Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 257) sorted by relevance

1234567891011

/Zephyr-latest/drivers/entropy/
DKconfig.npcx21 The chosen security strength defines the amount of entropy bits
25 bool "DRBG security strength 112 bits"
28 bool "DRBG security strength 128 bits"
31 bool "DRBG security strength 192 bits"
34 bool "DRBG security strength 256 bits"
37 bool "DRBG security strength 12b bits test"
40 bool "DRBG security strength 256 bits test"
/Zephyr-latest/tests/net/lib/wifi_credentials/src/
Dmain.c89 enum wifi_security_type security = -1; in ZTEST() local
98 SSID1, sizeof(SSID1), &security, bssid_buf, ARRAY_SIZE(bssid_buf), psk_buf, in ZTEST()
113 enum wifi_security_type security = -1; in ZTEST() local
123 SSID1, sizeof(SSID1), &security, bssid_buf, ARRAY_SIZE(bssid_buf), psk_buf, in ZTEST()
129 zassert_equal(security, SECURITY1, "Security type mismatch"); in ZTEST()
145 enum wifi_security_type security = -1; in ZTEST() local
155 SSID1, sizeof(SSID1), &security, bssid_buf, ARRAY_SIZE(bssid_buf), psk_buf, in ZTEST()
163 zassert_equal(security, SECURITY1, "Security type mismatch"); in ZTEST()
179 enum wifi_security_type security = -1; in ZTEST() local
189 SSID2, sizeof(SSID2), &security, bssid_buf, ARRAY_SIZE(bssid_buf), psk_buf, in ZTEST()
[all …]
/Zephyr-latest/tests/bluetooth/audio/cap_commander/src/
Dtest_common.c40 conn->info.security.level = BT_SECURITY_L2; in test_conn_init()
41 conn->info.security.enc_key_size = BT_ENC_KEY_SIZE_MAX; in test_conn_init()
42 conn->info.security.flags = BT_SECURITY_FLAG_OOB | BT_SECURITY_FLAG_SC; in test_conn_init()
/Zephyr-latest/doc/security/
Dsecurity-overview.rst10 defined security process that helps developers build more secure
11 software while addressing security compliance requirements. It presents
12 the key ideas of the security process and outlines which documents need
21 mainly focuses on security functionality.
30 2. **Secure Design:** Defines security procedures and implement measures
31 to enforce them. A security architecture of the system and
36 and mitigating security issues.
43 .. figure:: media/security-process-steps.png
50 This document is a guideline for the development of a security process
52 Committee. It provides an overview of the Zephyr security process for
[all …]
Dindex.rst7 for ensuring security is addressed within the Zephyr project.
13 security-overview.rst
Dreporting.rst11 acknowledged and analyzed by the security response team within 1 week.
12 Each vulnerability will be entered into the Zephyr Project security
16 .. _GitHub: https://github.com/zephyrproject-rtos/zephyr/security
78 The security advisories created are kept private, due to the
79 sensitive nature of security reports. The issues are only visible to
120 The security subcommittee will maintain information mapping embargoed
121 CVEs to these PRs (this information is within the Github security
122 advisories), and produce regular reports of the state of security
125 Each issue that is considered a security vulnerability shall be
146 legitimate interest in knowing about security vulnerabilities during
[all …]
Dhardening-tool.rst7 process, known as "hardening", involves strengthening the security of a system to protect it from
12 #. Disabling features and compilation flags that might lead to security vulnerabilities (ex. making
15 #. Enabling optional features that can lead to improve security (ex. stack sentinel, hardware stack
21 recommendations to adjust security-related options.
33 could lead to a security vulnerability, the table will propose a recommended value that should be
Dsecure-coding.rst7 emphasis on security.
