/Zephyr-latest/subsys/net/lib/config/ |
D | Kconfig | 148 string "IEEE 802.15.4 security key" 152 The key string to use for the link-layer security part. 155 int "IEEE 802.15.4 security key mode" 160 The key mode to use for the link-layer security part. 164 int "IEEE 802.15.4 security level (0-7)" 169 The security level to use for the link-layer security part. 170 0 means no security
|
/Zephyr-latest/tests/boards/espressif/wifi/src/ |
D | main.c | 58 wifi_band_txt(entry->band), entry->rssi, wifi_security_txt(entry->security), in wifi_scan_result() 178 params.security = WIFI_SECURITY_TYPE_PSK; in wifi_connect() 182 params.security = WIFI_SECURITY_TYPE_SAE; in wifi_connect() 186 params.security = WIFI_SECURITY_TYPE_NONE; in wifi_connect()
|
/Zephyr-latest/soc/nxp/s32/s32k1/ |
D | Kconfig | 78 protection settings (loaded on reset) and security information that 88 hex "Flash security byte (FSEC)" 93 backdoor key access, mass erase, factory access, and flash security
|
/Zephyr-latest/subsys/bluetooth/crypto/ |
D | CMakeLists.txt | 15 Private security keys such as the Long Term Key will be printed out.
|
/Zephyr-latest/doc/ |
D | index-tex.rst | 25 security/index.rst
|
/Zephyr-latest/tests/bluetooth/common/testlib/ |
D | CMakeLists.txt | 29 src/security.c
|
/Zephyr-latest/samples/net/lwm2m_client/ |
D | Kconfig | 24 int "TLS security tag" 27 TLS security tag to use when connecting.
|
/Zephyr-latest/subsys/net/l2/wifi/ |
D | wifi_mgmt.c | 51 const char *wifi_security_txt(enum wifi_security_type security) in wifi_security_txt() argument 53 switch (security) { in wifi_security_txt() 378 NET_DBG("ch %u sec %u", params->channel, params->security); in wifi_connect() 380 if ((params->security > WIFI_SECURITY_TYPE_MAX) || in wifi_connect() 383 ((params->security == WIFI_SECURITY_TYPE_PSK || in wifi_connect() 384 params->security == WIFI_SECURITY_TYPE_WPA_PSK || in wifi_connect() 385 params->security == WIFI_SECURITY_TYPE_PSK_SHA256 || in wifi_connect() 386 params->security == WIFI_SECURITY_TYPE_WPA_AUTO_PERSONAL) && in wifi_connect() 389 ((params->security == WIFI_SECURITY_TYPE_SAE_HNP || in wifi_connect() 390 params->security == WIFI_SECURITY_TYPE_SAE_H2E || in wifi_connect() [all …]
|
D | wifi_shell.c | 211 : (entry->security == WIFI_SECURITY_TYPE_EAP ? "WPA2 Enterprise" in handle_wifi_scan_result() 212 : wifi_security_txt(entry->security))), in handle_wifi_scan_result() 644 params->security = WIFI_SECURITY_TYPE_NONE; in __wifi_args_to_params() 665 params->security = atoi(state->optarg); in __wifi_args_to_params() 666 if (params->security) { in __wifi_args_to_params() 729 if (params->security == WIFI_SECURITY_TYPE_NONE || in __wifi_args_to_params() 730 params->security == WIFI_SECURITY_TYPE_WPA_PSK) { in __wifi_args_to_params() 732 wifi_security_txt(params->security)); in __wifi_args_to_params() 887 if (params->security == WIFI_SECURITY_TYPE_SAE_HNP in __wifi_args_to_params() 888 || params->security == WIFI_SECURITY_TYPE_SAE_H2E in __wifi_args_to_params() [all …]
|
/Zephyr-latest/ |
D | README.rst | 20 and built with security in mind. 84 | ⚠️ Report security vulnerabilities at vulnerabilities@zephyrproject.org 106 .. _Security documentation: https://docs.zephyrproject.org/latest/security/index.html 107 .. _Security Advisories Repository: https://github.com/zephyrproject-rtos/zephyr/security
|
/Zephyr-latest/samples/net/cloud/tagoio_http_post/src/ |
D | wifi.c | 58 .security = WIFI_SECURITY_TYPE_PSK, in wifi_connect()
|
/Zephyr-latest/doc/services/crypto/ |
D | psa_crypto.rst | 16 comprehensive security framework to address the increasing security 36 security as new algorithms emerge and existing ones become obsolete. 55 practices, enhancing long-term security and compliance. 130 ``psa_crypto_init()``. However, some security standards require 137 with a different security context. In environments with 151 If an application shares memory with another security context, it
|
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/ |
D | brg_cfg_cli.rst | 13 the target Bridge Configuration Server is used for access layer security.
