/openbmc/openbmc-build-scripts/jenkins/ |
H A D | userid-validation | 53 aimvalley/ci-authorized \ 54 akamai/ci-authorized \ 55 alibaba/ci-authorized \ 56 amd/ci-authorized \ 57 ami/ci-authorized \ 58 ampere/ci-authorized \ 59 arm/ci-authorized \ 60 aspeed/ci-authorized \ 61 asus/ci-authorized \ 62 bytedance/ci-authorized \ [all …]
|
/openbmc/docs/designs/ |
H A D | ci-authorization.md | 49 authorized for CI. 58 group: `openbmc/ci-authorized` 60 group: `xyzcorp/ci-authorized` 62 group: `abccorp/ci-authorized` 64 The openbmc/ci-authorized group can contain users that are not associated with 67 group: `openbmc/ci-authorized` contains -> 69 group `xyzcorp/ci-authorized` 71 group `abccorp/ci-authorized` 80 group: `xyzcorp/ci-authorized-owners` administers -> `xyzcorp/ci-authorized` 82 group: `abccorp/ci-authorized-owners` administers -> `abccorp/ci-authorized` [all …]
|
/openbmc/openbmc/meta-google/recipes-google/ssh/ |
H A D | authorized-keys-comp.bb | 9 file://authorized-keys-comp.service \ 10 file://authorized-keys-comp.sh \ 18 SYSTEMD_SERVICE:${PN} += "authorized-keys-comp.service" 26 install -m0755 authorized-keys-comp.sh ${D}${libexecdir}/ 29 install -m0644 authorized-keys-comp.service ${D}${systemd_system_unitdir}/
|
/openbmc/linux/Documentation/usb/ |
H A D | authorization.rst | 21 $ echo 1 > /sys/bus/usb/devices/DEVICE/authorized 25 $ echo 0 > /sys/bus/usb/devices/DEVICE/authorized 36 By default, all USB devices are authorized. Writing "2" to the 60 echo 1 > $device_path/authorized 73 echo 1 > authorized # temporarily authorize it 83 echo 0 > authorized 103 $ echo 1 > /sys/bus/usb/devices/INTERFACE/authorized 107 $ echo 0 > /sys/bus/usb/devices/INTERFACE/authorized 121 So all interfaces would authorized per default. 124 If a deauthorized interface will be authorized so the driver probing must [all …]
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | thunderbolt.rst | 28 a database of the authorized devices and prompts users for new connections. 37 ACTION=="add", SUBSYSTEM=="thunderbolt", ATTR{authorized}=="0", ATTR{authorized}="1" 93 device must be authorized by the user before PCIe tunnels are created 105 /sys/bus/thunderbolt/devices/0-1/authorized - 0 112 The ``authorized`` attribute reads 0 which means no PCIe tunnels are 115 # echo 1 > /sys/bus/thunderbolt/devices/0-1/authorized 124 /sys/bus/thunderbolt/devices/0-3/authorized - 0 135 to the ``authorized`` attribute and the PCIe tunnels will be created in 143 # echo 1 > /sys/bus/thunderbolt/devices/0-3/authorized 152 # echo 2 > /sys/bus/thunderbolt/devices/0-3/authorized [all …]
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-thunderbolt | 21 If a device is authorized automatically during boot its 30 de-authorize PCIe tunnel by writing 0 to authorized 50 none All devices are automatically authorized 51 user Devices are only authorized based on writing 52 appropriate value to the authorized attribute 64 What: /sys/bus/thunderbolt/devices/.../authorized 70 authorized, no PCIe devices are available to the system. 73 yet authorized. 78 0 The device will be de-authorized (only supported if 80 1 The device will be authorized and connected [all …]
|
H A D | sysfs-bus-usb | 1 What: /sys/bus/usb/devices/<INTERFACE>/authorized 7 If a deauthorized interface will be authorized 19 would be authorized by default. 22 What: /sys/bus/usb/device/.../authorized 28 drivers, non-authorized one are not. By default, wired 29 USB devices are authorized.
|
/openbmc/linux/Documentation/networking/ |
H A D | mac80211-auth-assoc-deauth.txt | 65 mac80211->driver: sta_state(AP, authorized) 80 userspace->mac80211: authorized 81 mac80211->driver: sta_state(AP, authorized)
|
/openbmc/openbmc/meta-google/recipes-google/ssh/authorized-keys-comp/ |
H A D | authorized-keys-comp.service | 3 ExecStart=/usr/libexec/authorized-keys-comp.sh
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | metamail | 9 of an authorized representative of Bellcore. BELLCORE
|
H A D | CECILL-1.1 | 95 The Licensee is authorized to use the Software, unrestrictedly, as regards the fields of applicatio… 104 The Licensee is authorized to make any or all Contribution to the Software provided that it explici… 108 …f the Software by means of any or all process. The Licensee is further authorized to redistribute … 112 The Licensee is authorized to redistribute true copies of the Software in Source Code or Object Cod… 123 The Licensee is authorized to redistribute the Modified Software, in Source Code or Object Code for… 136 … that is subject to the provisions of the GPL License, the Licensee is authorized to redistribute … 138 … that is subject to the provisions of the GPL License, the Licensee is authorized to redistribute … 197 10.2. The Licensee whose Agreement is terminated shall no longer be authorized to use, modify or di… 207 …gards the Parties unless it is made in writing and signed by their duly authorized representatives. 217 12.1. Any or all person is authorized to duplicate and distribute copies of this Agreement.
