Lines Matching refs:client
32 * a client of the crypto service, which makes a RPC to the crypto service;
33 * in some scenarios, a client of the client, which makes a RPC to the crypto client which re-shares…
42 2. The client (or client's client) modifies the input.
45 … code reads the length again and uses it without validation. A malicious client can modify the len…
47 …n separately calculates the ciphertext and the MAC from the plaintext. A client sets the plaintext…
50 * If the authenticated encryption calculates the ciphertext before the client changes the output bu…
57 2. The client (or client's client) modifies the intermediate data.
60 …tion in place. (This is how `mbedtls_rsa_pkcs1_sign` works.) A malicious client may write badly fo…
62 …client: the key and the data to sign are under the attestation application's control, and the fina…
69 2. The client (or client's client) reads the intermediate data.
72 …client's memory. Suppose the encryption mechanism works by copying its input to the output buffer …
74 …client identity in the associated data. Suppose that an AEAD decryption function processes the cip…
81 2. The client reads the early output and uses that to calculate the next part of the input.
84 …client can choose the content of a plaintext block after seeing the immediately preceding cipherte…
86 …hough this extends the possible behaviors of the one-shot interface, the client can do the same th…