Searched +full:split +full:- +full:security (Results 1 – 25 of 41) sorted by relevance
12
/Zephyr-latest/dts/bindings/misc/ |
D | nordic,split-channel-groups.yaml | 2 # SPDX-License-Identifier: Apache-2.0 4 description: Nordic Split Channel Groups 7 owned-channel-groups: 10 List of channel groups of a split-ownership peripheral that are to be 13 nonsecure-channel-groups: 16 List of channel groups in a split-ownership, split-security peripheral 19 are implicitly specified through the owned-channels property. This 20 property is ignored in non-Trustzone systems.
|
D | nordic,split-channels.yaml | 4 # SPDX-License-Identifier: Apache-2.0 8 Nordic Split Channels 10 Some of Nordic's peripherals support split ownership feature that allows to 13 owned-channels = <0 1 2 3 4 5 6 7 8 9 10 11>; 14 child-owned-channels = <7 8 9 10 11>; 16 Which means that channels 0-11 will be assigned to the particular CPU. 18 In addition, `child-owned-channels` property allows to use channels 19 7-11 only by child subprocessor. If the CPU you're configuring has no 20 subprocessor(s) assigned, the `child-owned-channels` property 24 owned-channels: [all …]
|
/Zephyr-latest/doc/security/ |
D | security-overview.rst | 1 .. _security-overview: 3 Zephyr Security Overview 9 This document outlines the steps of the Zephyr Security Subcommittee towards a 10 defined security process that helps developers build more secure 11 software while addressing security compliance requirements. It presents 12 the key ideas of the security process and outlines which documents need 14 documents are created, this document is a top-level overview and entry 21 mainly focuses on security functionality. 30 2. **Secure Design:** Defines security procedures and implement measures 31 to enforce them. A security architecture of the system and [all …]
|
D | secure-coding.rst | 6 Traditionally, microcontroller-based systems have not placed much 7 emphasis on security. 17 security is addressed within the Zephyr project. All code submitted 26 security perspective. Many of the ideas contained herein are captured 37 need to have. This section gives references to other security 46 documentation about how security-sensitive issues are handled by the 58 help prevent security violations and limit their impact: 60 - **Open design** as a design guideline incorporates the maxim that 62 widespread use. Instead of relying on secret, custom-tailored 63 security measures, publicly accepted cryptographic algorithms and [all …]
|
D | vulnerabilities.rst | 14 CVE-2017 17 :cve:`2017-14199` 18 ----------------- 22 - `Zephyr project bug tracker ZEPSEC-12 23 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12>`_ 25 - `PR6158 fix for 1.11.0 26 <https://github.com/zephyrproject-rtos/zephyr/pull/6158>`_ 28 :cve:`2017-14201` 29 ----------------- 40 - `Zephyr project bug tracker ZEPSEC-17 [all …]
|
/Zephyr-latest/doc/connectivity/bluetooth/ |
D | bluetooth-le-host.rst | 6 The Bluetooth Host implements all the higher-level protocols and 7 profiles, and most importantly, provides a high-level API for 17 Lowest down in the host stack sits a so-called HCI driver, which is 20 host, and vice-versa. 26 * Connection-oriented roles 32 * Connection-less roles 38 Each role comes with its own build-time configuration option: 41 connection-oriented roles central implicitly enables observer role, and 52 Most Zephyr-based BLE devices will most likely be peripheral-role 64 Central role may not be as common for Zephyr-based devices as peripheral [all …]
|
/Zephyr-latest/tests/net/lib/lwm2m/interop/pytest/ |
D | leshan.py | 7 SPDX-License-Identifier: Apache-2.0 30 resp = self.get('/security/clients') 42 - response: The response object received from the server. 45 - dict: The parsed JSON response as a dictionary. 48 - Exception: If the response indicates an error condition. 74 …f.timeout}&format={self.format}' + uri_options, data=data, headers={'content-type': 'application/j… 81 headers={'content-type': 'application/json'} 104 if len(path.split('/')) == 3: 108 rid = path.split('/')[-1] 112 """Send LwM2M Write-Attributes to given path [all …]