|
H A D | cve-tou | 5 such purposes is authorized provided that you reproduce MITRE's copyright
|
H A D | CECILL-2.1 | 196 The Licensee is authorized to use the Software, without any limitation 220 The Licensee is authorized to make any or all Contributions to the 233 The Licensee is further authorized to distribute copies of the modified 240 The Licensee is authorized to distribute true copies of the Software in 263 The Licensee is authorized to distribute the Modified Software, in 445 authorized to use, modify or distribute the Software. However, any 474 unless it is made in writing and signed by their duly authorized 494 12.1 Any person is authorized to duplicate and distribute copies of this
|
H A D | OML | 3 … written agreement, license, or royalty fee is required for any of the authorized uses. Modificati…
|
H A D | Inner-Net-2.0 | 18 4. [The copyright holder has authorized the removal of this clause.]
|
H A D | SWL | 1 … written agreement, license, or royalty fee is required for any of the authorized uses. Modificati…
|
/openbmc/openbmc/meta-openembedded/meta-oe/licenses/ |
H A D | Bellcore | 9 of an authorized representative of Bellcore. BELLCORE
|
/openbmc/linux/drivers/thunderbolt/ |
H A D | icm.c | 728 bool authorized = false; in icm_fr_device_connected() local 739 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; in icm_fr_device_connected() 768 !!sw->authorized == authorized) { in icm_fr_device_connected() 849 sw->authorized = authorized; in icm_fr_device_connected() 1203 bool authorized, boot, dual_lane, speed_gen3; in __icm_tr_device_connected() local 1220 authorized = pkg->link_info & ICM_LINK_INFO_APPROVED; in __icm_tr_device_connected() 1236 if (tb_route(sw) == route && !!sw->authorized == authorized) { in __icm_tr_device_connected() 1272 sw->authorized = authorized; in __icm_tr_device_connected()
|
H A D | domain.c | 652 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch() 679 if (!parent_sw || !parent_sw->authorized) in tb_domain_approve_switch_key() 716 if (!parent_sw || !parent_sw->authorized) in tb_domain_challenge_switch_key()
|
H A D | switch.c | 1766 return sysfs_emit(buf, "%u\n", sw->authorized); in authorized_show() 1775 if (sw && sw->authorized) { in disapprove_switch() 1787 sw->authorized = 0; in disapprove_switch() 1803 if (!!sw->authorized == !!val) in tb_switch_set_authorized() 1834 sw->authorized = val; in tb_switch_set_authorized() 1839 sprintf(envp_string, "AUTHORIZED=%u", sw->authorized); in tb_switch_set_authorized() 1869 static DEVICE_ATTR_RW(authorized); 1941 if (sw->authorized) { in key_store() 2514 sw->authorized = true; in tb_switch_alloc()
|
/openbmc/openbmc/meta-google/recipes-phosphor/images/ |
H A D | obmc-phosphor-image.bbappend | 15 OBMC_IMAGE_EXTRA_INSTALL:append:gbmc = " authorized-keys-comp"
|
/openbmc/openbmc/meta-openembedded/meta-webserver/licenses/ |
H A D | OML | 12 authorized uses. Modifications to this Software and Documentation may
|
/openbmc/linux/drivers/usb/core/ |
H A D | generic.c | 233 if (udev->authorized == 0) in usb_generic_driver_probe()
|
H A D | message.c | 1791 if (intf->authorized) { in usb_deauthorize_interface() 1793 intf->authorized = 0; in usb_deauthorize_interface() 1811 if (!intf->authorized) { in usb_authorize_interface() 1813 intf->authorized = 1; /* authorize interface */ in usb_authorize_interface() 2001 if (dev->authorized == 0 || configuration == -1) in usb_set_configuration() 2108 intf->authorized = !!HCD_INTF_AUTHORIZED(hcd); in usb_set_configuration()
|
H A D | sysfs.c | 729 return sysfs_emit(buf, "%u\n", usb_dev->authorized); in authorized_show() 753 static DEVICE_ATTR_IGNORE_LOCKDEP(authorized, S_IRUGO | S_IWUSR, 1161 return sysfs_emit(buf, "%u\n", intf->authorized); in interface_authorized_show() 1194 __ATTR(authorized, S_IRUGO | S_IWUSR,
|