executable
pmap_allow_2m_x_page(pmap_t pmap, bool executable)
return (pmap->pm_type != PT_EPT || !executable ||
bool executable;
executable = file_is_executable(path);
if (executable) {
parse_map_yyin(parent, map, executable ? key : NULL);
if (executable) {
show_digest(const struct executable *x)
send_digest(const struct executable *x, int pipefd)
receive_signature(struct executable *x, int pipefd)
save(struct executable *x, FILE *fp, const char *path)
struct executable *x;
load(struct executable *x)
digest_range(struct executable *x, EVP_MD_CTX *mdctx, off_t off, size_t len)
digest(struct executable *x)
range_check(const struct executable *x, off_t off, size_t len,
signature_size(const struct executable *x)
show_certificate(const struct executable *x)
parse_section_table(struct executable *x, off_t off, int number_of_sections)
parse_directory(struct executable *x, off_t off,
compute_checksum(const struct executable *x)
parse_optional_32_plus(struct executable *x, off_t off,
parse_optional_32(struct executable *x, off_t off, int number_of_sections)
parse_optional(struct executable *x, off_t off, int number_of_sections)
parse_pe(struct executable *x, off_t off)
parse(struct executable *x)
append(struct executable *x, void *ptr, size_t len, size_t aligment)
update(struct executable *x)
void parse(struct executable *x);
void update(struct executable *x);
size_t signature_size(const struct executable *x);
void show_certificate(const struct executable *x);
void range_check(const struct executable *x,