Home
last modified time | relevance | path

Searched full:trust (Results 1 – 25 of 35) sorted by relevance

12

/qemu/docs/system/i386/
H A Dtdx.rst6 with a new kind of virtual machine guest called a Trust Domain (TD). A TD runs
18 Trust Domain Virtual Firmware (TDVF)
21 Trust Domain Virtual Firmware (TDVF) is required to provide TD services to boot
159 - `TDX Homepage <https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-d…
/qemu/hw/uefi/
H A Dvar-service-pkcs7.c243 * NOT secure boot variables we should track the root certificate of the trust
283 /* last is root-of-trust certificate (can be identical to signer) */ in build_trust_list_authvar()
308 /* add root to trust list */ in build_trust_list_authvar()
/qemu/docs/system/
H A Dconfidential-guest-support.rst41 * Intel Trust Domain Extension (TDX) (see :doc:`i386/tdx`)
H A Dtls.rst49 kept VERY secret and secure. If this key is compromised the entire trust
/qemu/include/hw/misc/
H A Dsifive_u_prci.h37 * We have to trust the actual code that works.
/qemu/linux-user/
H A Dfd-trans.c932 struct ifla_vf_trust *trust; in host_to_target_data_vfinfo_nlattr() local
985 trust = NLA_DATA(nlattr); in host_to_target_data_vfinfo_nlattr()
986 trust->vf = tswap32(trust->vf); in host_to_target_data_vfinfo_nlattr()
987 trust->setting = tswap32(trust->setting); in host_to_target_data_vfinfo_nlattr()
H A Dmain.c205 * We trust that when using NPTL, start_exclusive() in stop_all_tasks()
/qemu/hw/misc/
H A Dbcm2835_rng.c29 * errors are systematic problems and trust that if we didn't in get_random_bytes()
/qemu/docs/interop/
H A Ddbus.rst46 different trust level.
H A Dfirmware.json153 # @intel-tdx: The firmware supports running under Intel Trust Domain
/qemu/hw/virtio/
H A Dvhost-shadow-virtqueue.h89 * needing to trust the device access.
H A Dvhost-shadow-virtqueue.c40 /* SVQ trust in the host's IOMMU to translate addresses */ in vhost_svq_valid_features()
42 /* SVQ trust that the guest vring is little endian */ in vhost_svq_valid_features()
H A Dvhost-vdpa.c1486 * Cannot trust in value returned by device, let vhost recover used in vhost_vdpa_get_vring_base()
H A Dvhost.c1623 * So we can trust that these values are accurate. in vhost_dev_init()
/qemu/block/
H A Dqed-table.c157 /* can't trust loaded L2 table anymore */ in qed_read_l2_table()
/qemu/docs/system/devices/
H A Dccid.rst87 Certificate Nickname Trust Attributes
/qemu/util/
H A Dfilemonitor-inotify.c92 * We trust the kernel to provide valid buffer with complete event in qemu_file_monitor_watch()
/qemu/scripts/coverity-scan/
H A Drun-coverity-scan15 # use it if you don't trust them!
/qemu/tests/tcg/multiarch/
H A Dtest-mmap.c462 /* Trust the first argument, otherwise probe the system for our in main()
/qemu/bsd-user/
H A Dmain.c205 * We trust when using NPTL (pthreads) start_exclusive() handles thread in stop_all_tasks()
/qemu/linux-headers/asm-x86/
H A Dkvm.h933 /* Trust Domain eXtension sub-ioctl() commands. */
/qemu/include/hw/xen/interface/io/
H A Dblkif.h353 * A value of "0" indicates that the frontend should not trust the
H A Dnetif.h148 * frontend should not trust the backend, and should deploy whatever measures
/qemu/python/qemu/qmp/
H A Dprotocol.py844 # just trust that the Exception we already have is the
/qemu/net/
H A Dnet.c1691 * However, the NIC may have peers that trust to be clean beyond this in net_cleanup()

12