/xen-4.10.0-shim-comet/xen/arch/x86/pv/ |
A D | emul-inv-op.c | 66 char sig[5], instr[2]; in emulate_forced_invalid_op() local 74 if ( (rc = copy_from_user(sig, (char *)eip, sizeof(sig))) != 0 ) in emulate_forced_invalid_op() 76 pv_inject_page_fault(0, eip + sizeof(sig) - rc); in emulate_forced_invalid_op() 79 if ( memcmp(sig, "\xf\xbxen", sizeof(sig)) ) in emulate_forced_invalid_op() 81 eip += sizeof(sig); in emulate_forced_invalid_op()
|
/xen-4.10.0-shim-comet/stubdom/ |
A D | vtpm-deepquote-anyloc.patch | 10 - BYTE *sig; 28 - res = TPM_DeepQuote(&nonce, &myPCR, &ptPCR, &req->auth1, &sigSize, &sig); 35 - if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) { 40 - tpm_free(sig); 55 * @sig: [out] The resulting digital signature and PCR values 63 BYTE **sig 78 TPM_AUTH *auth1, UINT32 *sigSize, BYTE **sig) 92 - res = VTPM_GetParentQuote(&hres, sel, sigSize, sig); 93 + res = VTPM_GetParentQuote((TPM_NONCE*)&hres, sel, extraInfoFlags, sigSize, sig); 101 - UINT32 *sigSize, BYTE **sig) [all …]
|
A D | vtpm-deepquote.patch | 14 + BYTE *sig; 29 + res = TPM_DeepQuote(&nonce, &myPCR, &ptPCR, &req->auth1, &sigSize, &sig); 33 + if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) { 37 + tpm_free(sig); 62 BYTE **sig 72 + * @sig: [out] The resulting digital signature and PCR values 81 + BYTE **sig 102 + UINT32 *sigSize, BYTE **sig) 137 + res = VTPM_GetParentQuote(&hres, ptPCR, sigSize, sig); 167 + * BYTE[] sig Signature provided by physical TPM
|
A D | vtpm-parent-sign-ek.patch | 14 + BYTE *sig; 27 + res = TPM_ParentSignEK(&nonce, &targetPCR, &req->auth1, &sigSize, &sig); 31 + if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) { 35 + tpm_free(sig); 69 + * @sig: [out] The resulting digital signature and PCR values 77 + BYTE **sig 94 …_RESULT VTPM_GetParentQuote(TPM_DIGEST* data, TPM_PCR_SELECTION *sel, UINT32 *sigSize, BYTE **sig); 97 + TPM_AUTH *auth1, UINT32 *sigSize, BYTE **sig) 117 + res = VTPM_GetParentQuote(&hres, sel, sigSize, sig); 171 + * BYTE[] sig Signature provided by physical TPM
|
/xen-4.10.0-shim-comet/xen/arch/x86/ |
A D | microcode_intel.c | 41 unsigned int sig; member 57 unsigned int sig; member 108 csig->sig = cpuid_eax(0x00000001); in collect_cpu_info() 125 csig->sig, csig->pf, csig->rev); in collect_cpu_info() 132 int sig, int pf) in microcode_update_match() argument 136 return (sigmatch(sig, uci->cpu_sig.sig, pf, uci->cpu_sig.pf) && in microcode_update_match() 219 - (mc_header->sig + mc_header->pf + mc_header->cksum) in microcode_sanity_check() 220 + (ext_sig->sig + ext_sig->pf + ext_sig->cksum); in microcode_sanity_check() 246 mc_header->sig, mc_header->pf) ) in get_matching_microcode() 258 ext_sig->sig, ext_sig->pf) ) in get_matching_microcode()
|
A D | platform_hypercall.c | 372 const struct mbr_signature *sig; in do_platform_op() local 378 sig = bootsym(boot_mbr_signature) + op->u.firmware_info.index; in do_platform_op() 380 op->u.firmware_info.u.disk_mbr_signature.device = sig->device; in do_platform_op() 382 sig->signature; in do_platform_op()
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | pvrdtscp.c | 215 union { char csig[16]; u32 u[4]; } sig; in running_on_xen() local 222 sig.u[0] = ebx; sig.u[1] = ecx; sig.u[2] = edx; in running_on_xen() 223 sig.csig[12] = '\0'; in running_on_xen() 224 if (!strcmp("XenVMMXenVMM",&sig.csig[0]) && (eax >= (base+2))) { in running_on_xen()
|
/xen-4.10.0-shim-comet/tools/debugger/gdbsx/gx/ |
A D | gx_main.c | 372 prepare_stop_reply(enum target_signal sig, char *buf, vcpuid_t vcpu) in prepare_stop_reply() argument 378 nib = ((sig & 0xf0) >> 4); in prepare_stop_reply() 380 nib = sig & 0x0f; in prepare_stop_reply() 406 enum target_signal sig; in process_c_request() local 410 sig = TARGET_SIGNAL_INT; in process_c_request() 412 sig = TARGET_SIGNAL_TRAP; in process_c_request() 414 prepare_stop_reply(sig, remote_buf, current_vcpu); in process_c_request()
|
/xen-4.10.0-shim-comet/tools/misc/ |
A D | xenwatchdogd.c | 39 void catch_exit(int sig) in catch_exit() argument 46 void catch_usr1(int sig) in catch_usr1() argument
