Home
last modified time | relevance | path

Searched refs:authorization (Results 1 – 18 of 18) sorted by relevance

/linux-6.15/tools/perf/arch/s390/util/
H A Dheader.c33 char type[8], model[33], version[8], manufacturer[32], authorization[8]; in get_cpuid() local
54 memset(authorization, 0, sizeof(authorization)); in get_cpuid()
120 atsize += scnprintf(authorization + atsize, in get_cpuid()
121 sizeof(authorization) - atsize, "%s", sep + 1); in get_cpuid()
130 if (version[0] && authorization[0] ) in get_cpuid()
133 authorization); in get_cpuid()
/linux-6.15/drivers/usb/core/
H A DKconfig121 int "Default authorization mode for USB devices"
126 Select the default USB device authorization mode. Can be overridden
134 hub require user space authorization before they can be used.
136 With value 1 (default) no user space authorization is required to
140 USB devices require user space authorization before they can be
/linux-6.15/Documentation/usb/
H A Dindex.rst9 authorization
H A Dauthorization.rst95 Interface authorization
/linux-6.15/Documentation/ABI/removed/
H A Dsysfs-selinux-checkreqprot16 without authorization by policy. The default value of checkreqprot
/linux-6.15/LICENSES/deprecated/
H A DX1134 dealings in this Software without prior written authorization from the X
/linux-6.15/Documentation/security/keys/
H A Dtrusted-encrypted.rst186 default authorization value (20 bytes of 0s). This can be set at takeownership
227 policydigest= digest for the authorization policy. must be calculated
230 policyhandle= handle to an authorization policy session that defines the
453 emptyAuth is true if the key has well known authorization "". If it
454 is false or not present, the key requires an explicit authorization
/linux-6.15/arch/s390/boot/
H A Dhead.S280 .quad 0 # cr3: instruction authorization
281 .quad 0xffff # cr4: instruction authorization
/linux-6.15/Documentation/security/tpm/
H A Dtpm-security.rst86 either hierarchy would not have some type of authorization.
91 physically cannot have an authorization, so we are always able to use
135 authorization secret, but for a lot of kernel operations that is well
/linux-6.15/Documentation/admin-guide/LSM/
H A Dipe.rst118 authorization criteria, IPE will deny its execution. Additionally, IPE
223 authorization of the policies (prohibiting an attacker from gaining
581 This property can be utilized for authorization of files from initramfs.
603 This property can be utilized for authorization or revocation of
629 This property can be utilized for authorization of all dm-verity
644 This property can be utilized for authorization of specific fsverity
/linux-6.15/Documentation/filesystems/nfs/
H A Drpc-server-gss.rst58 beyond 64KiB in size due to various authorization extensions attacked to
/linux-6.15/Documentation/ABI/testing/
H A Dsysfs-bus-thunderbolt29 de-authorization of devices. Value of 1 means user can
119 authorization to use the secure connection method instead.
H A Dsysfs-bus-usb6 in contrast to the device authorization.
/linux-6.15/Documentation/ABI/stable/
H A Dsysfs-class-tpm116 owner's authorization. Since the TPM driver doesn't store any
/linux-6.15/Documentation/admin-guide/
H A Dthunderbolt.rst121 a random 32-byte value used for authorization and challenging the device in
H A Dkernel-parameters.txt7579 [USB] Default USB device authorization:
/linux-6.15/Documentation/filesystems/
H A Dfsverity.rst92 "IPE policy" specifically allows for the authorization of fs-verity
/linux-6.15/Documentation/admin-guide/cifs/
H A Dusage.rst311 checks (authorization checks) on accesses to a file occur