Home
last modified time | relevance | path

Searched full:security (Results 1 – 25 of 550) sorted by relevance

12345678910>>...22

/Zephyr-latest/drivers/entropy/
DKconfig.npcx18 prompt "DRBG Security Strength Selection"
21 The chosen security strength defines the amount of entropy bits
25 bool "DRBG security strength 112 bits"
28 bool "DRBG security strength 128 bits"
31 bool "DRBG security strength 192 bits"
34 bool "DRBG security strength 256 bits"
37 bool "DRBG security strength 12b bits test"
40 bool "DRBG security strength 256 bits test"
/Zephyr-latest/doc/security/
Dsecurity-overview.rst3 Zephyr Security Overview
9 This document outlines the steps of the Zephyr Security Subcommittee towards a
10 defined security process that helps developers build more secure
11 software while addressing security compliance requirements. It presents
12 the key ideas of the security process and outlines which documents need
21 mainly focuses on security functionality.
30 2. **Secure Design:** Defines security procedures and implement measures
31 to enforce them. A security architecture of the system and
36 and mitigating security issues.
38 3. **Security Certification:** Defines the certifiable part of the
[all …]
Dreporting.rst3 Security Vulnerability Reporting
11 acknowledged and analyzed by the security response team within 1 week.
12 Each vulnerability will be entered into the Zephyr Project security
16 .. _GitHub: https://github.com/zephyrproject-rtos/zephyr/security
18 Security Issue Management
78 The security advisories created are kept private, due to the
79 sensitive nature of security reports. The issues are only visible to
86 - others, as proposed and ratified by the Zephyr Security
94 The Zephyr Security Subcommittee shall review the reported
106 Security sensitive vulnerabilities shall be made public after an
[all …]
Dsecurity-citations.rst5 Security Document Citations
14 Development," International Information Systems Security Certification
17 .. [MS12] Microsoft Corporation, Security Development Lifecycle - SDL
20 .. [CCITSE12] Common Criteria for Information Technology Security
27 Security Requirements for COMPANY PUBLIC Application note Cryptographic
30 .. [GHS10] Green Hills Software, "INTEGRITY-178B Separation Kernel Security
40 .. [CVSS] Forum of Incident Response and Security Teams,
44 .. [OWASP] Open Web Application Security Project,
Dsecure-coding.rst7 emphasis on security.
17 security is addressed within the Zephyr project. All code submitted
26 security perspective. Many of the ideas contained herein are captured
37 need to have. This section gives references to other security
46 documentation about how security-sensitive issues are handled by the
58 help prevent security violations and limit their impact:
63 security measures, publicly accepted cryptographic algorithms and
79 to provide maximum security. This corresponds to the "Secure by
89 positive security model aims to minimize the attack surface of the
98 - **Psychological acceptability** requires that security features are
[all …]
Dindex.rst3 Security chapter
7 for ensuring security is addressed within the Zephyr project.
13 security-overview.rst
Dhardening-tool.rst7 process, known as "hardening", involves strengthening the security of a system to protect it from
12 #. Disabling features and compilation flags that might lead to security vulnerabilities (ex. making
15 #. Enabling optional features that can lead to improve security (ex. stack sentinel, hardware stack
19 configuration against a set of hardening preferences defined by the **Security Working Group**. The
21 recommendations to adjust security-related options.
