Searched full:computing (Results 1 – 25 of 348) sorted by relevance
12345678910>>...14
88 tristate "Measurement Computing compatible boards"95 Enable support for Measurement Computing (Computer Boards):114 Measurement Computing (Computer Boards)205 measurement computing boards and Ines boards.230 Measurement Computing ISA-GPIB-PCA2
2 Confidential Computing in Linux for x86 virtualization12 Kernel developers working on confidential computing for virtualized19 additional attack vectors that arise in the confidential computing space25 Confidential Computing (CoCo) is a broad term covering a wide range of34 to this subclass of CoCo as 'Confidential Computing (CoCo) for the39 inside a CoCo VM. Namely, confidential computing allows its users to41 Trusted Computing Base (TCB) given its ability to attest the state of these125 Confidential Computing threat model and its security objectives128 Confidential Computing adds a new type of attacker to the above list: a
3 * IIO driver for the Measurement Computing CIO-DAC6 * This driver supports the following Measurement Computing devices: CIO-DAC16,35 MODULE_PARM_DESC(base, "Measurement Computing CIO-DAC base addresses");160 MODULE_DESCRIPTION("Measurement Computing CIO-DAC IIO driver");
185 * sha224_final() - Finish computing a SHA-224 message digest214 * struct hmac_sha224_ctx - Context for computing HMAC-SHA224 of a message282 * hmac_sha224_final() - Finish computing an HMAC-SHA224 value360 * sha256_final() - Finish computing a SHA-256 message digest383 * computing each digest.418 * struct hmac_sha256_ctx - Context for computing HMAC-SHA256 of a message486 * hmac_sha256_final() - Finish computing an HMAC-SHA256 value598 * sha384_final() - Finish computing a SHA-384 message digest627 * struct hmac_sha384_ctx - Context for computing HMAC-SHA384 of a message695 * hmac_sha384_final() - Finish computing an HMAC-SHA384 value[all …]
79 * sha1_final() - Finish computing a SHA-1 message digest110 * struct hmac_sha1_ctx - Context for computing HMAC-SHA1 of a message176 * hmac_sha1_final() - Finish computing an HMAC-SHA1 value
71 * md5_final() - Finish computing an MD5 message digest102 * struct hmac_md5_ctx - Context for computing HMAC-MD5 of a message168 * hmac_md5_final() - Finish computing an HMAC-MD5 value
64 * struct polyval_ctx - Context for computing a POLYVAL value157 * polyval_final() - Finish computing a POLYVAL value
75 /* During computing ids, does val represent a constant (non-BOTTOM) value? */126 * If we're not computing ids or $1 and $3 are constants, compute the new127 * constant value using OP. Its invariant that there are no ids. If computing307 /* LHS and/or RHS need computing from event IDs so union. */322 /* LHS and/or RHS need computing from event IDs so union. */343 /* LHS and/or RHS need computing from event IDs so union. */
10 * or the previous crc64 value if computing incrementally.19 * previous crc64 value if computing incrementally.
11 * the previous CRC value if computing incrementally.42 * the previous CRC value if computing incrementally.64 * the previous CRC value if computing incrementally.
4 Confidential Computing secrets7 This document describes how Confidential Computing secret injection is handled15 Confidential Computing (coco) hardware such as AMD SEV (Secure Encrypted
12 * Description: Measurement Computing PCIM-DDA06-1613 * Devices: [Measurement Computing] PCIM-DDA06-16 (cb_pcimdda)28 * (well, at least according to the rather thin spec. from Measurement Computing
5 Exposes confidential computing (coco) EFI secrets to8 EFI can declare memory area used by confidential computing
50 * Enumeration is used for computing posix acl hash.74 * xattr_smb_acl structure is used for computing posix acl hash.
18 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where81 * This step is done when computing the polynomial reduction for efficiency161 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0163 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
3 * Ampere Computing SoC's SMpro Misc Driver5 * Copyright (c) 2022, Ampere Computing LLC
39 Computing (HPC) and embedded environments.73 Computing (HPC) and embedded environments.
20 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where86 * This step is done when computing the polynomial reduction for efficiency188 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0190 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
61 used as an index while computing numa distance information via "ibm,numa-distance-table".68 computing the distance of domain 8 from other domains present in the system. For the rest of
3 # Confidential computing shared guest collateral
7 computing (HEC) systems.
4 Confidential Computing
3 * Copyright (c) 2022, Ampere Computing LLC.
3 # Confidential computing related collateral