/openbmc/linux/drivers/usb/cdns3/ |
H A D | core.c | 40 if (!cdns->roles[role]) in cdns_role_start() 43 if (cdns->roles[role]->state == CDNS_ROLE_STATE_ACTIVE) in cdns_role_start() 47 ret = cdns->roles[role]->start(cdns); in cdns_role_start() 49 cdns->roles[role]->state = CDNS_ROLE_STATE_ACTIVE; in cdns_role_start() 62 if (cdns->roles[role]->state == CDNS_ROLE_STATE_INACTIVE) in cdns_role_stop() 66 cdns->roles[role]->stop(cdns); in cdns_role_stop() 67 cdns->roles[role]->state = CDNS_ROLE_STATE_INACTIVE; in cdns_role_stop() 289 cdns->roles[USB_ROLE_NONE] = rdrv; in cdns_idle_init() 515 if (cdns->roles[cdns->role]->suspend) { in cdns_suspend() 517 cdns->roles[cdns->role]->suspend(cdns, false); in cdns_suspend() [all …]
|
H A D | core.h | 105 struct cdns_role_driver *roles[USB_ROLE_DEVICE + 1]; member
|
/openbmc/linux/drivers/usb/chipidea/ |
H A D | ci.h | 220 struct ci_role_driver *roles[CI_ROLE_END]; member 274 BUG_ON(ci->role >= CI_ROLE_END || !ci->roles[ci->role]); in ci_role() 275 return ci->roles[ci->role]; in ci_role() 285 if (!ci->roles[role]) in ci_role_start() 288 ret = ci->roles[role]->start(ci); in ci_role_start() 314 ci->roles[role]->stop(ci); in ci_role_stop() 466 return ci->is_otg && ci->roles[CI_ROLE_HOST] && in ci_otg_is_fsm_mode() 467 ci->roles[CI_ROLE_GADGET] && (otg_caps->srp_support || in ci_otg_is_fsm_mode()
|
H A D | core.c | 651 if (ci->roles[CI_ROLE_HOST] && ci->roles[CI_ROLE_GADGET]) { in ci_get_role() 664 role = ci->roles[CI_ROLE_HOST] ? CI_ROLE_HOST in ci_get_role() 952 if (ci->roles[CI_ROLE_HOST] && ci->roles[CI_ROLE_GADGET]) in ci_hdrc_query_available_role() 954 else if (ci->roles[CI_ROLE_HOST]) in ci_hdrc_query_available_role() 956 else if (ci->roles[CI_ROLE_GADGET]) in ci_hdrc_query_available_role() 967 if (ci->is_otg && ci->roles[CI_ROLE_GADGET]) in ci_role_destroy() 1005 if (!(ci->roles[CI_ROLE_HOST] && ci->roles[CI_ROLE_GADGET])) { in role_store() 1011 if (!strncmp(buf, ci->roles[role]->name, in role_store() 1012 strlen(ci->roles[role]->name))) in role_store() 1179 if (!ci->roles[CI_ROLE_HOST] && !ci->roles[CI_ROLE_GADGET]) { in ci_hdrc_probe() [all …]
|
/openbmc/docs/designs/ |
H A D | redfish-authorization.md | 24 In the privilege model, there are fixed set of standard Redfish roles and each 26 `ConfigureManager`, etc). A service may define custom OEM roles (read-only). A 27 service may even allow custom client-defined roles to be created, modified, and 47 **Note**, in the Redfish spec, OEM roles can be added via POST to the 55 3. https://redfish.dmtf.org/schemas/DSP0266_1.15.1.html#roles 95 convert the privileges to Redfish roles. The hardcoded map is listed below: 126 …/github.com/openbmc/bmcweb/blob/d9f6c621036162e9071ce3c3a333b4544c6db870/redfish-core/lib/roles.hpp 134 2. the mapping from Phosphor-user-manager privileges to Redfish roles 135 3. the set of Redfish roles 136 4. the mapping from Redfish roles to Redfish Privileges [all …]
|
/openbmc/linux/drivers/usb/roles/ |
H A D | Makefile | 3 obj-$(CONFIG_USB_ROLE_SWITCH) += roles.o 4 roles-y := class.o
|
H A D | Kconfig | 12 Say Y here if your USB connectors support both device and host roles. 14 called roles.ko.
