Lines Matching refs:buffer
6 …ess. On such systems, the untrusted process might access a shared memory buffer while the cryptogr…
13 …ns.html#input-buffer-sizes) and [output buffers](https://arm-software.github.io/psa-api/crypto/1.1…
25 …uted. A behavior that is only possible if an untrusted entity accesses a buffer while the crypto s…
45 …buffer. (This could be the length of the overall data, or the length of an embedded field) Later, …
47 …text input to `"PPPP"`, then starts the RPC call, then changes the input buffer to `"QQQQ"` while …
50 …xt before the client changes the output buffer and calculates the MAC after that change, reading t…
56 1. The crypto code writes some intermediate data into the output buffer.
60 …buffer, then applying the RSA private-key operation in place. (This is how `mbedtls_rsa_pkcs1_sign…
62 …nt shares an output buffer for the signature with the attestation application, and the attestation…
68 1. The crypto code writes some intermediate data into the output buffer. This intermediate data mus…
72 …ses an output buffer that is in the final client's memory. Suppose the encryption mechanism works …
74 …buffer and calculating the tag. (This is how AEAD decryption usually works.) At the end, if the ta…
107 …nfidential), then overwrite it. For example, it is ok to zero the output buffer before starting to…
126 …ly accesses non-overlapping buffer parameters in order to prevent any security risk resulting from…
134 …ss to shared memory. This means that any buffer located in shared memory must be copied into or ou…
138 …ip the copy if it is known for sure that a buffer is not in shared memory. However, the location o…
142 …if there is a definite benefit to it, compared to allocating an internal buffer and copying. An ex…
144 …ame byte twice, and by writing the final output directly into the output buffer. For such mechanis…
157 …buffer” is one with a size limit that is known at compile time, and small enough that copying the …
180 …derivation, i.e. deriving a structured key, which is considered a [small buffer](#operations-invol…
182 … require key derivation drivers to emit their output without reading back from the output buffer**.
194 …disclosure) if they are implemented by copying the input into the output buffer with `memmove`, th…
196 **Design decision: the dispatch layer shall allocate an intermediate buffer for cipher and AEAD pla…
198 Note that this can be a single buffer for the input and the output if the driver supports in-place …
269 ##### 1. Allocate a buffer and copy input on each call to `update()`
275 ##### 2. Allocate a buffer at the start of the operation and subdivide calls to `update()`
277 …ple calls to the driver, chopping the input into chunks of the temporary buffer size and filling t…
323 …ble for input buffers only, since it allows us to detect when a poisoned buffer is read but not wh…
326 …pare the copy of random data with the original to ensure that the output buffer has not been writt…
330 …is possible (if unlikely) that the PSA function will access the poisoned buffer without causing th…
334 …me buffer that was allocated by us and the sanitizer takes care of everything else. Of these two, …
338 Specifically, ASan will round the buffer size down to 8 bytes before poisoning due to details of it…
340 It should be possible to work around this by manually rounding buffer lengths up to the nearest mul…
355 …e writing new tests from scratch. In practice this advantage is small as buffer copying will take …
382 …issue. Specifically, we must check that each memory location in a shared buffer is not accessed mo…
435 2. Leak the start and end address of each buffer via `print()`.
436 3. Write data into the input buffer exactly once.
438 5. Read data from the output buffer exactly once.
475 Most of the test methods discussed above need extra setup. Some require leaking of buffer bounds, p…
531 uint8_t *buffer;
537 uint8_t *buffer;
542 …th them. In the case of output copies, we keep a pointer to the original buffer so that it is easy…
553 * `psa_crypto_local_input_alloc()` calls `calloc()` to allocate a new buffer of length `input_len`,…
565 …calls `calloc()` to allocate a new buffer of length `output_len` and stores `output_len` and the p…
566 …ntents of the output buffer `local_output->buffer` into the buffer `local_output->original`, calls…
568 …ory usage. For example, ciphers may be able to use a single intermediate buffer for both input and…
575 …de and jumps to an exit label. On success, it sets `input_copy` to point to the copy of the buffer.
594 …ile using a new name (e.g. with the suffix `_external`) for the original buffer. This allows copyi…
616 …ily disabled by defining alternate macros that function as no-ops. Since buffer copying is specifi…
629 This should poison or unpoison the given buffer, respectively.
680 * Read its input buffer and after calling the input-buffer-copying function to create a local copy …
681 * Write to its output buffer before and after calling the output-buffer-copying function to copy-ba…