-
-
Notifications
You must be signed in to change notification settings - Fork 680
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Syscall verifiers #4229
Syscall verifiers #4229
Conversation
419af94
to
d58001f
Compare
48272d1
to
b283313
Compare
} break; | ||
#endif | ||
|
||
#ifdef USE_OPTIGA | ||
/*optiga_sign_result optiga_sign(uint8_t index, const uint8_t *digest, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't we have a SYSCALL_OPTIGA_SIGN
though?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, thanks for catching that. I've added fixed it, see 2cff1e5
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Few comments below
[no changelog]
[no changelog]
[no changelog]
[no changelog]
c338491
to
7d90b60
Compare
[no changelog]
[no changelog]
7d90b60
to
d379943
Compare
This PR implements syscall argument verification, ensuring passed buffers are within memory accessible to unprivileged code. It also copies data when needed to prevent TOC/TOU attacks.
Additional changes:
hash_processor
API.This resolves issue #4203.