Home
last modified time | relevance | path

Searched refs:sig (Results 1 – 25 of 36) sorted by relevance

12

/xen-4.10.0-shim-comet/xen/arch/x86/pv/
A Demul-inv-op.c66 char sig[5], instr[2]; in emulate_forced_invalid_op() local
74 if ( (rc = copy_from_user(sig, (char *)eip, sizeof(sig))) != 0 ) in emulate_forced_invalid_op()
76 pv_inject_page_fault(0, eip + sizeof(sig) - rc); in emulate_forced_invalid_op()
79 if ( memcmp(sig, "\xf\xbxen", sizeof(sig)) ) in emulate_forced_invalid_op()
81 eip += sizeof(sig); in emulate_forced_invalid_op()
/xen-4.10.0-shim-comet/stubdom/
A Dvtpm-deepquote-anyloc.patch10 - BYTE *sig;
28 - res = TPM_DeepQuote(&nonce, &myPCR, &ptPCR, &req->auth1, &sigSize, &sig);
35 - if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) {
40 - tpm_free(sig);
55 * @sig: [out] The resulting digital signature and PCR values
63 BYTE **sig
78 TPM_AUTH *auth1, UINT32 *sigSize, BYTE **sig)
92 - res = VTPM_GetParentQuote(&hres, sel, sigSize, sig);
93 + res = VTPM_GetParentQuote((TPM_NONCE*)&hres, sel, extraInfoFlags, sigSize, sig);
101 - UINT32 *sigSize, BYTE **sig)
[all …]
A Dvtpm-deepquote.patch14 + BYTE *sig;
29 + res = TPM_DeepQuote(&nonce, &myPCR, &ptPCR, &req->auth1, &sigSize, &sig);
33 + if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) {
37 + tpm_free(sig);
62 BYTE **sig
72 + * @sig: [out] The resulting digital signature and PCR values
81 + BYTE **sig
102 + UINT32 *sigSize, BYTE **sig)
137 + res = VTPM_GetParentQuote(&hres, ptPCR, sigSize, sig);
167 + * BYTE[] sig Signature provided by physical TPM
A Dvtpm-parent-sign-ek.patch14 + BYTE *sig;
27 + res = TPM_ParentSignEK(&nonce, &targetPCR, &req->auth1, &sigSize, &sig);
31 + if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) {
35 + tpm_free(sig);
69 + * @sig: [out] The resulting digital signature and PCR values
77 + BYTE **sig
94 …_RESULT VTPM_GetParentQuote(TPM_DIGEST* data, TPM_PCR_SELECTION *sel, UINT32 *sigSize, BYTE **sig);
97 + TPM_AUTH *auth1, UINT32 *sigSize, BYTE **sig)
117 + res = VTPM_GetParentQuote(&hres, sel, sigSize, sig);
171 + * BYTE[] sig Signature provided by physical TPM
/xen-4.10.0-shim-comet/xen/arch/x86/
A Dmicrocode_intel.c41 unsigned int sig; member
57 unsigned int sig; member
108 csig->sig = cpuid_eax(0x00000001); in collect_cpu_info()
125 csig->sig, csig->pf, csig->rev); in collect_cpu_info()
132 int sig, int pf) in microcode_update_match() argument
136 return (sigmatch(sig, uci->cpu_sig.sig, pf, uci->cpu_sig.pf) && in microcode_update_match()
219 - (mc_header->sig + mc_header->pf + mc_header->cksum) in microcode_sanity_check()
220 + (ext_sig->sig + ext_sig->pf + ext_sig->cksum); in microcode_sanity_check()
246 mc_header->sig, mc_header->pf) ) in get_matching_microcode()
258 ext_sig->sig, ext_sig->pf) ) in get_matching_microcode()
A Dplatform_hypercall.c372 const struct mbr_signature *sig; in do_platform_op() local
378 sig = bootsym(boot_mbr_signature) + op->u.firmware_info.index; in do_platform_op()
380 op->u.firmware_info.u.disk_mbr_signature.device = sig->device; in do_platform_op()
382 sig->signature; in do_platform_op()
/xen-4.10.0-shim-comet/docs/misc/
A Dpvrdtscp.c215 union { char csig[16]; u32 u[4]; } sig; in running_on_xen() local
222 sig.u[0] = ebx; sig.u[1] = ecx; sig.u[2] = edx; in running_on_xen()
223 sig.csig[12] = '\0'; in running_on_xen()
224 if (!strcmp("XenVMMXenVMM",&sig.csig[0]) && (eax >= (base+2))) { in running_on_xen()
/xen-4.10.0-shim-comet/tools/debugger/gdbsx/gx/
A Dgx_main.c372 prepare_stop_reply(enum target_signal sig, char *buf, vcpuid_t vcpu) in prepare_stop_reply() argument
378 nib = ((sig & 0xf0) >> 4); in prepare_stop_reply()
380 nib = sig & 0x0f; in prepare_stop_reply()
406 enum target_signal sig; in process_c_request() local
410 sig = TARGET_SIGNAL_INT; in process_c_request()
412 sig = TARGET_SIGNAL_TRAP; in process_c_request()
414 prepare_stop_reply(sig, remote_buf, current_vcpu); in process_c_request()
/xen-4.10.0-shim-comet/tools/misc/