|
/openbmc/webui-vue/src/router/ |
H A D | routes.js | 37 const roles = { class 282 exclusiveToRoles: [roles.administrator], 299 exclusiveToRoles: [roles.administrator], 314 export { routes as default, roles };
|
/openbmc/webui-vue/src/env/components/AppNavigation/ |
H A D | intel.js | 11 const roles = { class 96 exclusiveToRoles: [roles.administrator], 107 exclusiveToRoles: [roles.administrator],
|
/openbmc/webui-vue/src/components/AppNavigation/ |
H A D | AppNavigationMixin.js | 10 const roles = { class 110 exclusiveToRoles: [roles.administrator], 121 exclusiveToRoles: [roles.administrator],
|
/openbmc/linux/include/scsi/ |
H A D | scsi_transport_srp.h | 14 u8 roles; member 59 u8 roles; member
|
H A D | scsi_transport_fc.h | 184 u32 roles; member 229 u32 roles; member 286 u32 roles; member 366 u32 roles; member 786 if (rport->roles & FC_PORT_ROLE_FCP_TARGET) in fc_remote_port_chkready() 843 void fc_remote_port_rolechg(struct fc_rport *rport, u32 roles);
|
/openbmc/webui-vue/src/env/router/ |
H A D | intel.js | 30 const roles = { class 227 exclusiveToRoles: [roles.administrator], 244 exclusiveToRoles: [roles.administrator],
|
/openbmc/linux/drivers/scsi/ |
H A D | scsi_transport_fc.c | 771 (rport->roles & FC_PORT_ROLE_FCP_TARGET || in fc_fpin_li_stats_update() 772 rport->roles & FC_PORT_ROLE_NVME_TARGET)) { in fc_fpin_li_stats_update() 784 (rport->roles & FC_PORT_ROLE_FCP_TARGET || in fc_fpin_li_stats_update() 785 rport->roles & FC_PORT_ROLE_NVME_TARGET)) { in fc_fpin_li_stats_update() 818 (rport->roles & FC_PORT_ROLE_FCP_TARGET || in fc_fpin_delivery_stats_update() 819 rport->roles & FC_PORT_ROLE_NVME_TARGET)) { in fc_fpin_delivery_stats_update() 851 (rport->roles & FC_PORT_ROLE_FCP_TARGET || in fc_fpin_peer_congn_stats_update() 852 rport->roles & FC_PORT_ROLE_NVME_TARGET)) { in fc_fpin_peer_congn_stats_update() 864 (rport->roles & FC_PORT_ROLE_FCP_TARGET || in fc_fpin_peer_congn_stats_update() 865 rport->roles & FC_PORT_ROLE_NVME_TARGET)) { in fc_fpin_peer_congn_stats_update() [all …]
|
/openbmc/webui-vue/src/store/modules/Authentication/ |
H A D | AuthenticanStore.js | 4 import { roles } from '@/router/routes'; 114 commit('global/setPrivilege', data.Roles?.[0] ?? roles.administrator, {
|
/openbmc/linux/drivers/scsi/csiostor/ |
H A D | csio_attr.c | 70 ids.roles = FC_RPORT_ROLE_UNKNOWN; in csio_reg_rnode() 99 ids.roles |= FC_RPORT_ROLE_FCP_INITIATOR; in csio_reg_rnode() 101 ids.roles |= FC_RPORT_ROLE_FCP_TARGET; in csio_reg_rnode() 103 if (ids.roles != FC_RPORT_ROLE_UNKNOWN) in csio_reg_rnode() 104 fc_remote_port_rolechg(rport, ids.roles); in csio_reg_rnode() 109 rn->nport_id, ids.roles); in csio_reg_rnode()
|
/openbmc/linux/drivers/scsi/libfc/ |
H A D | fc_rport.c | 150 rdata->ids.roles = FC_RPORT_ROLE_UNKNOWN; in fc_rport_create() 1052 if (rdata->ids.roles == FC_PORT_ROLE_UNKNOWN) in fc_rport_compatible_roles() 1054 if ((rdata->ids.roles & FC_PORT_ROLE_FCP_TARGET) && in fc_rport_compatible_roles() 1057 if ((rdata->ids.roles & FC_PORT_ROLE_FCP_INITIATOR) && in fc_rport_compatible_roles() 1126 u32 roles = FC_RPORT_ROLE_UNKNOWN; in fc_rport_prli_resp() local 1152 rdata->ids.roles = FC_RPORT_ROLE_UNKNOWN; in fc_rport_prli_resp() 1208 roles |= FC_RPORT_ROLE_FCP_INITIATOR; in fc_rport_prli_resp() 1210 roles |= FC_RPORT_ROLE_FCP_TARGET; in fc_rport_prli_resp() 1212 rdata->ids.roles = roles; in fc_rport_prli_resp() 2206 rdata->ids.roles = FC_RPORT_ROLE_UNKNOWN; in fc_rport_fcp_prli() [all …]
