/openbmc/linux/drivers/gpu/drm/etnaviv/ |
H A D | etnaviv_gpu.c | 45 *value = gpu->identity.model; in etnaviv_gpu_get_param() 49 *value = gpu->identity.revision; in etnaviv_gpu_get_param() 53 *value = gpu->identity.features; in etnaviv_gpu_get_param() 57 *value = gpu->identity.minor_features0; in etnaviv_gpu_get_param() 61 *value = gpu->identity.minor_features1; in etnaviv_gpu_get_param() 65 *value = gpu->identity.minor_features2; in etnaviv_gpu_get_param() 69 *value = gpu->identity.minor_features3; in etnaviv_gpu_get_param() 73 *value = gpu->identity.minor_features4; in etnaviv_gpu_get_param() 77 *value = gpu->identity.minor_features5; in etnaviv_gpu_get_param() 81 *value = gpu->identity.minor_features6; in etnaviv_gpu_get_param() [all …]
|
H A D | etnaviv_perfmon.c | 65 for (i = 0; i < gpu->identity.pixel_pipes; i++) { in pipe_perf_reg_read() 84 for (i = 0; i < gpu->identity.pixel_pipes; i++) { in pipe_reg_read() 101 if (gpu->identity.model == chipModel_GC880 || in hi_total_cycle_read() 102 gpu->identity.model == chipModel_GC2000 || in hi_total_cycle_read() 103 gpu->identity.model == chipModel_GC2100) in hi_total_cycle_read() 115 if (gpu->identity.model == chipModel_GC880 || in hi_total_idle_cycle_read() 116 gpu->identity.model == chipModel_GC2000 || in hi_total_idle_cycle_read() 117 gpu->identity.model == chipModel_GC2100) in hi_total_idle_cycle_read() 469 if (gpu->identity.features & meta->feature) in num_pm_domains() 485 if (!(gpu->identity.features & meta->feature)) in pm_domain()
|
/openbmc/qemu/authz/ |
H A D | simple.c | 28 const char *identity, in qauthz_simple_is_allowed() argument 33 trace_qauthz_simple_is_allowed(authz, sauthz->identity, identity); in qauthz_simple_is_allowed() 34 return g_str_equal(identity, sauthz->identity); in qauthz_simple_is_allowed() 44 g_free(sauthz->identity); in qauthz_simple_prop_set_identity() 45 sauthz->identity = g_strdup(value); in qauthz_simple_prop_set_identity() 55 return g_strdup(sauthz->identity); in qauthz_simple_prop_get_identity() 64 g_free(sauthz->identity); in qauthz_simple_finalize() 73 if (!sauthz->identity) { in qauthz_simple_complete() 74 error_setg(errp, "The 'identity' property must be set"); in qauthz_simple_complete() 89 object_class_property_add_str(oc, "identity", in qauthz_simple_class_init() [all …]
|
H A D | trace-events | 4 qauthz_is_allowed(void *authz, const char *identity, bool allowed) "AuthZ %p check identity=%s allo… 7 …ar *wantidentity, const char *gotidentity) "AuthZ simple %p check want identity=%s got identity=%s" 10 …k_rule(void *authz, const char *identity, const char *rule, int format, int policy) "AuthZ list %p… 11 …uthz_list_default_policy(void *authz, const char *identity, int policy) "AuthZ list %p default ide… 18 qauthz_pam_check(void *authz, const char *identity, const char *service) "AuthZ PAM %p identity=%s …
|
H A D | base.c | 27 const char *identity, in qauthz_is_allowed() argument 33 allowed = cls->is_allowed(authz, identity, errp); in qauthz_is_allowed() 34 trace_qauthz_is_allowed(authz, identity, allowed); in qauthz_is_allowed() 41 const char *identity, in qauthz_is_allowed_by_id() argument 65 return qauthz_is_allowed(authz, identity, errp); in qauthz_is_allowed_by_id()
|
H A D | pamacct.c | 31 const char *identity, in qauthz_pam_is_allowed() argument 39 trace_qauthz_pam_check(authz, identity, pauthz->service); in qauthz_pam_is_allowed() 41 identity, in qauthz_pam_is_allowed() 54 identity, pam_strerror(pamh, ret)); in qauthz_pam_is_allowed()
|
/openbmc/qemu/include/authz/ |
H A D | base.h | 51 const char *identity, 59 * @identity: the user identity to authorize 62 * Check if a user @identity is authorized. If an error 71 * Returns: true if @identity is authorized, false if denied or if 75 const char *identity, 82 * @identity: the user identity to authorize 85 * Check if a user @identity is authorized. If an error 94 * Returns: true if @identity is authorized, false if denied or if 98 const char *identity,
|
H A D | simple.h | 48 * "identity": "fred" 55 * -object authz-simple,id=authz0,identity=fred 61 char *identity; member 68 const char *identity,
