/linux/drivers/usb/core/ |
H A D | Kconfig | 121 int "Default authorization mode for USB devices" 126 Select the default USB device authorization mode. Can be overridden 134 hub require user space authorization before they can be used. 136 With value 1 (default) no user space authorization is required to 140 USB devices require user space authorization before they can be
|
H A D | sysfs.c | 996 * interface_authorized_default_show - show default authorization status 1012 * interface_authorized_default_store - store default authorization status 1202 * interface_authorized_show - show authorization status of an USB interface
|
/linux/Documentation/security/keys/ |
H A D | trusted-encrypted.rst | 186 default authorization value (20 bytes of 0s). This can be set at takeownership 227 policydigest= digest for the authorization policy. must be calculated 230 policyhandle= handle to an authorization policy session that defines the 453 emptyAuth is true if the key has well known authorization "". If it 454 is false or not present, the key requires an explicit authorization
|
/linux/Documentation/security/tpm/ |
H A D | tpm-security.rst | 86 either hierarchy would not have some type of authorization. 91 physically cannot have an authorization, so we are always able to use 135 authorization secret, but for a lot of kernel operations that is well
|
/linux/Documentation/usb/ |
H A D | index.rst | 9 authorization
|
H A D | authorization.rst | 95 Interface authorization
|
/linux/Documentation/ABI/removed/ |
H A D | sysfs-selinux-checkreqprot | 16 without authorization by policy. The default value of checkreqprot
|
/linux/LICENSES/deprecated/ |
H A D | X11 | 34 dealings in this Software without prior written authorization from the X
|
/linux/tools/usb/usbip/doc/ |
H A D | usbipd.8 | 77 offers no authentication or authorization for USB/IP. Any
|
/linux/fs/nfs/filelayout/ |
H A D | filelayout.h | 14 * of this software without specific, written prior authorization. If
|
H A D | filelayoutdev.c | 15 * of this software without specific, written prior authorization. If
|
/linux/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 125 * calculate authorization info fields to send to TPM in TSS_authhmac() 452 /* calculate encrypted authorization value */ in oiap() 471 /* encrypt data authorization key */ in tpm_seal() 475 /* calculate authorization HMAC value */ in tpm_seal()
|
/linux/Documentation/filesystems/nfs/ |
H A D | rpc-server-gss.rst | 58 beyond 64KiB in size due to various authorization extensions attacked to
|
/linux/drivers/infiniband/hw/hfi1/ |
H A D | firmware.c | 579 * Authorization will fail if the delay between firmware in __obtain_firmware() 580 * authorization events is shorter than 50us. Add 100us to in __obtain_firmware() 815 * Firmware authorization failed. This can be cleared by in run_rsa() 818 * run - this will reset the current authorization. in run_rsa() 873 * authorization failure details, if any. Firmware authorization in run_rsa() 879 dd_dev_warn(dd, "%s firmware authorization failed\n", in run_rsa()
|
/linux/arch/s390/kernel/ |
H A D | perf_cpum_sf.c | 771 /* Check sampling facility authorization and, if not authorized, in __hw_perf_event_init() 773 * the authorization is identical for all configured CPUs. in __hw_perf_event_init() 790 * sampling authorization is missing. in __hw_perf_event_init() 1847 * The availablitiy depends on the CPU_MF sampling facility authorization 1850 * If the authorization for basic samples is turned off, it should be 1853 * During initialization of the device driver, check the authorization 1947 /* Sampling authorization change request */ in cpumf_measurement_alert()
|
H A D | perf_event.c | 160 "authorization=%04x\n", ci.cfvn, ci.csvn, ci.auth_ctl); in sl_print_counter()
|
H A D | perf_cpum_cf.c | 825 * Finally, validate version and authorization of the counter set. in __hw_perf_event_init() 1167 /* counter authorization change alert */ in cpumf_measurement_alert() 1776 * Checking the authorization on any CPU is fine as the hardware in cfdiag_event_init2() 1777 * applies the same authorization settings to all CPUs. in cfdiag_event_init2() 1877 * trailer data. This is independent of the counter set authorization which
|
/linux/fs/nfs/blocklayout/ |
H A D | blocklayout.h | 16 * of this software without specific, written prior authorization. if
|
H A D | rpc_pipefs.c | 12 * of this software without specific, written prior authorization. if
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-thunderbolt | 29 de-authorization of devices. Value of 1 means user can 119 authorization to use the secure connection method instead.
|
/linux/Documentation/admin-guide/LSM/ |
H A D | ipe.rst | 118 authorization criteria, IPE will deny its execution. Additionally, IPE 223 authorization of the policies (prohibiting an attacker from gaining 612 This property can be utilized for authorization of files from initramfs. 634 This property can be utilized for authorization or revocation of 660 This property can be utilized for authorization of all dm-verity 675 This property can be utilized for authorization of specific fsverity
|
/linux/net/sunrpc/auth_gss/ |
H A D | gss_krb5_wrap.c | 11 * without specific, written prior authorization. If the
|
/linux/Documentation/ABI/stable/ |
H A D | sysfs-class-tpm | 116 owner's authorization. Since the TPM driver doesn't store any
|
/linux/tools/arch/x86/intel_sdsi/ |
H A D | intel_sdsi.c | 270 printf("NVRAM Content Authorization Error Status\n"); in sdsi_read_reg() 282 printf("Authorization Failure Count\n"); in sdsi_read_reg()
|
/linux/arch/s390/include/asm/ |
H A D | cio.h | 83 * @auth: authorization check
|