|
/openbmc/docs/architecture/ |
H A D | user-management.md | 25 6. User name, Password, Group and Privilege roles are maintained by the common 36 The purpose of group roles is to determine the first-level authorization of the 40 SSH. Also having group roles in common user-management (e.g. 41 phosphor-user-manager) allows different application to create roles for the 58 OpenBMC supports privilege roles which are common across all the supported 60 / HostConsole). User can belong to any one of the following privilege roles at 66 | Sl. No | Privilege roles | Purpose / Comments … 451 the OpenBMC privilege roles. The preferred way is to group LDAP user accounts 457 This section explains how the privilege roles of the user accounts are consumed 493 different group roles.
|
/openbmc/u-boot/Documentation/sphinx/ |
H A D | rstFlatTable.py | 48 from docutils.parsers.rst import directives, roles 73 roles.register_local_role('cspan', c_span) 74 roles.register_local_role('rspan', r_span)
|
/openbmc/linux/Documentation/sphinx/ |
H A D | rstFlatTable.py | 46 from docutils.parsers.rst import directives, roles 61 roles.register_local_role('cspan', c_span) 62 roles.register_local_role('rspan', r_span)
|
/openbmc/linux/Documentation/mhi/ |
H A D | topology.rst | 20 Below are the roles of the MHI controller driver: 54 Below are the roles of the MHI driver:
|
/openbmc/openbmc/meta-openembedded/meta-oe/classes/ |
H A D | signing.bbclass | 35 # Examples for defining roles and importing keys: 67 roles = set() 68 roles |= (d.getVarFlags("SIGNING_PKCS11_URI") or {}).keys() 69 roles |= (d.getVarFlags("SIGNING_PKCS11_MODULE") or {}).keys() 70 for role in roles: 145 # the input certificate is split into a sequentially numbered list of roles,
|
/openbmc/linux/drivers/usb/typec/ |
H A D | bus.h | 18 enum typec_port_data roles; member
|
/openbmc/linux/drivers/scsi/bfa/ |
H A D | bfad.c | 433 enum bfa_lport_role roles, struct bfad_vf_s *vf_drv, in bfa_fcb_lport_new() argument 454 port_drv->roles = roles; in bfa_fcb_lport_new() 456 if (roles & BFA_LPORT_ROLE_FCP_IM) { in bfa_fcb_lport_new() 506 port_cfg.roles = BFA_LPORT_ROLE_FCP_IM; in bfa_fcb_pbc_vport_create() 658 if (port_cfg->roles & BFA_LPORT_ROLE_FCP_IM) { in bfad_vport_create() 929 bfad->pport.roles |= BFA_LPORT_ROLE_FCP_IM; in bfad_cfg_pport() 942 (bfad->pport.roles & BFA_LPORT_ROLE_FCP_IM)) { in bfad_uncfg_pport() 946 bfad->pport.roles &= ~BFA_LPORT_ROLE_FCP_IM; in bfad_uncfg_pport() 1023 vid.roles = FC_PORT_ROLE_FCP_INITIATOR; in bfad_start_ops()
|
/openbmc/bmcweb/redfish-core/lib/ |
H A D | redfish_sessions.hpp | 45 nlohmann::json::array_t roles; in fillSessionObject() local 46 roles.emplace_back(redfish::getRoleIdFromPrivilege(session.userRole)); in fillSessionObject() 47 res.jsonValue["Roles"] = std::move(roles); in fillSessionObject()
|