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-typec | 211 What: /sys/class/typec/<port>-partner/identity/ 216 of showing the result of Discover Identity USB power delivery 221 in Discover Identity command result. 271 USB Type-C partner/cable Power Delivery Identity objects 279 What: /sys/class/typec/<port>-{partner|cable}/identity/ 284 of showing the result of Discover Identity USB power delivery 289 in Discover Identity command result. 291 What: /sys/class/typec/<port>-{partner|cable}/identity/id_header 295 ID Header VDO part of Discover Identity command result. The 296 value will show 0 until Discover Identity command result becomes [all …]
|
H A D | sysfs-devices-soc | 31 code. The format is "jep106:XXYY" where XX is identity code and 41 The specified mechanism is that an identity code of 0x7F 43 of an additional identity code field, and this mechanism 45 by the manufacturer's identity code. 47 For example, ARM has identity code 0x7F 0x7F 0x7F 0x7F 0x3B, 49 as JEP106 identity code of 0x3B and a continuation code of 51 identity code. 70 vendors. The format is "jep106:XXYY:ZZZZ" where XX is identity
|
/openbmc/qemu/docs/system/ |
H A D | authz.rst | 8 their identity. If the authorization identity database is scoped to the QEMU 9 client this may be sufficient. It is common, however, for the identity database 14 Identity providers 18 that emit an identity upon completion. 29 the client provide a certificate to the server to prove its own identity. 36 the certificate can be used as an identity in the QEMU authorization 61 based on an exact match against a single identity. This is useful when it is 67 thus be used as the identity to match against. Alternatively if the virtual 80 "identity": "fred" 89 -object authz-simple,id=authz0,identity=fred [all …]
|
/openbmc/linux/drivers/media/dvb-frontends/ |
H A D | dib0090.c | 166 struct dib0090_identity identity; member 190 struct dib0090_identity identity; member 331 struct dib0090_identity *identity = &state->identity; in dib0090_identify() local 335 identity->p1g = 0; in dib0090_identify() 336 identity->in_soc = 0; in dib0090_identify() 343 identity->version = v & 0xff; in dib0090_identify() 344 identity->product = (v >> 8) & 0xf; in dib0090_identify() 346 if (identity->product != KROSUS) in dib0090_identify() 349 if ((identity->version & 0x3) == SOC) { in dib0090_identify() 350 identity->in_soc = 1; in dib0090_identify() [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Attestation/ |
H A D | IdentityAuthentication.interface.yaml | 2 Implement to represent properties related to Identity Authentication using 10 The status of the verification of the identity of the component. 17 certificate that provides the requester's identity. 26 certificate that provides the responder's identity.
|
/openbmc/linux/include/linux/usb/ |
H A D | typec.h | 104 * struct usb_pd_identity - USB Power Delivery identity data 110 * USB power delivery Discover Identity command response data. 186 * @identity: Result of Discover Identity command 194 struct usb_pd_identity *identity; member 203 * @identity: Discover Identity command data 206 * Details about a partner that is attached to USB Type-C port. If @identity 207 * member exists when partner is registered, a directory named "identity" is 218 struct usb_pd_identity *identity; member
|
/openbmc/linux/fs/nls/ |
H A D | nls_utf8.c | 12 static unsigned char identity[256]; variable 47 .charset2lower = identity, /* no conversion */ 48 .charset2upper = identity, 55 identity[i] = i; in init_nls_utf8()
|
/openbmc/qemu/qapi/ |
H A D | authz.json | 43 # @match: a string or glob to match against a user identity 109 # @identity: Identifies the allowed user. Its format depends on the 111 # For authorizing based on TLS x509 certificates, the identity 117 'data': { 'identity': 'str' } }
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | ComponentIntegrity.v1_3_0.json | 43 …"longDescription": "This object shall contain common identity-related authentication information.", 61 … "description": "A link to the certificate that represents the identity of the component.", 62 … contain a link to a resource of type `Certificate` that represents the identity of the component … 74 … "description": "The status of the verification of the identity of the component.", 75 …on": "This property shall contain the status of the verification of the identity of the component … 529 … "description": "Identity authentication information about the SPDM Requester and SPDM Responder.", 530 …"longDescription": "This object shall contain identity authentication information about the SPDM R… 555 … "description": "Authentication information of the identity of the SPDM Requester.", 556 …iption": "This property shall contain authentication information of the identity of the SPDM Reque… 567 … "description": "Authentication information of the identity of the SPDM Responder.", [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