17 security is addressed within the Zephyr project. All code submitted
26 security perspective. Many of the ideas contained herein are captured
37 need to have. This section gives references to other security
46 documentation about how security-sensitive issues are handled by the
58 help prevent security violations and limit their impact:
63 security measures, publicly accepted cryptographic algorithms and
79 to provide maximum security. This corresponds to the "Secure by
89 positive security model aims to minimize the attack surface of the
98 - **Psychological acceptability** requires that security features are
[all …]
Dvulnerabilities.rst396 …rt: https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment
475 bypass security checks performed by system call handlers. The impact
642 When settings is used in combination with littlefs all security
732 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364>`_
766 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-89j6-qpxf-pfpc>`_
779 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-46h3-hjcq-2jjr>`_
798 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7548-5m6f-mqv9>`_
814 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7364-p4wc-8mj4>`_
830 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp>`_
846 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm>`_
[all …]
/Zephyr-latest/subsys/net/lib/lwm2m/
Dlwm2m_obj_security.c85 static struct lwm2m_engine_obj security; variable
245 security.obj_id = LWM2M_OBJECT_SECURITY_ID; in lwm2m_security_init()
246 security.version_major = SECURITY_VERSION_MAJOR; in lwm2m_security_init()
247 security.version_minor = SECURITY_VERSION_MINOR; in lwm2m_security_init()
248 security.is_core = true; in lwm2m_security_init()
249 security.fields = fields; in lwm2m_security_init()
250 security.field_count = ARRAY_SIZE(fields); in lwm2m_security_init()
251 security.max_instance_count = MAX_INSTANCE_COUNT; in lwm2m_security_init()
252 security.create_cb = security_create; in lwm2m_security_init()
253 lwm2m_register_obj(&security); in lwm2m_security_init()
/Zephyr-latest/drivers/wifi/nxp/
Dnxp_wifi_drv.c493 nxp_wlan_uap_network.security.mfpc = true; in nxp_wifi_start_ap()
494 nxp_wlan_uap_network.security.mfpr = true; in nxp_wifi_start_ap()
496 nxp_wlan_uap_network.security.mfpc = true; in nxp_wifi_start_ap()
497 nxp_wlan_uap_network.security.mfpr = false; in nxp_wifi_start_ap()
500 if (params->security == WIFI_SECURITY_TYPE_NONE) { in nxp_wifi_start_ap()
501 nxp_wlan_uap_network.security.type = WLAN_SECURITY_NONE; in nxp_wifi_start_ap()
502 } else if (params->security == WIFI_SECURITY_TYPE_PSK) { in nxp_wifi_start_ap()
503 nxp_wlan_uap_network.security.type = WLAN_SECURITY_WPA2; in nxp_wifi_start_ap()
504 nxp_wlan_uap_network.security.psk_len = params->psk_length; in nxp_wifi_start_ap()
505 strncpy(nxp_wlan_uap_network.security.psk, params->psk, params->psk_length); in nxp_wifi_start_ap()
[all …]
/Zephyr-latest/tests/bluetooth/audio/cap_initiator/src/
Dtest_common.c39 conn->info.security.level = BT_SECURITY_L2; in test_conn_init()
40 conn->info.security.enc_key_size = BT_ENC_KEY_SIZE_MAX; in test_conn_init()
41 conn->info.security.flags = BT_SECURITY_FLAG_OOB | BT_SECURITY_FLAG_SC; in test_conn_init()
/Zephyr-latest/doc/security/standards/
Dindex.rst7 with cyber security on their own. This included how to assess the scale and impact
11 and enforcements are rapidly emerging, and consequently, security standards. These
16 by security standards requirements and provide the right information to enable
Detsi-303645.rst59 * - critical security parameter
60 - security-related secret information whose disclosure or modification can compromise
61 the security of a security module.
70 manufacturer will provide security updates.
115 * - public security parameter
116 - security related public information whose modification can compromise the security of a
117 security module.
122 * - security module
123 - set of hardware, software, and/or firmware that implements security functions.
125 * - security update
[all …]
/Zephyr-latest/drivers/wifi/esp32/src/
Desp_wifi_drv.c60 wifi_auth_mode_t security; member
251 res.security = WIFI_SECURITY_TYPE_NONE; in scan_done_handler()
254 res.security = WIFI_SECURITY_TYPE_PSK; in scan_done_handler()
257 res.security = WIFI_SECURITY_TYPE_SAE; in scan_done_handler()
260 res.security = WIFI_SECURITY_TYPE_WAPI; in scan_done_handler()
263 res.security = WIFI_SECURITY_TYPE_EAP; in scan_done_handler()
266 res.security = WIFI_SECURITY_TYPE_WEP; in scan_done_handler()
269 res.security = WIFI_SECURITY_TYPE_WPA_PSK; in scan_done_handler()
272 res.security = WIFI_SECURITY_TYPE_UNKNOWN; in scan_done_handler()
534 switch (params->security) { in esp32_wifi_connect()
[all …]
/Zephyr-latest/.github/
DSECURITY.md5 The Zephyr project supports the following versions with security
22 Reporting](https://docs.zephyrproject.org/latest/security/reporting.html)
/Zephyr-latest/samples/subsys/mgmt/osdp/
DREADME.rst7 intended to improve interoperability among access control and security products.
19 too much resource requirements. The security is not top-notch (AES-128) but it
20 is reasonable enough, given that the alternative is no security at all.