|
/Zephyr-latest/subsys/net/lib/lwm2m/ |
D | Kconfig | 2 # SPDX-License-Identifier: Apache-2.0 15 module-dep = LOG 16 module-str = Log level for LwM2M library 39 prompt "LwM2M Security object version" 43 Select which version of the security object should be used. 46 bool "Security object version 1.0" 49 bool "Security object version 1.1" 51 endchoice # "LwM2M Security object version" 84 LwM2M messages with a big body that exceed the block size will be split 90 bool "Use path matching as fallback for cancel-observe" [all …]
|
/Zephyr-latest/include/zephyr/crypto/ |
D | crypto.h | 4 * SPDX-License-Identifier: Apache-2.0 116 api = (struct crypto_driver_api *) dev->api; in crypto_query_hwcaps() 118 tmp = api->query_hw_caps(dev); in crypto_query_hwcaps() 127 "Driver should support at least one op-type: sync/async"); in crypto_query_hwcaps() 171 api = (struct crypto_driver_api *) dev->api; in cipher_begin_session() 172 ctx->device = dev; in cipher_begin_session() 173 ctx->ops.cipher_mode = mode; in cipher_begin_session() 175 flags = (ctx->flags & (CAP_OPAQUE_KEY_HNDL | CAP_RAW_KEY)); in cipher_begin_session() 180 flags = (ctx->flags & (CAP_INPLACE_OPS | CAP_SEPARATE_IO_BUFS)); in cipher_begin_session() 185 flags = (ctx->flags & (CAP_SYNC_OPS | CAP_ASYNC_OPS)); in cipher_begin_session() [all …]
|
/Zephyr-latest/doc/project/ |
D | dev_env_and_tools.rst | 1 .. _dev-environment-and-tools: 42 code-owner review. Additionally, some changes might require further discussions 43 and a decision by the TSC or the Security working group. To summarize the above, 50 :figclass: align-center 55 --------- 57 - An author of a change can suggest in his pull-request which category a change 61 - The project will use the label system to categorize the pull requests. 62 - Changes should not be merged before the minimal time has expired. 65 ----------------- 82 Trivial changes are those that appear obvious enough and do not require maintainer or code-owner [all …]
|
/Zephyr-latest/doc/releases/ |
D | release-notes-2.2.rst | 13 Security Vulnerability Related 16 The following security vulnerabilities (CVE) were addressed in this release: 18 * Fix CVE-2020-10028 19 * Fix CVE-2020-10060 20 * Fix CVE-2020-10063 21 * Fix CVE-2020-10066 24 https://docs.zephyrproject.org/latest/security/vulnerabilities.html 32 * :github:`23494` - Bluetooth: LL/PAC/SLA/BV-01-C fails if Slave-initiated Feature Exchange is disa… 33 * :github:`23485` - BT: host: Service Change indication sent regardless of whether it is needed or … 34 * :github:`23482` - 2M PHY + DLE and timing calculations on an encrypted link are wrong [all …]
|
D | release-notes-3.6.rst | 12 * New :ref:`GNSS subsystem <gnss_api>` added, enabling geo-awareness in Zephyr applications. 13 * New API and drivers introduced for interfacing with :ref:`keyboard matrices <gpio-kbd>`. 16 * Integrated Trusted Firmware-M (TF-M) 2.0, including an update to Mbed TLS 3.5.2. 23 * Over 30 new supported boards, spanning all Zephyr-supported architectures. 30 Security Vulnerability Related 35 https://docs.zephyrproject.org/latest/security/vulnerabilities.html 37 * CVE-2023-5779 `Zephyr project bug tracker GHSA-7cmj-963q-jj47 38 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7cmj-963q-jj47>`_ 40 * CVE-2023-6249 `Zephyr project bug tracker GHSA-32f5-3p9h-2rqc 41 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-32f5-3p9h-2rqc>`_ [all …]
|