H A D | ComponentIntegrity.v1_3_0.json | 43 …"longDescription": "This object shall contain common identity-related authentication information.", 61 … "description": "A link to the certificate that represents the identity of the component.", 62 … contain a link to a resource of type `Certificate` that represents the identity of the component … 74 … "description": "The status of the verification of the identity of the component.", 75 …on": "This property shall contain the status of the verification of the identity of the component … 529 … "description": "Identity authentication information about the SPDM Requester and SPDM Responder.", 530 …"longDescription": "This object shall contain identity authentication information about the SPDM R… 555 … "description": "Authentication information of the identity of the SPDM Requester.", 556 …iption": "This property shall contain authentication information of the identity of the SPDM Reque… 567 … "description": "Authentication information of the identity of the SPDM Responder.", [all …]
|
/openbmc/linux/Documentation/arch/ia64/ |
H A D | aliasing.rst | 58 in the system because of constraints imposed by the identity mapping 64 Kernel Identity Mappings 67 Linux/ia64 identity mappings are done with large pages, currently 72 identity mapping only when the entire granule supports cacheable 76 can referenced safely by an identity mapping. 80 software. This allows UC identity mappings to cover granules that 102 by a kernel identity mapping, the user mapping must use the same 143 identity mapping. This is obviously safe for things in 196 This mmap is done with user pages, not kernel identity mappings,
|
/openbmc/linux/arch/arm/mm/ |
H A D | idmap.c | 16 * Note: accesses outside of the kernel image and the identity map area 33 pr_warn("Failed to allocate identity pmd.\n"); in idmap_add_pmd() 96 pr_info("Setting up static identity map for 0x%lx - 0x%lx\n", addr, end); in identity_mapping_add() 136 /* Switch to the identity mapping. */ in setup_mm_for_reboot() 142 * We don't have a clean ASID for the identity mapping, which in setup_mm_for_reboot()
|
/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/ |
H A D | wpa_supplicant.conf | 281 # identity: Identity string for EAP 282 # anonymous_identity: Anonymous identity string for EAP (to be used as the 283 # unencrypted identity with EAP types that support different tunnelled 284 # identity, e.g., EAP-TTLS) 462 identity="user@example.com" 476 identity="user@example.com" 484 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 485 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 490 identity="user@example.com" 497 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/poppler/ |
H A D | poppler-data_0.4.12.bb | 18 ${CMAP_RESOURCES_BASE}/Identity-H;name=idh \ 19 ${CMAP_RESOURCES_BASE}/Identity-V;name=idv" 33 install -m644 ${UNPACKDIR}/Identity-* ${D}${datadir}/poppler/cMap/
|
/openbmc/linux/include/linux/platform_data/ |
H A D | mlxreg.h | 75 * @identity: notifier identity name; 80 char identity[MLXREG_CORE_LABEL_MAX_SIZE]; member 193 * @identity: device identity name; 202 char identity[MLXREG_CORE_LABEL_MAX_SIZE]; member
|
/openbmc/phosphor-logging/extensions/openpower-pels/ |
H A D | callout.hpp | 28 * * FRU Identity (must be first if present) 47 // Leaving out the various PCE identity ones since 237 * @brief Returns the FRU identity substructure 247 * @brief Returns the PCE identity substructure 257 * @brief Returns the MRU identity substructure 325 * @brief FRU (Field Replaceable Unit) Identity substructure 330 * @brief PCE (Power Controlling Enclosure) Identity substructure
|
/openbmc/linux/drivers/watchdog/ |
H A D | sb_wdog.c | 100 .identity = "SiByte Watchdog", 132 ident.identity); in sbwdog_release() 278 ident.identity, in sbwdog_interrupt() 298 ident.identity, ret); in sbwdog_init() 307 ident.identity, (void *)user_dog); in sbwdog_init() 310 ident.identity, ret); in sbwdog_init() 317 ident.identity, in sbwdog_init()
|