePool(Payload);
|
/vbox/src/VBox/Main/include/ |
H A D | GuestCtrlImplPrivate.h | 509 GuestWaitEventPayload & Payload(void) { return mPayload; } function in class:GuestWaitEventBase
|
/vbox/src/VBox/Devices/EFI/Firmware/BaseTools/Source/Python/Eot/ |
H A D | FvImage.py | 906 Payload = m._SectionSubImages[m.Type]() 907 Payload.frombuffer(m._BUF_, m._OFF_ + m._HEADER_SIZE_, PayloadLen) 908 m._SubImages[PayloadOffset] = Payload
|
/vbox/include/VBox/RemoteDesktop/ |
H A D | VRDEVideoIn.h | 102 * - Payload Format 754 * Payload transfers. How frames are sent to the server: 759 /* Payload header */ 911 VRDEVIDEOINPAYLOADHDR Payload; member in struct:VRDEVIDEOINMSG_FRAME
|
Completed in 464 milliseconds