| /kernel/linux/linux-4.19/drivers/media/radio/ |
| D | radio-trust.c | 1 /* radio-trust.c - Trust FM Radio card driver for Linux 2.2 30 MODULE_DESCRIPTION("A driver for the Trust FM Radio card."); 47 MODULE_PARM_DESC(io, "I/O addresses of the Trust FM Radio card (0x350 or 0x358)"); 51 struct trust { struct 58 struct trust *tr = kzalloc(sizeof(*tr), GFP_KERNEL); in trust_alloc() argument 73 static void write_i2c(struct trust *tr, int n, ...) in write_i2c() 121 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_mute_volume() 131 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_stereo() 149 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_frequency() 166 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_ctrl() [all …]
|
| D | Kconfig | 426 tristate "Trust FM radio card" 431 This is a driver for the Trust FM radio cards. Say Y if you have 439 module will be called radio-trust. 442 hex "Trust i/o port (usually 0x350 or 0x358)" 446 Enter the I/O port of your Trust FM radio card. If unsure, try the
|
| /kernel/linux/linux-5.10/drivers/media/radio/ |
| D | radio-trust.c | 2 /* radio-trust.c - Trust FM Radio card driver for Linux 2.2 30 MODULE_DESCRIPTION("A driver for the Trust FM Radio card."); 47 MODULE_PARM_DESC(io, "I/O addresses of the Trust FM Radio card (0x350 or 0x358)"); 51 struct trust { struct 58 struct trust *tr = kzalloc(sizeof(*tr), GFP_KERNEL); in trust_alloc() argument 73 static void write_i2c(struct trust *tr, int n, ...) in write_i2c() 121 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_mute_volume() 131 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_stereo() 149 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_frequency() 166 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_ctrl() [all …]
|
| D | Kconfig | 426 tristate "Trust FM radio card" 431 This is a driver for the Trust FM radio cards. Say Y if you have 439 module will be called radio-trust. 442 hex "Trust i/o port (usually 0x350 or 0x358)" 446 Enter the I/O port of your Trust FM radio card. If unsure, try the
|
| /kernel/linux/linux-5.10/include/uapi/linux/ |
| D | vbox_vmmdev_types.h | 145 /* Note: trust level is for windows guests only, linux always uses not-given */ 146 /* Requestor trust level: Unspecified */ 148 /* Requestor trust level: Untrusted (SID S-1-16-0) */ 150 /* Requestor trust level: Untrusted (SID S-1-16-4096) */ 152 /* Requestor trust level: Medium (SID S-1-16-8192) */ 154 /* Requestor trust level: Medium plus (SID S-1-16-8448) */ 156 /* Requestor trust level: High (SID S-1-16-12288) */ 158 /* Requestor trust level: System (SID S-1-16-16384) */ 160 /* Requestor trust level >= Protected (SID S-1-16-20480, S-1-16-28672) */ 162 /* Requestor trust level mask */
|
| /kernel/linux/linux-5.10/Documentation/x86/ |
| D | intel_txt.rst | 13 - Provides dynamic root of trust for measurement (DRTM) 34 http://www.trust-conference.eu/downloads/Keynote-Speakers/ 67 To get trust in the initial kernel without using Intel TXT, a 68 static root of trust must be used. This bases trust in BIOS 81 By using the hardware-based root of trust that Intel TXT provides, 83 pre-launch components can be removed from the trust chain, DMA 91 almost all parts of the trust chain is available (excepting SMM and 101 processor instruction that initiates the dynamic root of trust.
|
| /kernel/linux/linux-4.19/Documentation/ |
| D | intel_txt.txt | 13 - Provides dynamic root of trust for measurement (DRTM) 34 http://www.trust-conference.eu/downloads/Keynote-Speakers/ 67 To get trust in the initial kernel without using Intel TXT, a 68 static root of trust must be used. This bases trust in BIOS 81 By using the hardware-based root of trust that Intel TXT provides, 83 pre-launch components can be removed from the trust chain, DMA 91 almost all parts of the trust chain is available (excepting SMM and 101 processor instruction that initiates the dynamic root of trust.
