/openbmc/openbmc-build-scripts/jenkins/ |
H A D | userid-validation | 53 aimvalley/ci-authorized \ 54 akamai/ci-authorized \ 55 alibaba/ci-authorized \ 56 amd/ci-authorized \ 57 ami/ci-authorized \ 58 ampere/ci-authorized \ 59 arm/ci-authorized \ 60 aspeed/ci-authorized \ 61 asus/ci-authorized \ 62 bytedance/ci-authorized \ [all …]
|
/openbmc/docs/designs/ |
H A D | ci-authorization.md | 49 authorized for CI. 58 group: `openbmc/ci-authorized` 60 group: `xyzcorp/ci-authorized` 62 group: `abccorp/ci-authorized` 64 The openbmc/ci-authorized group can contain users that are not associated with 67 group: `openbmc/ci-authorized` contains -> 69 group `xyzcorp/ci-authorized` 71 group `abccorp/ci-authorized` 80 group: `xyzcorp/ci-authorized-owners` administers -> `xyzcorp/ci-authorized` 82 group: `abccorp/ci-authorized-owners` administers -> `abccorp/ci-authorized` [all …]
|
/openbmc/linux/Documentation/usb/ |
H A D | authorization.rst | 21 $ echo 1 > /sys/bus/usb/devices/DEVICE/authorized 25 $ echo 0 > /sys/bus/usb/devices/DEVICE/authorized 36 By default, all USB devices are authorized. Writing "2" to the 60 echo 1 > $device_path/authorized 73 echo 1 > authorized # temporarily authorize it 83 echo 0 > authorized 103 $ echo 1 > /sys/bus/usb/devices/INTERFACE/authorized 107 $ echo 0 > /sys/bus/usb/devices/INTERFACE/authorized 121 So all interfaces would authorized per default. 124 If a deauthorized interface will be authorized so the driver probing must [all …]
|
/openbmc/openbmc/meta-google/recipes-google/ssh/ |
H A D | authorized-keys-comp.bb | 9 file://authorized-keys-comp.service \ 10 file://authorized-keys-comp.sh \ 18 SYSTEMD_SERVICE:${PN} += "authorized-keys-comp.service" 26 install -m0755 authorized-keys-comp.sh ${D}${libexecdir}/ 29 install -m0644 authorized-keys-comp.service ${D}${systemd_system_unitdir}/
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | thunderbolt.rst | 28 a database of the authorized devices and prompts users for new connections. 37 ACTION=="add", SUBSYSTEM=="thunderbolt", ATTR{authorized}=="0", ATTR{authorized}="1" 93 device must be authorized by the user before PCIe tunnels are created 105 /sys/bus/thunderbolt/devices/0-1/authorized - 0 112 The ``authorized`` attribute reads 0 which means no PCIe tunnels are 115 # echo 1 > /sys/bus/thunderbolt/devices/0-1/authorized 124 /sys/bus/thunderbolt/devices/0-3/authorized - 0 135 to the ``authorized`` attribute and the PCIe tunnels will be created in 143 # echo 1 > /sys/bus/thunderbolt/devices/0-3/authorized 152 # echo 2 > /sys/bus/thunderbolt/devices/0-3/authorized [all …]
|
/openbmc/qemu/include/authz/ |
H A D | base.h | 62 * Check if a user @identity is authorized. If an error 68 * authorized, it is merely for benefit of administrator 71 * Returns: true if @identity is authorized, false if denied or if 85 * Check if a user @identity is authorized. If an error 91 * authorized, it is merely for benefit of administrator 94 * Returns: true if @identity is authorized, false if denied or if
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-thunderbolt | 21 If a device is authorized automatically during boot its 30 de-authorize PCIe tunnel by writing 0 to authorized 50 none All devices are automatically authorized 51 user Devices are only authorized based on writing 52 appropriate value to the authorized attribute 64 What: /sys/bus/thunderbolt/devices/.../authorized 70 authorized, no PCIe devices are available to the system. 73 yet authorized. 78 0 The device will be de-authorized (only supported if 80 1 The device will be authorized and connected [all …]
|
H A D | sysfs-bus-usb | 1 What: /sys/bus/usb/devices/<INTERFACE>/authorized 7 If a deauthorized interface will be authorized 19 would be authorized by default. 22 What: /sys/bus/usb/device/.../authorized 27 Authorized devices are available for use by device 28 drivers, non-authorized one are not. By default, wired 29 USB devices are authorized.
