Home
last modified time | relevance | path

Searched refs:authorized (Results 1 – 20 of 20) sorted by relevance

/linux-4.4.14/Documentation/usb/
Dauthorization.txt19 $ echo 1 > /sys/bus/usb/devices/DEVICE/authorized
23 $ echo 0 > /sys/bus/usb/devices/DEVICE/authorized
34 By default, Wired USB devices are authorized by default to
59 echo 1 > $device_path/authorized
72 echo 1 > authorized # temporarily authorize it
82 echo 0 > authorized
100 $ echo 1 > /sys/bus/usb/devices/INTERFACE/authorized
103 $ echo 0 > /sys/bus/usb/devices/INTERFACE/authorized
115 So all interfaces would authorized per default.
118 If a deauthorized interface will be authorized so the driver probing must
/linux-4.4.14/Documentation/networking/
Dmac80211-auth-assoc-deauth.txt65 mac80211->driver: sta_state(AP, authorized)
80 userspace->mac80211: authorized
81 mac80211->driver: sta_state(AP, authorized)
/linux-4.4.14/Documentation/ABI/testing/
Dsysfs-bus-usb1 What: /sys/bus/usb/devices/INTERFACE/authorized
7 If a deauthorized interface will be authorized
18 would be authorized by default.
21 What: /sys/bus/usb/device/.../authorized
27 drivers, non-authorized one are not. By default, wired
28 USB devices are authorized.
30 Certified Wireless USB devices are not authorized
Dsysfs-wusb_cbaf31 has been authorized before and nothing further
/linux-4.4.14/drivers/usb/core/
Dgeneric.c167 if (udev->authorized == 0) in generic_probe()
Dmessage.c1567 if (intf->authorized) { in usb_deauthorize_interface()
1569 intf->authorized = 0; in usb_deauthorize_interface()
1587 if (!intf->authorized) { in usb_authorize_interface()
1589 intf->authorized = 1; /* authorize interface */ in usb_authorize_interface()
1737 if (dev->authorized == 0 || configuration == -1) in usb_set_configuration()
1846 intf->authorized = !!HCD_INTF_AUTHORIZED(hcd); in usb_set_configuration()
Dsysfs.c683 return snprintf(buf, PAGE_SIZE, "%u\n", usb_dev->authorized); in authorized_show()
707 static DEVICE_ATTR_IGNORE_LOCKDEP(authorized, S_IRUGO | S_IWUSR,
990 return sprintf(buf, "%u\n", intf->authorized); in interface_authorized_show()
1013 __ATTR(authorized, S_IRUGO | S_IWUSR,
Dusb.c511 dev->authorized = 1; in usb_alloc_dev()
513 dev->authorized = !!HCD_DEV_AUTHORIZED(usb_hcd); in usb_alloc_dev()
Ddriver.c296 if (udev->authorized == 0) { in usb_probe_interface()
299 } else if (intf->authorized == 0) { in usb_probe_interface()
522 if (!iface->authorized) in usb_driver_claim_interface()
Dhub.c2555 if (usb_dev->authorized == 0) in usb_deauthorize_device()
2558 usb_dev->authorized = 0; in usb_deauthorize_device()
2572 if (usb_dev->authorized == 1) in usb_authorize_device()
2591 usb_dev->authorized = 1; in usb_authorize_device()
/linux-4.4.14/include/linux/
Dusb.h183 unsigned authorized:1; /* used for interface authorization */ member
580 unsigned authorized:1; member
/linux-4.4.14/security/selinux/
DKconfig93 via /selinux/checkreqprot if authorized by policy.
/linux-4.4.14/security/
DKconfig60 designated as unlabelled, and only sockets authorized
/linux-4.4.14/net/wireless/
DKconfig124 to be an authorized master, i.e., with radar detection support and DFS
/linux-4.4.14/fs/reiserfs/
DREADME9 Reiser, or authorized to be licensed by him, have been in the past,
/linux-4.4.14/net/mac80211/
Dtx.c2016 bool wme_sta = false, authorized = false; in ieee80211_build_hdr() local
2043 authorized = test_sta_flag(sta, WLAN_STA_AUTHORIZED); in ieee80211_build_hdr()
2227 authorized = test_sta_flag(sta, WLAN_STA_AUTHORIZED); in ieee80211_build_hdr()
2246 !multicast && !authorized && in ieee80211_build_hdr()
Dmlme.c1456 bool authorized = false; in ieee80211_powersave_allowed() local
1476 authorized = test_sta_flag(sta, WLAN_STA_AUTHORIZED); in ieee80211_powersave_allowed()
1479 return authorized; in ieee80211_powersave_allowed()
/linux-4.4.14/Documentation/netlabel/
Ddraft-ietf-cipso-ipsecurity-01.txt450 a CIPSO host is authorized to handle. All datagrams that have a label
468 a CIPSO host is authorized to handle. All datagrams that have a label less
/linux-4.4.14/Documentation/filesystems/
Dproc.txt1863 gid= Set the group authorized to learn processes information.
1885 gid= defines a group authorized to learn processes information otherwise
/linux-4.4.14/Documentation/
Dkernel-parameters.txt3864 (default -1 = authorized except for wireless USB,
3865 0 = not authorized, 1 = authorized)