D | release-notes-3.5.rst | 31 Security Vulnerability Related 36 https://docs.zephyrproject.org/latest/security/vulnerabilities.html 38 * CVE-2023-3725 `Zephyr project bug tracker GHSA-2g3m-p6c7-8rr3 39 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3>`_ 41 * CVE-2023-4257 `Zephyr project bug tracker GHSA-853q-q69w-gf5j 42 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j>`_ 44 * CVE-2023-4258 `Zephyr project bug tracker GHSA-m34c-cp63-rwh7 45 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-m34c-cp63-rwh7>`_ 47 * CVE-2023-4259 `Zephyr project bug tracker GHSA-gghm-c696-f4j4 48 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4>`_ [all …]
|
D | release-notes-1.14.rst | 11 Security Vulnerability Related 14 The following security vulnerabilities (CVEs) were addressed in this 17 * CVE-2020-10066 18 * CVE-2020-10069 19 * CVE-2020-13601 20 * CVE-2020-13602 23 https://docs.zephyrproject.org/latest/security/vulnerabilities.html 32 * :github:`issuenumber` - issue title 34 * :github:`18334` - DNS resolution is broken for some addresses in master/2.0-pre 35 * :github:`19917` - Bluetooth: Controller: Missing LL_ENC_RSP after HCI LTK Negative Reply [all …]
|
D | release-notes-2.1.rst | 13 * Expanded support for ARMv6-M architecture. 22 Security Vulnerability Related 25 No security vulnerabilities received. 50 hardware-based stack overflow detection) in ARMv6-M architecture 51 * Added QEMU support for ARMv6-M architecture 52 * Extended test coverage for ARM-specific kernel features in ARMv6-M 54 * Enhanced runtime MPU programming in ARMv8-M architecture, making 55 the full partitioning of kernel SRAM memory a user-configurable 57 * Added CMSIS support for Cortex-R architectures. 59 * Added missing Cortex-R CPU device tree bindings. [all …]
|
D | release-notes-2.0.rst | 12 * The kernel now supports both 32- and 64-bit architectures. 17 * We added support for :ref:`Point-to-Point Protocol (PPP) <ppp>`. PPP is a 20 * We added support for UpdateHub, an end-to-end solution for large scale 21 over-the-air device updates. 22 * We added support for ARM Cortex-R Architecture (Experimental). 26 Security Vulnerability Related 29 The following security vulnerability (CVE) was addressed in this 32 * Fixes CVE-2019-9506: The Bluetooth BR/EDR specification up to and 35 negotiation. This allows practical brute-force attacks (aka "KNOB") 42 * New kernel API for per-thread disabling of Floating Point Services for [all …]
|
D | release-notes-2.4.rst | 28 Security Vulnerability Related 33 * CVE-2020-10060: UpdateHub Might Dereference An Uninitialized Pointer 34 * CVE-2020-10064: Improper Input Frame Validation in ieee802154 Processing 35 * CVE-2020-10066: Incorrect Error Handling in Bluetooth HCI core 36 * CVE-2020-10072: all threads can access all socket file descriptors 37 * CVE-2020-13598: FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat 38 * CVE-2020-13599: Security problem with settings and littlefs 39 * CVE-2020-13601: Under embargo until 2020/11/18 40 * CVE-2020-13602: Remote Denial of Service in LwM2M do_write_op_tlv 43 https://docs.zephyrproject.org/latest/security/vulnerabilities.html [all …]
|
D | release-notes-3.0.rst | 14 Security Vulnerability Related 20 https://docs.zephyrproject.org/latest/security/vulnerabilities.html 22 * CVE-2021-3835: `Zephyr project bug tracker GHSA-fm6v-8625-99jf 23 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf>`_ 25 * CVE-2021-3861: `Zephyr project bug tracker GHSA-hvfp-w4h8-gxvj 26 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj>`_ 28 * CVE-2021-3966: `Zephyr project bug tracker GHSA-hfxq-3w6x-fv2m 29 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hfxq-3w6x-fv2m>`_ 36 <https://github.com/zephyrproject-rtos/zephyr/issues?q=is%3Aissue+is%3Aopen+label%3Abug>`_. 53 * Added ``ranges`` and ``dma-ranges`` as invalid property to be used with DT_PROP_LEN() [all …]
|
/Zephyr-latest/modules/trusted-firmware-m/ |