A Dxenwatchdogd.c39 void catch_exit(int sig) in catch_exit() argument
46 void catch_usr1(int sig) in catch_usr1() argument
A Dxen-detect.c106 void sigill_handler(int sig) in sigill_handler() argument
/xen-4.10.0-shim-comet/tools/libxl/
A Dlibxl_exec.c123 int sig = WTERMSIG(status); in libxl_report_child_exitstatus() local
124 const char *str = strsignal(sig); in libxl_report_child_exitstatus()
133 sig, coredump); in libxl_report_child_exitstatus()
430 int sig = status - 128; in spawn_middle_death() local
431 const char *str = strsignal(sig); in spawn_middle_death()
437 " signal number %d", ss->what, (unsigned long)pid, sig); in spawn_middle_death()
A Dlibxl_arm_acpi.c202 static void make_acpi_header(struct acpi_table_header *h, const char *sig, in make_acpi_header() argument
205 memcpy(h->signature, sig, 4); in make_acpi_header()
A Dlibxl_aoutils.c622 void libxl__kill(libxl__gc *gc, pid_t pid, int sig, const char *what) in libxl__kill() argument
624 int r = kill(pid, sig); in libxl__kill()
626 what, (unsigned long)pid, sig); in libxl__kill()
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/
A Ddom0_build.c794 static bool __init pvh_acpi_table_allowed(const char *sig) in pvh_acpi_table_allowed() argument
802 if ( strncmp(sig, banned_tables[i], ACPI_NAME_SIZE) == 0 ) in pvh_acpi_table_allowed()
810 sig); in pvh_acpi_table_allowed()
838 const char *sig = acpi_gbl_root_table_list.tables[i].signature.ascii; in pvh_setup_acpi_xsdt() local
840 if ( pvh_acpi_table_allowed(sig) ) in pvh_setup_acpi_xsdt()
885 const char *sig = acpi_gbl_root_table_list.tables[i].signature.ascii; in pvh_setup_acpi_xsdt() local
887 if ( pvh_acpi_table_allowed(sig) ) in pvh_setup_acpi_xsdt()
943 const char *sig = acpi_gbl_root_table_list.tables[i].signature.ascii; in pvh_setup_acpi() local
952 if ( strncmp(sig, ACPI_SIG_MADT, ACPI_NAME_SIZE) in pvh_setup_acpi()
953 ? pvh_acpi_table_allowed(sig) in pvh_setup_acpi()
/xen-4.10.0-shim-comet/tools/ocaml/libs/xl/
A Dxenlight.mli.in38 module Domain : sig
53 module Host : sig
64 module Async : sig
/xen-4.10.0-shim-comet/xen/include/asm-x86/
A Dmicrocode.h19 unsigned int sig; member
/xen-4.10.0-shim-comet/stubdom/vtpmmgr/
A Dmgmt_authority.c330 BYTE* sig; in vtpm_do_quote() local
370 rc = TPM_Quote(handle, data_to_quote, sel, (void*)&group->aik_authdata, &oiap, &pcrs, &sig, &size); in vtpm_do_quote()
389 memcpy(sig_out, sig, size); in vtpm_do_quote()
393 free(sig); in vtpm_do_quote()
A Dvtpm_cmd_handler.c533 void *dhkx1, *dhkx2, *gk, *sig; in vtpmmgr_GroupRegister() local
538 UNPACK_IN(VPTR, &sig, 256, UNPACK_ALIAS); in vtpmmgr_GroupRegister()
553 if (tpmrsa_sigcheck(&saa_rsa, sig, digest.bits)) in vtpmmgr_GroupRegister()
591 void *sig, *seal_bits, *kern_bits; in vtpmmgr_GroupUpdate() local
594 UNPACK_IN(VPTR, &sig, 256, UNPACK_ALIAS); in vtpmmgr_GroupUpdate()
644 rc = tpmrsa_sigcheck(&saa_rsa, sig, digest); in vtpmmgr_GroupUpdate()
A Dtpm.h175 BYTE** sig, // out
/xen-4.10.0-shim-comet/tools/ocaml/libs/xb/
A Dxb.mli2 sig
35 sig
/xen-4.10.0-shim-comet/tools/console/daemon/
A Dutils.c41 static void child_exit(int sig) in child_exit() argument
A Dmain.c44 static void handle_hup(int sig) in handle_hup() argument
/xen-4.10.0-shim-comet/tools/python/scripts/
A Dconvert-legacy-stream534 sig, = unpack("21s", rawsig)
535 info("Qemu signature: %s" % (sig, ))
537 if sig == "DeviceModelRecord0002":
550 raise RuntimeError("Unrecognised Qemu sig '%s'" % (sig, ))
/xen-4.10.0-shim-comet/xen/arch/x86/efi/
A Defi-boot.h462 struct mbr_signature *sig = boot_mbr_signature + in efi_arch_edd() local
465 sig->device = 0x80 + boot_edd_info_nr; /* fake */ in efi_arch_edd()
466 memcpy(&sig->signature, devp.HardDrive->Signature, in efi_arch_edd()
467 sizeof(sig->signature)); in efi_arch_edd()
/xen-4.10.0-shim-comet/docs/process/
A Drelease-checklist.txt119 cvs add -kb xen-$v.tar.gz.sig
129 # U oss-xen/release/4.8.0-rc2/xen-4.8.0-rc2.tar.gz.sig

Completed in 31 milliseconds

12