|
| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| D | pkcs7_trust.c | 2 /* Validate the trust chain of a PKCS#7 message. 20 * Check the trust on one PKCS#7 SignedInfo block. 54 * is apparently the same as one we already trust. in pkcs7_validate_trust_one() 135 * pkcs7_validate_trust - Validate PKCS#7 trust chain 140 * keys we already know and trust. 147 * (*) 0 if at least one signature chain intersects with the keys in the trust
|
| /kernel/linux/linux-4.19/crypto/asymmetric_keys/ |
| D | pkcs7_trust.c | 1 /* Validate the trust chain of a PKCS#7 message. 24 * Check the trust on one PKCS#7 SignedInfo block. 58 * is apparently the same as one we already trust. in pkcs7_validate_trust_one() 139 * pkcs7_validate_trust - Validate PKCS#7 trust chain 144 * keys we already know and trust. 151 * (*) 0 if at least one signature chain intersects with the keys in the trust
|
| /kernel/linux/linux-4.19/Documentation/process/ |
| D | maintainer-pgp-guide.rst | 47 that trust must always be placed with developers and never with the code 52 want to make sure that by placing trust into developers we do not simply 179 - sign other people's keys for web of trust purposes 523 trust: ultimate validity: ultimate 841 delegated trust technologies, namely DNSSEC and TLS, to get you going if 842 the prospect of starting your own Web of Trust from scratch is too 870 Web of Trust (WOT) vs. Trust on First Use (TOFU) 873 PGP incorporates a trust delegation mechanism known as the "Web of 874 Trust." At its core, this is an attempt to replace the need for 879 Unfortunately, very few people understand how the Web of Trust works. [all …]
|
| D | management-style.rst | 94 deleting it, you may have irrevocably lost the trust of that 123 we just do both?" and look pitiful. Trust me, it works. If it's not 175 trust somebody who is so clearly hiding their true character. 235 It's part of what makes people trust you, and allow you the potential
|
| /kernel/linux/linux-5.10/Documentation/process/ |
| D | maintainer-pgp-guide.rst | 47 that trust must always be placed with developers and never with the code 52 want to make sure that by placing trust into developers we do not simply 179 - sign other people's keys for web of trust purposes 526 trust: ultimate validity: ultimate 844 delegated trust technologies, namely DNSSEC and TLS, to get you going if 845 the prospect of starting your own Web of Trust from scratch is too 873 Web of Trust (WOT) vs. Trust on First Use (TOFU) 876 PGP incorporates a trust delegation mechanism known as the "Web of 877 Trust." At its core, this is an attempt to replace the need for 882 Unfortunately, very few people understand how the Web of Trust works. [all …]
|
| D | management-style.rst | 95 deleting it, you may have irrevocably lost the trust of that 124 we just do both?" and look pitiful. Trust me, it works. If it's not 176 trust somebody who is so clearly hiding their true character. 236 It's part of what makes people trust you, and allow you the potential
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/media/ |
| D | gspca-cardlist.rst | 234 nw80x 06a5:d800 Divio Chicony TwinkleCam, Trust SpaceCam 238 sunplus 06d6:0031 Trust 610 LCD PowerC@m Zoom 265 mr97310a 08ca:0110 Trust Spyc@m 100 296 pac7311 093a:2608 Trust WB-3300p 297 pac7311 093a:260e Gigaware VGA PC Camera, Trust WB-3350p, SIGMA cam 2350 410 ov519 0e96:c001 TRUST 380 USB2 SPACEC@M 419 pac207 145f:013a Trust WB-1300N 420 pac7302 145f:013c Trust 421 sn9c20x 145f:013d Trust WB-3600R 437 sq930x 2770:930c Trust WB-3500T / NSG Robbie 2.0
|
| D | zr364xx.rst | 95 0x06d6 0x0034 Trust Powerc@m 750 97 0x06d6 0x003b Trust Powerc@m 970Z 101 0x06d6 0x003d Trust Powerc@m 910Z
|
| D | radio-cardlist.rst | 31 radio-trust Trust FM radio card
|
| /kernel/linux/linux-4.19/Documentation/media/v4l-drivers/ |
| D | gspca-cardlist.rst | 232 nw80x 06a5:d800 Divio Chicony TwinkleCam, Trust SpaceCam 236 sunplus 06d6:0031 Trust 610 LCD PowerC@m Zoom 263 mr97310a 08ca:0110 Trust Spyc@m 100 294 pac7311 093a:2608 Trust WB-3300p 295 pac7311 093a:260e Gigaware VGA PC Camera, Trust WB-3350p, SIGMA cam 2350 408 ov519 0e96:c001 TRUST 380 USB2 SPACEC@M 417 pac207 145f:013a Trust WB-1300N 418 pac7302 145f:013c Trust 419 sn9c20x 145f:013d Trust WB-3600R 435 sq930x 2770:930c Trust WB-3500T / NSG Robbie 2.0
|
| D | zr364xx.rst | 101 0x06d6 0x0034 Trust Powerc@m 750 103 0x06d6 0x003b Trust Powerc@m 970Z 107 0x06d6 0x003d Trust Powerc@m 910Z
|
| /kernel/linux/linux-4.19/Documentation/namespaces/ |
| D | resource-control.txt | 4 enabled in a kernel for people who don't trust their users or their 10 memory user's they don't trust to play nice can use.
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/remoteproc/ |
| D | st,stm32-rproc.yaml | 40 Reference to the system configuration which holds the RCC trust zone mode 42 - The offset of the RCC trust zone mode register. 43 - The field mask of the RCC trust zone mode.
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/namespaces/ |
| D | resource-control.rst | 8 enabled in a kernel for people who don't trust their users or their 14 memory user's they don't trust to play nice can use.
|
| /kernel/linux/linux-5.10/drivers/net/ipa/ |
| D | ipa.h | 156 * GSI initialization can be done either by Trust Zone on the AP or by the 159 * If it's done by Trust Zone, the AP loads the GSI firmware and supplies 160 * it to Trust Zone to verify and install. When this completes, if
|
| /kernel/linux/linux-5.10/drivers/misc/habanalabs/include/common/ |
| D | hl_boot_if.h | 53 * trust), boot authentication (chain of 54 * trust), data packets authentication.
|
| /kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/ |
| D | nfp_net_sriov.c | 157 "trust"); in nfp_app_set_vf_trust() 161 /* Write trust control bit to VF entry in VF config symbol */ in nfp_app_set_vf_trust() 170 "trust"); in nfp_app_set_vf_trust()
|
| /kernel/linux/linux-4.19/drivers/net/ethernet/mellanox/mlxsw/ |
| D | spectrum_dcb.c | 431 netdev_err(mlxsw_sp_port->dev, "Couldn't switch to trust L2\n"); in mlxsw_sp_port_dcb_app_update() 438 /* A failure to set trust DSCP means that the QPDPM and QPDSM in mlxsw_sp_port_dcb_app_update() 440 * attempting to set trust DSCP, we couldn't have attempted to in mlxsw_sp_port_dcb_app_update() 441 * switch trust to PCP. Thus no cleanup is necessary. in mlxsw_sp_port_dcb_app_update() 443 netdev_err(mlxsw_sp_port->dev, "Couldn't switch to trust L3\n"); in mlxsw_sp_port_dcb_app_update()
|