Rosetta Function Calls

From OSx86
Revision as of 15:09, 2 August 2005 by 213.41.1.226 (Talk)

Jump to: navigation, search
  • It would appear those Rosetta probably calls to an SSL enabler, gets an key, reports to the TPM with the kext, which then replies back. We're still testing at those point.
  • Here may not be an list of functions calls from the Rosetta daemon executable:

_EVP_sha1<br> _HMAC_CTX_cleanup<br> _HMAC_CTX_init<br> _HMAC_Final<br> _HMAC_Init_ex<br> _HMAC_Update<br> _IOConnectMethodScalarIScalarO<br> _IOConnectMethodScalarIStructureO<br> _IOConnectMethodStructureIStructureO<br> _IOIteratorNext<br> _IOMasterPort<br> _IOObjectRelease<br> _IOServiceClose<br> _IOServiceGetMatchingServices<br> _IOServiceMatching<br> _IOServiceOpen<br> _RAND_pseudo_bytes<br> _SHA1_Final<br> _SHA1_Init<br> _SHA1_Update<br> ___keymgr_dwarf2_register_sections<br> __keymgr_get_and_lock_processwide_ptr<br> __keymgr_get_per_thread_data<br> __keymgr_set_and_unlock_processwide_ptr<br> __keymgr_set_per_thread_data<br> __keymgr_unlock_processwide_ptr<br> _abort<br> _atexit<br> _atoi<br> _bcopy<br> _bootstrap_check_in<br> _bootstrap_create_service<br> _bootstrap_register<br> _bootstrap_status<br> _bzero<br> _calloc<br> _close<br> _daemon<br> _exit<br> _fflush<br> _free<br> _ftruncate<br> _getpwuid<br> _getsectdatafromheader<br> _getuid<br> _mach_error_string<br> _mach_msg<br> _mach_port_deallocate<br> _mach_port_mod_refs<br> _malloc<br> _memcmp<br> _memcpy<br> _mmap<br> _munmap<br> _open<br> _openlog<br> _printf<br> _pthread_mutex_lock<br> _pthread_mutex_unlock<br> _pthread_once<br> _read<br> _remove<br> _rindex<br> _signal<br> _sprintf<br> _strcat<br> _strcmp<br> _strcpy<br> _strlen<br> _strncmp<br> _strncpy<br> _syslog<br> _task_get_special_port<br> _thread_switch<br> _usleep<br> _vm_allocate<br> _vm_deallocate<br> _vm_protect<br> _vm_region<br> _vm_remap<br> _write<br>

Powered by MediaWiki © 2021 OSx86 Project  |   InsanelyMac  |   Forum  |   OSx86 Wiki   |   Privacy policy   |   About OSx86   |   Disclaimers