Searched refs:secure (Results 1 – 25 of 97) sorted by relevance
1234
17 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented27 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented37 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented46 SHA-256 secure hash standard (DFIPS 180-2) implemented54 SHA-256 secure hash standard (DFIPS 180-2) implemented62 SHA-512 secure hash standard (DFIPS 180-2) implemented109 Use a faster and more secure NEON based implementation of AES in CBC,
17 secure-common = omap-smc.o omap-secure.o20 obj-$(CONFIG_ARCH_OMAP3) += $(omap-2-3-common) $(hwmod-common) $(secure-common)21 obj-$(CONFIG_ARCH_OMAP4) += $(hwmod-common) $(secure-common)22 obj-$(CONFIG_SOC_AM33XX) += $(hwmod-common) $(secure-common)23 obj-$(CONFIG_SOC_OMAP5) += $(hwmod-common) $(secure-common)24 obj-$(CONFIG_SOC_AM43XX) += $(hwmod-common) $(secure-common)25 obj-$(CONFIG_SOC_DRA7XX) += $(hwmod-common) $(secure-common)
67 mov r12, r0 @ Copy the secure service ID
25 * to actually call into trustzone to run secure
43 * to actually call into trustzone to run secure
19 /* first 128MB is reserved for secure area. */
16 /* first 128MB is reserved for secure area. */
18 /* first 128MB is reserved for secure area. */
1129 bool secure; member1140 static void __init spec_v2_user_print_cond(const char *reason, bool secure) in spec_v2_user_print_cond() argument1142 if (boot_cpu_has_bug(X86_BUG_SPECTRE_V2) != secure) in spec_v2_user_print_cond()1171 v2_user_options[i].secure); in spectre_v2_parse_user_cmdline()1305 bool secure; member1320 static void __init spec_v2_print_cond(const char *reason, bool secure) in spec_v2_print_cond() argument1322 if (boot_cpu_has_bug(X86_BUG_SPECTRE_V2) != secure) in spec_v2_print_cond()1405 mitigation_options[i].secure); in spectre_v2_parse_cmdline()