| /linux/Documentation/usb/ |
| H A D | authorization.rst | 21 $ echo 1 > /sys/bus/usb/devices/DEVICE/authorized 25 $ echo 0 > /sys/bus/usb/devices/DEVICE/authorized 36 By default, all USB devices are authorized. Writing "2" to the 60 echo 1 > $device_path/authorized 73 echo 1 > authorized # temporarily authorize it 83 echo 0 > authorized 103 $ echo 1 > /sys/bus/usb/devices/INTERFACE/authorized 107 $ echo 0 > /sys/bus/usb/devices/INTERFACE/authorized 121 So all interfaces would authorized per default. 124 If a deauthorized interface will be authorized so the driver probing must [all …]
|
| /linux/drivers/usb/core/ |
| H A D | trace.h | 23 __field(unsigned, authorized) 30 __entry->authorized = udev->authorized; 37 __entry->authorized ? "authorized" : "unauthorized")
|
| H A D | message.c | 1794 if (intf->authorized) { in usb_deauthorize_interface() 1796 intf->authorized = 0; in usb_deauthorize_interface() 1814 if (!intf->authorized) { in usb_authorize_interface() 1816 intf->authorized = 1; /* authorize interface */ in usb_authorize_interface() 2004 if (dev->authorized == 0 || configuration == -1) in usb_set_configuration() 2111 intf->authorized = !!HCD_INTF_AUTHORIZED(hcd); in usb_set_configuration()
|
| H A D | sysfs.c | 731 return sysfs_emit(buf, "%u\n", usb_dev->authorized); in authorized_show() 755 static DEVICE_ATTR_IGNORE_LOCKDEP(authorized, S_IRUGO | S_IWUSR, 1210 return sysfs_emit(buf, "%u\n", intf->authorized); in interface_authorized_show() 1243 __ATTR(authorized, S_IRUGO | S_IWUSR,
|
| H A D | driver.c | 334 if (udev->authorized == 0) { in usb_probe_interface() 337 } else if (intf->authorized == 0) { in usb_probe_interface() 562 if (!iface->authorized) in usb_driver_claim_interface()
|
| H A D | usb.c | 749 dev->authorized = usb_dev_authorized(dev, usb_hcd); in usb_alloc_dev()
|
| H A D | hub.c | 2755 if (usb_dev->authorized == 0) in usb_deauthorize_device() 2758 usb_dev->authorized = 0; in usb_deauthorize_device() 2772 if (usb_dev->authorized == 1) in usb_authorize_device() 2782 usb_dev->authorized = 1; in usb_authorize_device()
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-bus-thunderbolt | 21 If a device is authorized automatically during boot its 30 de-authorize PCIe tunnel by writing 0 to authorized 50 none All devices are automatically authorized 51 user Devices are only authorized based on writing 52 appropriate value to the authorized attribute 64 What: /sys/bus/thunderbolt/devices/.../authorized 70 authorized, no PCIe devices are available to the system. 73 yet authorized. 78 0 The device will be de-authorized (only supported if 80 1 The device will be authorized and connected [all …]
|
| H A D | sysfs-bus-usb | 1 What: /sys/bus/usb/devices/<INTERFACE>/authorized 7 If a deauthorized interface will be authorized 19 would be authorized by default. 22 What: /sys/bus/usb/device/.../authorized 28 drivers, non-authorized one are not. By default, wired 29 USB devices are authorized.