|
A D | xen-detect.c | 106 void sigill_handler(int sig) in sigill_handler() argument
|
/xen-4.10.0-shim-comet/tools/libxl/ |
A D | libxl_exec.c | 123 int sig = WTERMSIG(status); in libxl_report_child_exitstatus() local 124 const char *str = strsignal(sig); in libxl_report_child_exitstatus() 133 sig, coredump); in libxl_report_child_exitstatus() 430 int sig = status - 128; in spawn_middle_death() local 431 const char *str = strsignal(sig); in spawn_middle_death() 437 " signal number %d", ss->what, (unsigned long)pid, sig); in spawn_middle_death()
|
A D | libxl_arm_acpi.c | 202 static void make_acpi_header(struct acpi_table_header *h, const char *sig, in make_acpi_header() argument 205 memcpy(h->signature, sig, 4); in make_acpi_header()
|
A D | libxl_aoutils.c | 622 void libxl__kill(libxl__gc *gc, pid_t pid, int sig, const char *what) in libxl__kill() argument 624 int r = kill(pid, sig); in libxl__kill() 626 what, (unsigned long)pid, sig); in libxl__kill()
|
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/ |
A D | dom0_build.c | 794 static bool __init pvh_acpi_table_allowed(const char *sig) in pvh_acpi_table_allowed() argument 802 if ( strncmp(sig, banned_tables[i], ACPI_NAME_SIZE) == 0 ) in pvh_acpi_table_allowed() 810 sig); in pvh_acpi_table_allowed() 838 const char *sig = acpi_gbl_root_table_list.tables[i].signature.ascii; in pvh_setup_acpi_xsdt() local 840 if ( pvh_acpi_table_allowed(sig) ) in pvh_setup_acpi_xsdt() 885 const char *sig = acpi_gbl_root_table_list.tables[i].signature.ascii; in pvh_setup_acpi_xsdt() local 887 if ( pvh_acpi_table_allowed(sig) ) in pvh_setup_acpi_xsdt() 943 const char *sig = acpi_gbl_root_table_list.tables[i].signature.ascii; in pvh_setup_acpi() local 952 if ( strncmp(sig, ACPI_SIG_MADT, ACPI_NAME_SIZE) in pvh_setup_acpi() 953 ? pvh_acpi_table_allowed(sig) in pvh_setup_acpi()
|
/xen-4.10.0-shim-comet/tools/ocaml/libs/xl/ |
A D | xenlight.mli.in | 38 module Domain : sig 53 module Host : sig 64 module Async : sig
|
/xen-4.10.0-shim-comet/xen/include/asm-x86/ |
A D | microcode.h | 19 unsigned int sig; member
|
/xen-4.10.0-shim-comet/stubdom/vtpmmgr/ |
A D | mgmt_authority.c | 330 BYTE* sig; in vtpm_do_quote() local 370 rc = TPM_Quote(handle, data_to_quote, sel, (void*)&group->aik_authdata, &oiap, &pcrs, &sig, &size); in vtpm_do_quote() 389 memcpy(sig_out, sig, size); in vtpm_do_quote() 393 free(sig); in vtpm_do_quote()
|
A D | vtpm_cmd_handler.c | 533 void *dhkx1, *dhkx2, *gk, *sig; in vtpmmgr_GroupRegister() local 538 UNPACK_IN(VPTR, &sig, 256, UNPACK_ALIAS); in vtpmmgr_GroupRegister() 553 if (tpmrsa_sigcheck(&saa_rsa, sig, digest.bits)) in vtpmmgr_GroupRegister() 591 void *sig, *seal_bits, *kern_bits; in vtpmmgr_GroupUpdate() local 594 UNPACK_IN(VPTR, &sig, 256, UNPACK_ALIAS); in vtpmmgr_GroupUpdate() 644 rc = tpmrsa_sigcheck(&saa_rsa, sig, digest); in vtpmmgr_GroupUpdate()
|
A D | tpm.h | 175 BYTE** sig, // out
|
/xen-4.10.0-shim-comet/tools/ocaml/libs/xb/ |
A D | xb.mli | 2 sig 35 sig
|
/xen-4.10.0-shim-comet/tools/console/daemon/ |
A D | utils.c | 41 static void child_exit(int sig) in child_exit() argument
|
A D | main.c | 44 static void handle_hup(int sig) in handle_hup() argument
|
/xen-4.10.0-shim-comet/tools/python/scripts/ |
A D | convert-legacy-stream | 534 sig, = unpack("21s", rawsig) 535 info("Qemu signature: %s" % (sig, )) 537 if sig == "DeviceModelRecord0002": 550 raise RuntimeError("Unrecognised Qemu sig '%s'" % (sig, ))
|
/xen-4.10.0-shim-comet/xen/arch/x86/efi/ |
A D | efi-boot.h | 462 struct mbr_signature *sig = boot_mbr_signature + in efi_arch_edd() local 465 sig->device = 0x80 + boot_edd_info_nr; /* fake */ in efi_arch_edd() 466 memcpy(&sig->signature, devp.HardDrive->Signature, in efi_arch_edd() 467 sizeof(sig->signature)); in efi_arch_edd()
|
/xen-4.10.0-shim-comet/docs/process/ |
A D | release-checklist.txt | 119 cvs add -kb xen-$v.tar.gz.sig 129 # U oss-xen/release/4.8.0-rc2/xen-4.8.0-rc2.tar.gz.sig
|