Searched refs:authorization (Results 1 – 18 of 18) sorted by relevance
| /linux-6.15/tools/perf/arch/s390/util/ |
| H A D | header.c | 33 char type[8], model[33], version[8], manufacturer[32], authorization[8]; in get_cpuid() local 54 memset(authorization, 0, sizeof(authorization)); in get_cpuid() 120 atsize += scnprintf(authorization + atsize, in get_cpuid() 121 sizeof(authorization) - atsize, "%s", sep + 1); in get_cpuid() 130 if (version[0] && authorization[0] ) in get_cpuid() 133 authorization); in get_cpuid()
|
| /linux-6.15/drivers/usb/core/ |
| H A D | Kconfig | 121 int "Default authorization mode for USB devices" 126 Select the default USB device authorization mode. Can be overridden 134 hub require user space authorization before they can be used. 136 With value 1 (default) no user space authorization is required to 140 USB devices require user space authorization before they can be
|
| /linux-6.15/Documentation/usb/ |
| H A D | index.rst | 9 authorization
|
| H A D | authorization.rst | 95 Interface authorization
|
| /linux-6.15/Documentation/ABI/removed/ |
| H A D | sysfs-selinux-checkreqprot | 16 without authorization by policy. The default value of checkreqprot
|
| /linux-6.15/LICENSES/deprecated/ |
| H A D | X11 | 34 dealings in this Software without prior written authorization from the X
|
| /linux-6.15/Documentation/security/keys/ |
| H A D | trusted-encrypted.rst | 186 default authorization value (20 bytes of 0s). This can be set at takeownership 227 policydigest= digest for the authorization policy. must be calculated 230 policyhandle= handle to an authorization policy session that defines the 453 emptyAuth is true if the key has well known authorization "". If it 454 is false or not present, the key requires an explicit authorization
|
| /linux-6.15/arch/s390/boot/ |
| H A D | head.S | 280 .quad 0 # cr3: instruction authorization 281 .quad 0xffff # cr4: instruction authorization
|
| /linux-6.15/Documentation/security/tpm/ |
| H A D | tpm-security.rst | 86 either hierarchy would not have some type of authorization. 91 physically cannot have an authorization, so we are always able to use 135 authorization secret, but for a lot of kernel operations that is well
|
| /linux-6.15/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 118 authorization criteria, IPE will deny its execution. Additionally, IPE 223 authorization of the policies (prohibiting an attacker from gaining 581 This property can be utilized for authorization of files from initramfs. 603 This property can be utilized for authorization or revocation of 629 This property can be utilized for authorization of all dm-verity 644 This property can be utilized for authorization of specific fsverity
|
| /linux-6.15/Documentation/filesystems/nfs/ |
| H A D | rpc-server-gss.rst | 58 beyond 64KiB in size due to various authorization extensions attacked to
|
| /linux-6.15/Documentation/ABI/testing/ |
| H A D | sysfs-bus-thunderbolt | 29 de-authorization of devices. Value of 1 means user can 119 authorization to use the secure connection method instead.
|
| H A D | sysfs-bus-usb | 6 in contrast to the device authorization.
|
| /linux-6.15/Documentation/ABI/stable/ |
| H A D | sysfs-class-tpm | 116 owner's authorization. Since the TPM driver doesn't store any
|
| /linux-6.15/Documentation/admin-guide/ |
| H A D | thunderbolt.rst | 121 a random 32-byte value used for authorization and challenging the device in
|
| H A D | kernel-parameters.txt | 7579 [USB] Default USB device authorization:
|
| /linux-6.15/Documentation/filesystems/ |
| H A D | fsverity.rst | 92 "IPE policy" specifically allows for the authorization of fs-verity
|
| /linux-6.15/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 311 checks (authorization checks) on accesses to a file occur
|