Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 49) sorted by relevance

12

/Zephyr-latest/samples/bluetooth/peripheral_hids/
DKconfig7 bool "Enable passkey authentication"
10 Enable the passkey authentication callback and register the GATT
11 read and write attributes as authentication required.
DREADME.rst14 In the default configuration the sample uses passkey authentication (displays a
17 To disable authentication and just use encrypted channels instead, build the
/Zephyr-latest/subsys/mgmt/hawkbit/
DKconfig75 prompt "hawkBit DDI API authentication modes"
79 bool "No authentication security"
81 No authentication security for the hawkBit DDI API.
84 bool "Use target security token authentication"
86 Use target security token authentication for the hawkBit DDI API.
89 bool "Use gateway security token authentication"
91 Use gateway security token authentication for the hawkBit DDI API.
101 authentication mode.
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Dprovisioning.rst44 Of Band information, such as the device's public key or an authentication
122 The Provisioning API supports the following authentication methods for the
125 * **Static OOB:** An authentication value is assigned to the device in
128 * **Input OOB:** The user inputs the authentication value. The available input
130 * **Output OOB:** Show the user the authentication value. The available output
133 The application must provide callbacks for the supported authentication
138 When an Output OOB action is selected, the authentication value should be
151 If Provisionee wants to mandate OOB authentication, it is mandatory to use
175 Depending on the choice of public key exchange mechanism and authentication method,
Dshell.rst353 Input a numeric OOB authentication value. Only valid when prompted by the shell during
357 * ``Number``: Decimal authentication number.
363 Input an alphanumeric OOB authentication value. Only valid when prompted by the shell during
367 * ``String``: Unquoted alphanumeric authentication string.
373 Set or clear the static OOB authentication value. The static OOB authentication value must
410 OOB authentication action.
424 OOB authentication action.
438 authentication, and use the given static authentication value when provisioning.
444 From the provisioner device, don't use any authentication when provisioning new devices.
/Zephyr-latest/subsys/bluetooth/services/
DKconfig.hrs26 bool "Require encryption and authentication for access"
/Zephyr-latest/subsys/net/lib/config/
DKconfig171 1 authentication only with a 4 bytes length tag
172 2 authentication only with a 8 bytes length tag
173 3 authentication only with a 16 bytes length tag
175 5 encryption/authentication with a 4 bytes length tag
176 6 encryption/authentication with a 8 bytes length tag
177 7 encryption/authentication with a 16 bytes length tag
/Zephyr-latest/subsys/bluetooth/services/ias/
DKconfig.ias25 bool "Require encryption and authentication for write access"
/Zephyr-latest/subsys/net/l2/ppp/
DKconfig53 bool "PAP authentication protocol"
56 Enable support for PAP authentication protocol.
/Zephyr-latest/subsys/bluetooth/host/classic/
Dssp.c620 evt->authentication); in bt_hci_io_capa_resp()
622 if (evt->authentication > BT_HCI_GENERAL_BONDING_MITM) { in bt_hci_io_capa_resp()
643 conn->br.remote_auth = evt->authentication; in bt_hci_io_capa_resp()
728 cp->authentication = auth; in bt_hci_io_capa_req()
/Zephyr-latest/doc/security/standards/
Detsi-303645.rst35 * - authentication mechanism
38 * - authentication value
39 - individual value of an attribute used by an authentication mechanism.
81 optionally sets authentication features for a user or for network access.
225 mechanism to change the authentication value used.
234 authentication mechanisms via network interfaces
450 only be possible after authentication on that interface.
458 network interface shall only be accessible after authentication. The exception is for
/Zephyr-latest/modules/
DKconfig.tinycrypt34 message authentication code.
/Zephyr-latest/doc/connectivity/bluetooth/shell/host/
Dgap.rst313 * **1** No encryption and no authentication;
314 * **2** Encryption and no authentication;
315 * **3** Encryption and authentication;
318 To enable security, use the :code:`bt security <level>` command. For levels requiring authentication
319 (level 3 and above), you must first set the authentication method. To do it, you can use the
327 Enabling authentication requires the devices to be bondable. By default the shell is bondable. You
/Zephyr-latest/subsys/bluetooth/host/
DCMakeLists.txt112 channels that would otherwise require encryption/authentication in order to
DKconfig.gatt284 bool "Encryption and authentication required"
312 bool "Encryption and authentication required"
/Zephyr-latest/doc/connectivity/networking/api/
Dmqtt.rst155 credentials that the MQTT library should use for authentication. We do not specify
158 authentication. Finally, we enforce peer certificate verification by setting
/Zephyr-latest/samples/subsys/mgmt/hawkbit/
DREADME.rst72 --hawkbit.server.ddi.security.authentication.anonymous.enabled=true
214 Change authentication security from false to true.
218 hawkbit.server.ddi.security.authentication.anonymous.enabled=true
/Zephyr-latest/doc/connectivity/bluetooth/
Dbluetooth-le-host.rst127 No encryption and no authentication.
130 Encryption but no authentication (no MITM protection).
133 Encryption and authentication using the legacy pairing method
137 Encryption and authentication using the LE Secure Connections
/Zephyr-latest/subsys/mgmt/osdp/
DKconfig83 authentication.
/Zephyr-latest/doc/security/
Dsecure-coding.rst77 protection scheme, e.g., after successful authentication.
163 authentication, such as requiring both a password and a hardware
164 token, is stronger than single-factor authentication)
206 scripting, missing authentication, and missing authorization. See the
/Zephyr-latest/subsys/mgmt/mcumgr/transport/
DKconfig.bluetooth42 bool "Require encryption and authentication for access"
/Zephyr-latest/samples/tfm_integration/psa_protected_storage/
DREADME.rst12 optional authentication and rollback protection. The default crypto algorithm is ``AES-128-GCM``.
/Zephyr-latest/subsys/net/l2/ieee802154/
DKconfig123 IEEE 802.15.4 soft MAC will use to run authentication, encryption and
/Zephyr-latest/subsys/secure_storage/
DKconfig.its_transform23 # authentication tag (16) + nonce (12)
/Zephyr-latest/doc/develop/west/
Dworkspaces.rst95 authentication enabled, and may be preferable to storing your account password
96 in plain text even if two-factor authentication is disabled.)

12