33 could lead to a security vulnerability, the table will propose a recommended value that should be
/Zephyr-latest/.github/
DSECURITY.md1 # Security Policy
5 The Zephyr project supports the following versions with security
21 Please see our [Security Vulnerability
22 Reporting](https://docs.zephyrproject.org/latest/security/reporting.html)
/Zephyr-latest/tests/net/lib/wifi_credentials/src/
Dmain.c89 enum wifi_security_type security = -1; in ZTEST() local
98 SSID1, sizeof(SSID1), &security, bssid_buf, ARRAY_SIZE(bssid_buf), psk_buf, in ZTEST()
113 enum wifi_security_type security = -1; in ZTEST() local
123 SSID1, sizeof(SSID1), &security, bssid_buf, ARRAY_SIZE(bssid_buf), psk_buf, in ZTEST()
129 zassert_equal(security, SECURITY1, "Security type mismatch"); in ZTEST()
145 enum wifi_security_type security = -1; in ZTEST() local
155 SSID1, sizeof(SSID1), &security, bssid_buf, ARRAY_SIZE(bssid_buf), psk_buf, in ZTEST()
163 zassert_equal(security, SECURITY1, "Security type mismatch"); in ZTEST()
179 enum wifi_security_type security = -1; in ZTEST() local
189 SSID2, sizeof(SSID2), &security, bssid_buf, ARRAY_SIZE(bssid_buf), psk_buf, in ZTEST()
[all …]
/Zephyr-latest/doc/security/standards/
Dindex.rst3 Security standards and Zephyr
7 with cyber security on their own. This included how to assess the scale and impact
11 and enforcements are rapidly emerging, and consequently, security standards. These
16 by security standards requirements and provide the right information to enable
Detsi-303645.rst7 **ETSI EN 303 645**, also known as "Cyber Security for Consumer Internet
59 * - critical security parameter
60 - security-related secret information whose disclosure or modification can compromise
61 the security of a security module.
70 manufacturer will provide security updates.
115 * - public security parameter
116 - security related public information whose modification can compromise the security of a
117 security module.
122 * - security module
123 - set of hardware, software, and/or firmware that implements security functions.
[all …]
/Zephyr-latest/subsys/bluetooth/host/
DKconfig.gatt34 bool "Automatic security elevation and retry on security errors"
38 If an ATT request fails due to insufficient security, the host will
39 try to elevate the security level and retry the ATT request.
85 bool "Automatic security re-establishment request as a peripheral"
89 This option requests security re-establishment automatically whenever
91 there are notifiable or indicatable characteristics for which security
93 role, which sends a Security Request for this purpose.
95 bt_conn_set_security() to re-establish security prior to sending any
97 security (unless the central does that first).
100 receiving a Security Request immediately after reconnection.
[all …]
/Zephyr-latest/subsys/mgmt/hawkbit/
DKconfig79 bool "No authentication security"
81 No authentication security for the hawkBit DDI API.
84 bool "Use target security token authentication"
86 Use target security token authentication for the hawkBit DDI API.
89 bool "Use gateway security token authentication"
91 Use gateway security token authentication for the hawkBit DDI API.
96 string "Authentication security token"
100 Authentication security token for the configured hawkBit DDI
/Zephyr-latest/include/zephyr/net/
Dwifi.h41 /** @brief IEEE 802.11 security types. */
43 /** No security. */
45 /** WPA2-PSK security. */
47 /** WPA2-PSK-SHA256 security. */
49 /** WPA3-SAE security. */
51 /** WPA3-SAE security with hunting-and-pecking loop. */
53 /** WPA3-SAE security with hash-to-element. */
55 /** WPA3-SAE security with both hunting-and-pecking loop and hash-to-element enabled. */
57 /** GB 15629.11-2003 WAPI security. */
59 /** EAP security - Enterprise. */
[all …]
/Zephyr-latest/subsys/net/lib/lwm2m/
Dlwm2m_obj_security.c34 /* Security resource IDs */
85 static struct lwm2m_engine_obj security; variable
183 LOG_DBG("Create LWM2M security instance: %d", obj_inst_id); in security_create()
245 security.obj_id = LWM2M_OBJECT_SECURITY_ID; in lwm2m_security_init()
246 security.version_major = SECURITY_VERSION_MAJOR; in lwm2m_security_init()
247 security.version_minor = SECURITY_VERSION_MINOR; in lwm2m_security_init()
248 security.is_core = true; in lwm2m_security_init()
249 security.fields = fields; in lwm2m_security_init()
250 security.field_count = ARRAY_SIZE(fields); in lwm2m_security_init()
251 security.max_instance_count = MAX_INSTANCE_COUNT; in lwm2m_security_init()
[all …]
/Zephyr-latest/samples/subsys/mgmt/osdp/
DREADME.rst7 intended to improve interoperability among access control and security products.