|
/openbmc/linux/Documentation/networking/ |
H A D | mac80211-auth-assoc-deauth.txt | 65 mac80211->driver: sta_state(AP, authorized) 80 userspace->mac80211: authorized 81 mac80211->driver: sta_state(AP, authorized)
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | CECILL-1.1 | 95 The Licensee is authorized to use the Software, unrestrictedly, as regards the fields of applicatio… 104 The Licensee is authorized to make any or all Contribution to the Software provided that it explici… 108 …f the Software by means of any or all process. The Licensee is further authorized to redistribute … 112 The Licensee is authorized to redistribute true copies of the Software in Source Code or Object Cod… 123 The Licensee is authorized to redistribute the Modified Software, in Source Code or Object Code for… 136 … that is subject to the provisions of the GPL License, the Licensee is authorized to redistribute … 138 … that is subject to the provisions of the GPL License, the Licensee is authorized to redistribute … 197 10.2. The Licensee whose Agreement is terminated shall no longer be authorized to use, modify or di… 207 …gards the Parties unless it is made in writing and signed by their duly authorized representatives. 217 12.1. Any or all person is authorized to duplicate and distribute copies of this Agreement.
|
H A D | CECILL-2.1 | 196 The Licensee is authorized to use the Software, without any limitation 220 The Licensee is authorized to make any or all Contributions to the 233 The Licensee is further authorized to distribute copies of the modified 240 The Licensee is authorized to distribute true copies of the Software in 263 The Licensee is authorized to distribute the Modified Software, in 445 authorized to use, modify or distribute the Software. However, any 474 unless it is made in writing and signed by their duly authorized 494 12.1 Any person is authorized to duplicate and distribute copies of this
|
H A D | 3D-Slicer-1.0 | 37 legally authorized and entitled to make such Contribution and to 45 properly authorized and in compliance with all applicable laws and 131 authorized by a third party to grant to you, and accordingly you
|
H A D | Unicode-TOU | 9 …gend indicating that "Modification is permitted." Any person is hereby authorized, without fee, to… 11 …3. Any person is hereby authorized, without fee, to view, use, reproduce, and distribute all docum…
|
H A D | metamail | 9 of an authorized representative of Bellcore. BELLCORE
|
H A D | cve-tou | 5 such purposes is authorized provided that you reproduce MITRE's copyright
|
H A D | Community-Spec-1.0 | 73 authorized representative, including the Implementer’s name, authorized 185 a third party, Contributor represents that they have been authorized by
|
/openbmc/phosphor-dbus-interfaces/yaml/com/ibm/Dump/Entry/ |
H A D | Resource.interface.yaml | 28 operations and ensure they are initiated only by authorized personnel, 34 the host can check that only authorized users are allowed to perform
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Dump/Entry/ |
H A D | System.interface.yaml | 45 operations and ensure they are initiated only by authorized personnel, 51 the host can check that only authorized users are allowed to perform
|
/openbmc/openbmc/meta-google/recipes-google/ssh/authorized-keys-comp/ |
H A D | authorized-keys-comp.service | 3 ExecStart=/usr/libexec/authorized-keys-comp.sh
|
/openbmc/linux/drivers/usb/core/ |
H A D | sysfs.c | 724 /* show if the device is authorized (1) or not (0) */ 729 return sysfs_emit(buf, "%u\n", usb_dev->authorized); in authorized_show() 753 static DEVICE_ATTR_IGNORE_LOCKDEP(authorized, S_IRUGO | S_IWUSR, 946 * for initializing the authorized attribute of interfaces 962 * for initializing the authorized attribute of interfaces 1154 * 1 is authorized, 0 is deauthorized 1161 return sysfs_emit(buf, "%u\n", intf->authorized); in interface_authorized_show() 1194 __ATTR(authorized, S_IRUGO | S_IWUSR,
|
/openbmc/linux/arch/powerpc/platforms/pseries/ |
H A D | papr-sysparm.c | 128 case -9002: /* this partition not authorized to retrieve this parameter */ in papr_sysparm_get() 181 case -9002: /* this partition not authorized to modify this parameter */ in papr_sysparm_set()
|
/openbmc/openbmc/meta-openembedded/meta-oe/licenses/ |
H A D | Bellcore | 9 of an authorized representative of Bellcore. BELLCORE
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | License.v1_1_3.json | 277 "description": "The maximum number of devices authorized by the license.", 278 …": "This property shall contain the maximum number of devices that are authorized by the license. … 415 "description": "An array of links to the devices authorized by the license.", 419 …"This property shall contain an array of links to the devices that are authorized by the license. …
|
/openbmc/linux/drivers/thunderbolt/ |
H A D | domain.c | 650 /* The parent switch must be authorized before this one */ in tb_domain_approve_switch() 652 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch() 677 /* The parent switch must be authorized before this one */ in tb_domain_approve_switch_key() 679 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch_key() 714 /* The parent switch must be authorized before this one */ in tb_domain_challenge_switch_key() 716 if (!parent_sw || !parent_sw->authorized) in tb_domain_challenge_switch_key()
|
/openbmc/linux/arch/hexagon/include/asm/ |
H A D | uaccess.h | 19 * be authorized to fault, and the address at which execution should
|