|
| /linux/Documentation/admin-guide/ |
| H A D | thunderbolt.rst | 28 a database of the authorized devices and prompts users for new connections. 37 ACTION=="add", SUBSYSTEM=="thunderbolt", ATTR{authorized}=="0", ATTR{authorized}="1" 93 device must be authorized by the user before PCIe tunnels are created 105 /sys/bus/thunderbolt/devices/0-1/authorized - 0 112 The ``authorized`` attribute reads 0 which means no PCIe tunnels are 115 # echo 1 > /sys/bus/thunderbolt/devices/0-1/authorized 124 /sys/bus/thunderbolt/devices/0-3/authorized - 0 135 to the ``authorized`` attribute and the PCIe tunnels will be created in 143 # echo 1 > /sys/bus/thunderbolt/devices/0-3/authorized 152 # echo 2 > /sys/bus/thunderbolt/devices/0-3/authorized [all …]
|
| /linux/Documentation/networking/ |
| H A D | mac80211-auth-assoc-deauth.txt | 65 mac80211->driver: sta_state(AP, authorized) 80 userspace->mac80211: authorized 81 mac80211->driver: sta_state(AP, authorized)
|
| /linux/drivers/thunderbolt/ |
| H A D | icm.c | 753 bool authorized = false; in icm_fr_device_connected() local 764 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; in icm_fr_device_connected() 793 !!sw->authorized == authorized) { in icm_fr_device_connected() 874 sw->authorized = authorized; in icm_fr_device_connected() 1234 bool authorized, boot, dual_lane, speed_gen3; in __icm_tr_device_connected() local 1251 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; in __icm_tr_device_connected() 1267 if (tb_route(sw) == route && !!sw->authorized == authorized) { in __icm_tr_device_connected() 1303 sw->authorized = authorized; in __icm_tr_device_connected()
|
| H A D | domain.c | 663 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch() 690 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch_key() 725 if (!parent_sw || !parent_sw->authorized) in tb_domain_challenge_switch_key()
|
| H A D | switch.c | 1795 return sysfs_emit(buf, "%u\n", sw->authorized); in authorized_show() 1804 if (sw && sw->authorized) { in disapprove_switch() 1816 sw->authorized = 0; in disapprove_switch() 1832 if (!!sw->authorized == !!val) in tb_switch_set_authorized() 1863 sw->authorized = val; in tb_switch_set_authorized() 1868 sprintf(envp_string, "AUTHORIZED=%u", sw->authorized); in tb_switch_set_authorized() 1898 static DEVICE_ATTR_RW(authorized); 1970 if (sw->authorized) { in key_store() 2542 sw->authorized = true; in tb_switch_alloc()
|
| H A D | tb.c | 2505 } else if (!port->port && sw->authorized) { in tb_handle_hotplug() 2976 sw->authorized = 1; in tb_scan_finalize_switch()
|
| H A D | tb.h | 200 unsigned int authorized; member
|
| /linux/arch/riscv/crypto/ |
| H A D | Kconfig | 58 as an authorized cryptographic algorithm for use within China.
|
| /linux/drivers/net/wireless/intel/iwlwifi/mld/ |
| H A D | mlo.h | 33 if (!mld_vif->authorized) in iwl_mld_vif_has_emlsr_cap()
|
| /linux/drivers/net/wireless/intel/iwlwifi/mvm/ |
| H A D | mld-mac.c | 141 if (!mvmvif->authorized && in iwl_mvm_mld_mac_ctxt_cmd_sta()
|
| /linux/LICENSES/dual/ |
| H A D | Apache-2.0 | 27 "Licensor" shall mean the copyright owner or entity authorized by the 66 Entity authorized to submit on behalf of the copyright owner. For the
|
| H A D | CC-BY-4.0 | 39 intended for use by those authorized to give the public 178 simply making modifications authorized by this Section 2(a)
|
| /linux/security/ |
| H A D | Kconfig | 127 designated as unlabelled, and only sockets authorized
|
| /linux/Documentation/netlabel/ |
| H A D | draft-ietf-cipso-ipsecurity-01.txt | 450 a CIPSO host is authorized to handle. All datagrams that have a label 468 a CIPSO host is authorized to handle. All datagrams that have a label less
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 128 authorized reference value (digest, signature, etc) as per the defined 146 IPE does not mitigate threats arising from malicious but authorized
|
| /linux/net/mac80211/ |
| H A D | tx.c | 2615 bool wme_sta = false, authorized = false; in ieee80211_build_hdr() local 2651 authorized = test_sta_flag(sta, WLAN_STA_AUTHORIZED); in ieee80211_build_hdr() 2847 authorized = test_sta_flag(sta, WLAN_STA_AUTHORIZED); in ieee80211_build_hdr() 2866 !multicast && !authorized && in ieee80211_build_hdr()
|