Home
last modified time | relevance | path

Searched refs:against (Results 26 – 50 of 100) sorted by relevance

1234

/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Dcore.rst36 numbers from elements within the mesh network to perform protection against
39 To keep a node protected against replay attacks after reboot, it needs to store
/Zephyr-latest/subsys/logging/backends/
DKconfig.rtt101 # that will lead to corruption of RTT data which is not protected against being
/Zephyr-latest/arch/xtensa/core/
DCMakeLists.txt51 # to build this file to protect against mismatched versions.)
/Zephyr-latest/scripts/net/
DREADME.txt1 The shell script run-sample-tests.sh runs selected Zephyr samples against
/Zephyr-latest/boards/st/nucleo_wl55jc/doc/
Dnucleo_wl55jc.rst83 - Sector protection against read/write operations (PCROP, RDP, WRP)
119 - Sector protection against read/write operations
/Zephyr-latest/doc/security/
Dsecurity-overview.rst144 protection mechanisms are provided to protect against stack overruns.
265 document shall be created and evaluated against the implementation.
498 - Design of **countermeasures** against known attack vectors
518 2. **Identification of threats** against the assets such as breaches of
541 The modeling of security threats against the Zephyr RTOS is required for
545 these assets are protected by the system and which threats against them
637 protect the assets against exploits of vulnerabilities of the
/Zephyr-latest/boards/franzininho/esp32s2_franzininho/doc/
Dindex.rst15 - Protection against physical fault injection attacks
/Zephyr-latest/tests/kernel/timer/timer_behavior/
DREADME3 Records and calculates statistical values against a timer validating that.
/Zephyr-latest/doc/security/standards/
Detsi-303645.rst207 risk of automated attacks against a class or type of device.
214 - Authentication mechanisms used to authenticate users against a
223 - Where a user can authenticate against a device, the device
420 of automated attacks against classes of devices.
/Zephyr-latest/doc/services/portability/posix/conformance/
Dindex.rst26 strictly conforming application need not be modified in order to compile against Zephyr.
/Zephyr-latest/doc/hardware/peripherals/sensor/
Dread_and_decode.rst30 against many sensors simultaneously from a single call context.
/Zephyr-latest/samples/
Dsample_definition_and_criteria.rst27 * If a sample can provide output that can be verified, then output should be evaluated against
/Zephyr-latest/samples/arch/mpu/mpu_test/
DREADME.rst9 against the following security issues:
/Zephyr-latest/doc/kernel/services/other/
Dfatal.rst208 way can detect the overflow, but cannot guarantee against data corruption and
216 no protection against data corruption. Since the checks are typically done at
/Zephyr-latest/boards/st/stm32wb5mmg/doc/
Dstm32wb5mmg.rst111 protection (PCROP) against R/W
145 - Sector protection against R/W operation (PCROP)
/Zephyr-latest/doc/project/
Drelease_process.rst375 - Bugs reported against platforms of this tier are to be evaluated and treated as
387 - Bugs reported against platforms of this tier are to be evaluated and treated
396 - Bugs reported against platforms of this tier are NOT considered as
405 - Bugs reported against platforms of this tier are NOT considered as
/Zephyr-latest/arch/x86/zefi/
DREADME.txt79 There is no protection against colliding mappings. We just assume
/Zephyr-latest/doc/services/rtio/
Dindex.rst87 Multiple operations against the same iodev are done in the order provided as
212 against using a thread for each concurrent I/O operation or custom queues and
/Zephyr-latest/doc/services/storage/secure_storage/
Dindex.rst65 In addition, the data stored in the ITS is not protected against replay attacks,
/Zephyr-latest/
DLICENSE82 institute patent litigation against any entity (including a
173 incurred by, or claims asserted against, such Contributor by reason
/Zephyr-latest/soc/espressif/common/
DKconfig.esptool176 Enabling this option turns off the image protection against corruption
/Zephyr-latest/boards/espressif/esp32s2_devkitc/doc/
Dindex.rst23 - Protection against physical fault injection attacks
/Zephyr-latest/boards/espressif/esp32s2_saola/doc/
Dindex.rst23 - Protection against physical fault injection attacks
/Zephyr-latest/doc/develop/languages/cpp/
Dindex.rst100 form. Instead, it allows configuring the build system to link against the
108 system can be configured to link against the GNU C++ Library (``libstdc++.a``),
/Zephyr-latest/doc/connectivity/networking/api/
Dnet_mgmt.rst74 the event code (passed as an argument) against the specific network

1234