|
/Zephyr-latest/samples/bluetooth/peripheral_sc_only/ |
D | README.rst | 12 accept connections that are secured using security level 4 (FIPS).
|
/Zephyr-latest/subsys/net/l2/ieee802154/ |
D | Kconfig | 107 bool "IEEE 802.15.4 security [EXPERIMENTAL]" 110 Enable 802.15.4 frame security handling, in order to bring data 113 and outgoing security procedures only partially implemented, etc.).
|
/Zephyr-latest/subsys/bluetooth/services/ias/ |
D | Kconfig.ias | 19 bool "No security required"
|
/Zephyr-latest/boards/arm/fvp_baser_aemv8r/ |
D | board.cmake | 19 -C gic_distributor.has-two-security-states=0 53 -C gic_distributor.has-two-security-states=0
|
/Zephyr-latest/samples/net/sockets/http_server/ |
D | Kconfig | 37 with security when using HTTP/2, at a minimum you will need to add the CA 39 trusted authorities. Otherwise the connection can fail with a security
|
/Zephyr-latest/drivers/entropy/ |
D | Kconfig.nrf_cracen | 15 core. This driver cannot be used in conjunction with the nRF security PSA solution, as both
|
/Zephyr-latest/samples/subsys/mgmt/updatehub/src/ |
D | main.c | 124 .security = WIFI_SECURITY_TYPE_PSK, in main()
|
/Zephyr-latest/drivers/wifi/winc1500/ |
D | wifi_winc1500.c | 693 result.security = WIFI_SECURITY_TYPE_NONE; in handle_scan_result() 695 result.security = WIFI_SECURITY_TYPE_PSK; in handle_scan_result() 1014 uint8_t security; in winc1500_mgmt_connect() local 1021 if (params->security == WIFI_SECURITY_TYPE_PSK) { in winc1500_mgmt_connect() 1026 security = M2M_WIFI_SEC_WPA_PSK; in winc1500_mgmt_connect() 1029 security = M2M_WIFI_SEC_OPEN; in winc1500_mgmt_connect() 1042 security == M2M_WIFI_SEC_OPEN ? "without" : "with", in winc1500_mgmt_connect() 1046 security, auth, channel)) { in winc1500_mgmt_connect()
|
/Zephyr-latest/tests/bluetooth/audio/ascs/src/ |
D | test_common.c | 76 conn->info.security.level = BT_SECURITY_L2; in test_conn_init() 77 conn->info.security.enc_key_size = BT_ENC_KEY_SIZE_MAX; in test_conn_init() 78 conn->info.security.flags = BT_SECURITY_FLAG_OOB | BT_SECURITY_FLAG_SC; in test_conn_init()
|
/Zephyr-latest/subsys/bluetooth/audio/ |
D | audio.c | 189 if ((info.security.flags & (BT_SECURITY_FLAG_OOB | BT_SECURITY_FLAG_SC)) == 0) { in bt_audio_security_check() 197 if (info.security.enc_key_size < BT_ENC_KEY_SIZE_MAX) { in bt_audio_security_check()
|
/Zephyr-latest/.github/ISSUE_TEMPLATE/ |
D | 007_ext-source.md | 57 How does this component handle security vulnerabilities and updates? 59 provide details and references to any CVEs or security advisories.
|
/Zephyr-latest/doc/services/storage/secure_storage/ |
D | index.rst | 22 device-specific security features and the configuration, the subsystem 25 possible because it's able to provide more security due to isolation guarantees. 39 This depends on device-specific security features and the configuration. 61 because this depends on device-specific security features and the configuration.
|