/Zephyr-latest/subsys/mgmt/hawkbit/
DKconfig79 bool "No authentication security"
81 No authentication security for the hawkBit DDI API.
84 bool "Use target security token authentication"
86 Use target security token authentication for the hawkBit DDI API.
89 bool "Use gateway security token authentication"
91 Use gateway security token authentication for the hawkBit DDI API.
96 string "Authentication security token"
100 Authentication security token for the configured hawkBit DDI
/Zephyr-latest/modules/hostap/src/
Dsupp_api.c520 if (params->security == WIFI_SECURITY_TYPE_EAP_TLS_SHA256) { in process_cipher_config()
554 static int is_eap_valid_security(int security) in is_eap_valid_security() argument
556 return (security == WIFI_SECURITY_TYPE_EAP_TLS || in is_eap_valid_security()
557 security == WIFI_SECURITY_TYPE_EAP_PEAP_MSCHAPV2 || in is_eap_valid_security()
558 security == WIFI_SECURITY_TYPE_EAP_PEAP_GTC || in is_eap_valid_security()
559 security == WIFI_SECURITY_TYPE_EAP_TTLS_MSCHAPV2 || in is_eap_valid_security()
560 security == WIFI_SECURITY_TYPE_EAP_PEAP_TLS || in is_eap_valid_security()
561 security == WIFI_SECURITY_TYPE_EAP_TLS_SHA256); in is_eap_valid_security()
595 if (params->security == eap_config[index].type) { in hapd_get_eap_config()
603 params->security); in hapd_get_eap_config()
[all …]
/Zephyr-latest/drivers/wifi/eswifi/
Deswifi_core.c119 res->security = WIFI_SECURITY_TYPE_NONE; in __parse_scan_res()
121 res->security = WIFI_SECURITY_TYPE_PSK; in __parse_scan_res()
287 eswifi->sta.security); in eswifi_connect()
516 switch (sta->security) { in eswifi_mgmt_iface_status()
518 status->security = WIFI_SECURITY_TYPE_NONE; in eswifi_mgmt_iface_status()
521 status->security = WIFI_SECURITY_TYPE_PSK; in eswifi_mgmt_iface_status()
524 status->security = WIFI_SECURITY_TYPE_UNKNOWN; in eswifi_mgmt_iface_status()
576 switch (params->security) { in __eswifi_sta_config()
579 eswifi->sta.security = ESWIFI_SEC_OPEN; in __eswifi_sta_config()
584 eswifi->sta.security = ESWIFI_SEC_WPA2_MIXED; in __eswifi_sta_config()
[all …]
/Zephyr-latest/samples/net/wifi/apsta_mode/src/
Dmain.c129 ap_config.security = WIFI_SECURITY_TYPE_NONE; in enable_ap_mode()
132 ap_config.security = WIFI_SECURITY_TYPE_PSK; in enable_ap_mode()
157 sta_config.security = WIFI_SECURITY_TYPE_PSK; in connect_to_wifi()
/Zephyr-latest/drivers/wifi/infineon/
Dairoc_wifi.c147 static int convert_whd_security_to_zephyr(whd_security_t security) in convert_whd_security_to_zephyr() argument
151 switch (security) { in convert_whd_security_to_zephyr()
177 if ((security & ENTERPRISE_ENABLED) != 0) { in convert_whd_security_to_zephyr()
191 p_zy_result->security = convert_whd_security_to_zephyr(p_whd_result->security); in parse_scan_result()
547 if (usr_result.security == WHD_SECURITY_UNKNOWN) { in airoc_mgmt_connect()
554 if (whd_wifi_join(airoc_sta_if, &usr_result.SSID, usr_result.security, params->psk, in airoc_mgmt_connect()
618 whd_security_t security; in airoc_mgmt_ap_enable() local
665 switch (params->security) { in airoc_mgmt_ap_enable()
667 security = WHD_SECURITY_OPEN; in airoc_mgmt_ap_enable()
670 security = WHD_SECURITY_WPA2_AES_PSK; in airoc_mgmt_ap_enable()
[all …]
/Zephyr-latest/subsys/bluetooth/host/
DKconfig.gatt34 bool "Automatic security elevation and retry on security errors"
38 If an ATT request fails due to insufficient security, the host will
39 try to elevate the security level and retry the ATT request.
85 bool "Automatic security re-establishment request as a peripheral"
89 This option requests security re-establishment automatically whenever
91 there are notifiable or indicatable characteristics for which security
95 bt_conn_set_security() to re-establish security prior to sending any
97 security (unless the central does that first).
274 Select security requirementsf for writing device name by remote GATT
302 Select security requirementsf for writing device name by remote GATT
/Zephyr-latest/subsys/net/lib/config/
DKconfig148 string "IEEE 802.15.4 security key"
152 The key string to use for the link-layer security part.
155 int "IEEE 802.15.4 security key mode"
160 The key mode to use for the link-layer security part.
164 int "IEEE 802.15.4 security level (0-7)"
169 The security level to use for the link-layer security part.
170 0 means no security
/Zephyr-latest/samples/net/lwm2m_client/
DKconfig24 int "TLS security tag"
27 TLS security tag to use when connecting.

1234567891011