Home
last modified time | relevance | path

Searched full:computing (Results 1 – 25 of 338) sorted by relevance

12345678910>>...14

/linux/include/linux/
H A Dcc_platform.h3 * Confidential Computing Platform Capability checks
17 * enum cc_attr - Confidential computing attributes
19 * These attributes represent confidential computing features that are
113 * @attr: Confidential computing attribute to check
116 * specified Confidential Computing attribute is currently active.
120 * * TRUE - Specified Confidential Computing attribute is active
121 * * FALSE - Specified Confidential Computing attribute is not active
H A Dcrc64.h10 * or the previous crc64 value if computing incrementally.
19 * previous crc64 value if computing incrementally.
H A Dcrc32.h11 * the previous CRC value if computing incrementally.
42 * the previous CRC value if computing incrementally.
64 * the previous CRC value if computing incrementally.
/linux/Documentation/security/
H A Dsnp-tdx-threat-model.rst2 Confidential Computing in Linux for x86 virtualization
12 Kernel developers working on confidential computing for virtualized
19 additional attack vectors that arise in the confidential computing space
25 Confidential Computing (CoCo) is a broad term covering a wide range of
34 to this subclass of CoCo as 'Confidential Computing (CoCo) for the
39 inside a CoCo VM. Namely, confidential computing allows its users to
41 Trusted Computing Base (TCB) given its ability to attest the state of these
125 Confidential Computing threat model and its security objectives
128 Confidential Computing adds a new type of attacker to the above list: a
/linux/drivers/iio/dac/
H A Dcio-dac.c3 * IIO driver for the Measurement Computing CIO-DAC
6 * This driver supports the following Measurement Computing devices: CIO-DAC16,
35 MODULE_PARM_DESC(base, "Measurement Computing CIO-DAC base addresses");
160 MODULE_DESCRIPTION("Measurement Computing CIO-DAC IIO driver");
/linux/include/crypto/
H A Dsha2.h185 * sha224_final() - Finish computing a SHA-224 message digest
214 * struct hmac_sha224_ctx - Context for computing HMAC-SHA224 of a message
282 * hmac_sha224_final() - Finish computing an HMAC-SHA224 value
358 * sha256_final() - Finish computing a SHA-256 message digest
381 * computing each digest.
415 * struct hmac_sha256_ctx - Context for computing HMAC-SHA256 of a message
483 * hmac_sha256_final() - Finish computing an HMAC-SHA256 value
593 * sha384_final() - Finish computing a SHA-384 message digest
622 * struct hmac_sha384_ctx - Context for computing HMAC-SHA384 of a message
690 * hmac_sha384_final() - Finish computing an HMAC-SHA384 value
[all …]
H A Dsha1.h79 * sha1_final() - Finish computing a SHA-1 message digest
110 * struct hmac_sha1_ctx - Context for computing HMAC-SHA1 of a message
176 * hmac_sha1_final() - Finish computing an HMAC-SHA1 value
H A Dmd5.h71 * md5_final() - Finish computing an MD5 message digest
102 * struct hmac_md5_ctx - Context for computing HMAC-MD5 of a message
168 * hmac_md5_final() - Finish computing an HMAC-MD5 value
/linux/tools/perf/util/
H A Dexpr.y75 /* During computing ids, does val represent a constant (non-BOTTOM) value? */
126 * If we're not computing ids or $1 and $3 are constants, compute the new
127 * constant value using OP. Its invariant that there are no ids. If computing
307 /* LHS and/or RHS need computing from event IDs so union. */
322 /* LHS and/or RHS need computing from event IDs so union. */
343 /* LHS and/or RHS need computing from event IDs so union. */
/linux/Documentation/security/secrets/
H A Dcoco.rst4 Confidential Computing secrets
7 This document describes how Confidential Computing secret injection is handled
15 Confidential Computing (coco) hardware such as AMD SEV (Secure Encrypted
/linux/drivers/comedi/drivers/
H A Dcb_pcimdda.c12 * Description: Measurement Computing PCIM-DDA06-16
13 * Devices: [Measurement Computing] PCIM-DDA06-16 (cb_pcimdda)
28 * (well, at least according to the rather thin spec. from Measurement Computing
/linux/Documentation/ABI/testing/
H A Dsecurityfs-secrets-coco5 Exposes confidential computing (coco) EFI secrets to
8 EFI can declare memory area used by confidential computing
/linux/fs/smb/server/
H A Dxattr.h50 * Enumeration is used for computing posix acl hash.
74 * xattr_smb_acl structure is used for computing posix acl hash.
/linux/arch/x86/crypto/
H A Dpolyval-clmulni_asm.S18 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where
81 * This step is done when computing the polynomial reduction for efficiency
161 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0
163 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
/linux/drivers/misc/
H A Dsmpro-misc.c3 * Ampere Computing SoC's SMpro Misc Driver
5 * Copyright (c) 2022, Ampere Computing LLC
/linux/drivers/platform/mellanox/
H A DKconfig39 Computing (HPC) and embedded environments.
73 Computing (HPC) and embedded environments.
/linux/arch/x86/boot/compressed/
H A Dsev.c235 /* Search for Confidential Computing blob in the EFI config table. */
253 * Confidential Computing blob, which can be passed to the boot kernel
296 * If a SNP-specific Confidential Computing blob is present, then in early_snp_init()
456 * The Confidential Computing blob is used very early in uncompressed in sev_prep_identity_maps()
/linux/Documentation/arch/powerpc/
H A Dassociativity.rst61 used as an index while computing numa distance information via "ibm,numa-distance-table".
68 computing the distance of domain 8 from other domains present in the system. For the rest of
/linux/arch/arm64/crypto/
H A Dpolyval-ce-core.S20 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where
86 * This step is done when computing the polynomial reduction for efficiency
188 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0
190 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
/linux/drivers/virt/coco/guest/
H A DKconfig3 # Confidential computing shared guest collateral
/linux/fs/orangefs/
H A DKconfig7 computing (HEC) systems.
/linux/Documentation/driver-api/coco/
H A Dindex.rst4 Confidential Computing
/linux/include/uapi/linux/
H A Dipmi_ssif_bmc.h3 * Copyright (c) 2022, Ampere Computing LLC.
/linux/drivers/virt/coco/
H A DKconfig3 # Confidential computing related collateral
H A DMakefile3 # Confidential computing related collateral

12345678910>>...14