Lines Matching refs:code

6 … the cryptography library is using it, and thus cause unexpected behavior in the cryptography code.
41 1. The crypto code reads part of the input and validates it, or injects it into a calculation.
43 3. The crypto code reads the same part again, and performs an action which would be impossible if t…
45code reads the length field and checks that it fits within the buffer. (This could be the length o…
56 1. The crypto code writes some intermediate data into the output buffer.
58 3. The crypto code reads the intermediate data back and continues the calculation, leading to an ou…
68 1. The crypto code writes some intermediate data into the output buffer. This intermediate data mus…
70 3. The crypto code overwrites the intermediate data.
80 1. The crypto code processes part of the input and writes the corresponding part of the output.
82 3. The crypto code processes the rest of the input.
120 2. The code of the crypto service.
121 3. The code of the PSA Crypto dispatch layer (also known as the core), which is provided by Mbed TL…
138 …ication using Mbed TLS. This is both an additional maintenance cost (more code to analyze, more te…
241 Once the copying code is implemented, it should be evaluated to see whether compiler optimization i…
244 * Inspect the generated code with `objdump` or a similar tool to see if copying operations are pres…
252 #### Copying code
257 * Copying code must only be reviewed for correctness in one place, rather than in all functions whe…
293 … general idea: have tests where the test code calling API functions allocates memory in a certain …
297 Proposed general idea: in test code, “poison” the memory area used by input and output parameters t…
299 In the library, the code that does the copying temporarily unpoisons the memory by calling a test h…
316 …py function to do the poisoning: that would only validate that the driver code does not access the…
332 …rs in separate memory pages. They would require special handling and test code would likely have t…
334 … two, ASan appears to have a limitation related to buffer alignment. From code comments quoted in …
355 * The code coverage of these tests is greater than would be achievable writing new tests from scrat…
388 As with validation of copying, the simplest method of validation we can implement is careful code r…
395 If all other approaches turn out to be prohibitively difficult, code review exists as a fallback op…
462 …* Comprehensibility - Accounting for the lower code quality of a prototype, would developers unfam…
490 …ementations of mechanisms for which there is a requirement on drivers. By code inspection, how sat…
518 As discussed in [Copying code](#copying-code), it is simpler to use a single unified API for copyin…
575 …nput using `psa_crypto_local_input_alloc()`. On failure, it sets an error code and jumps to an exi…
584 These macros allow PSA functions to have copying added while keeping the code mostly unmodified. Co…
616 … to PSA functions, it is useful to be able to disable it where it is not needed, to save code size.
664 …appers.c`. These are wrappers around all PSA functions that allow testing code to be inserted at t…
668 Poisoning code is added to these test wrappers where relevant in order to pre-poison and post-unpoi…