D | Kconfig.tfm | 1 # Configuration for the TF-M Module 5 # Copyright 2024 Arm Limited and/or its affiliates <open-source-office@arm.com> 6 # SPDX-License-Identifier: Apache-2.0 25 default "${ZEPHYR_BASE}/modules/trusted-firmware-m/nordic/nrf9160" if SOC_NRF9160 26 default "${ZEPHYR_BASE}/modules/trusted-firmware-m/nordic/nrf9120" if SOC_NRF9120 27 default "${ZEPHYR_BASE}/modules/trusted-firmware-m/nordic/nrf5340_cpuapp" if SOC_NRF5340_CPUAPP 33 bool "Build with TF-M as the Secure Execution Environment" 44 additionally generate a TF-M image for the Secure Execution 46 itself is to be executed in the Non-Secure Processing Environment. 48 ensures that the Zephyr image is built as a Non-Secure image. Both [all …]
|
/Zephyr-latest/scripts/ |
D | zephyr_module.py | 5 # SPDX-License-Identifier: Apache-2.0 11 Include file is generated for Kconfig using --kconfig-out. 12 A <name>:<path> text file is generated for use with CMake using --cmake-out. 14 Using --twister-out <filename> an argument file for twister script will 57 cmake-ext: 61 kconfig-ext: 65 sysbuild-cmake: 68 sysbuild-kconfig: 71 sysbuild-cmake-ext: 75 sysbuild-kconfig-ext: [all …]
|
/Zephyr-latest/scripts/ci/ |
D | check_compliance.py | 5 # SPDX-License-Identifier: Apache-2.0 57 f"{cp.stdout.decode('utf-8')}\n" 59 f"{cp.stderr.decode('utf-8')}\n") 61 return cp.stdout.decode("utf-8").rstrip() 70 return git('rev-list', 71 f'--max-count={-1 if "." in refspec else 1}', refspec).split() 74 filter_arg = (f'--diff-filter={filter}',) if filter else () 75 paths_arg = ('--', *paths) if paths else () 76 out = git('diff', '--name-only', *filter_arg, COMMIT_RANGE, *paths_arg) 128 - The magic string "<zephyr-base>" can be used to refer to the [all …]
|
/Zephyr-latest/arch/ |
D | Kconfig | 3 # Copyright (c) 2014-2015 Wind River Systems, Inc. 6 # SPDX-License-Identifier: Apache-2.0 18 # Should be 'select'ed by low-level symbols like SOC_SERIES_* or, lacking that, 37 # is really only necessary for Cortex-M with ARM MPU! 173 symbols above. See the top-level CMakeLists.txt. 180 module-str = arch 186 This option tells the build system that the target system is big-endian. 187 Little-endian architecture is the default and should leave this option 195 # Hidden Kconfig option representing the default little-endian architecture 196 # This is just the opposite of BIG_ENDIAN and is used for non-negative [all …]
|
/Zephyr-latest/drivers/wifi/nxp/ |
D | Kconfig.nxp | 1 # Copyright 2022-2024 NXP 2 # SPDX-License-Identifier: Apache-2.0 5 bool "NXP Wi-Fi driver support" 14 Enable NXP SoC Wi-Fi support. 28 bool "Custom NXP Wi-Fi part" 30 Customize NXP Wi-Fi chip support. 33 prompt "Select NXP Wi-Fi part" 36 Choose NXP Wi-Fi chip support. 39 bool "NXP RW610-based Chipset" 44 Select this option if you have a NXP RW610-based [all …]
|
/Zephyr-latest/subsys/bluetooth/mesh/ |
D | Kconfig | 4 # SPDX-License-Identifier: Apache-2.0 113 bool "Mesh-specific workqueue" 116 mesh-specific workqueue. This will ensure that messages are always sent. 117 The application needs to ensure the mesh-specific workqueue size is large 130 CONFIG_BT_BUF_CMD_TX_COUNT, the host returns -ENOBUFS immediately 237 bool "PB-ADV support" 299 bool "PB-GATT Server support" 314 the PB-GATT is enabled. 317 bool "PB-GATT Client support" 509 Maximum number of simultaneous outgoing multi-segment and/or [all …]
|
/Zephyr-latest/scripts/west_commands/zspdx/ |
D | walker.py | 1 # Copyright (c) 2020-2021 The Linux Foundation 3 # SPDX-License-Identifier: Apache-2.0 43 # configuration - WalkerConfig 81 …|http(s)?:\/\/)(?P<base_url>[\w\.@]+)(\/|:))(?P<namespace>[\w,\-,\_]+)\/(?P<package>[\w,\-,\_]+)(.… 151 # determine path from build dir to CMake file-based API index file, then 183 cfgApp.name = "app-sources" 185 cfgApp.docRefID = "DocumentRef-app" 190 cfgPackageApp.name = "app-sources" 191 cfgPackageApp.spdxID = "SPDXRef-app-sources" 205 cfgBuild.docRefID = "DocumentRef-build" [all …]
|
12