17 Although OSDP is steered towards the Access and Security industries, it can be
19 too much resource requirements. The security is not top-notch (AES-128) but it
20 is reasonable enough, given that the alternative is no security at all.
/Zephyr-latest/tests/bsim/bluetooth/host/gatt/general/
Dprj.conf8 # Disable auto security so that we can test security errors
/Zephyr-latest/tests/bluetooth/audio/cap_commander/src/
Dtest_common.c40 conn->info.security.level = BT_SECURITY_L2; in test_conn_init()
41 conn->info.security.enc_key_size = BT_ENC_KEY_SIZE_MAX; in test_conn_init()
42 conn->info.security.flags = BT_SECURITY_FLAG_OOB | BT_SECURITY_FLAG_SC; in test_conn_init()
/Zephyr-latest/tests/boards/espressif/wifi/
DKconfig31 bool "WPA2 Security"
33 Option to use WPA2 Security for Wi-Fi connections.
36 bool "WPA3 Security"
39 Option to use WPA3 Security for Wi-Fi connections.
/Zephyr-latest/tests/bsim/bluetooth/host/security/ccc_update/
Dtestcase.yaml10 bluetooth.host.security.ccc_update:
13 bluetooth.host.security.ccc_update_2:
/Zephyr-latest/subsys/net/lib/config/
DKconfig148 string "IEEE 802.15.4 security key"
152 The key string to use for the link-layer security part.
155 int "IEEE 802.15.4 security key mode"
160 The key mode to use for the link-layer security part.
164 int "IEEE 802.15.4 security level (0-7)"
169 The security level to use for the link-layer security part.
170 0 means no security
/Zephyr-latest/tests/kernel/threads/thread_stack/
Dtestcase.yaml5 - security
19 - security
/Zephyr-latest/doc/services/crypto/
Dpsa_crypto.rst9 The PSA (Platform Security Architecture) Crypto API offers a portable
16 comprehensive security framework to address the increasing security
36 security as new algorithms emerge and existing ones become obsolete.
55 practices, enhancing long-term security and compliance.
60 Network Security (TLS)
130 ``psa_crypto_init()``. However, some security standards require
137 with a different security context. In environments with
151 If an application shares memory with another security context, it
/Zephyr-latest/drivers/wifi/nxp/
Dnxp_wifi_drv.c493 nxp_wlan_uap_network.security.mfpc = true; in nxp_wifi_start_ap()
494 nxp_wlan_uap_network.security.mfpr = true; in nxp_wifi_start_ap()
496 nxp_wlan_uap_network.security.mfpc = true; in nxp_wifi_start_ap()
497 nxp_wlan_uap_network.security.mfpr = false; in nxp_wifi_start_ap()
500 if (params->security == WIFI_SECURITY_TYPE_NONE) { in nxp_wifi_start_ap()
501 nxp_wlan_uap_network.security.type = WLAN_SECURITY_NONE; in nxp_wifi_start_ap()
502 } else if (params->security == WIFI_SECURITY_TYPE_PSK) { in nxp_wifi_start_ap()
503 nxp_wlan_uap_network.security.type = WLAN_SECURITY_WPA2; in nxp_wifi_start_ap()
504 nxp_wlan_uap_network.security.psk_len = params->psk_length; in nxp_wifi_start_ap()
505 strncpy(nxp_wlan_uap_network.security.psk, params->psk, params->psk_length); in nxp_wifi_start_ap()
[all …]
/Zephyr-latest/tests/bluetooth/audio/cap_initiator/src/
Dtest_common.c39 conn->info.security.level = BT_SECURITY_L2; in test_conn_init()
40 conn->info.security.enc_key_size = BT_ENC_KEY_SIZE_MAX; in test_conn_init()
41 conn->info.security.flags = BT_SECURITY_FLAG_OOB | BT_SECURITY_FLAG_SC; in test_conn_init()

12345678910>>...22