Lines Matching refs:other
12 …ons to the official API specification). Legacy crypto, X.509, TLS, or any other function which is …
13 …io/psa-api/crypto/1.1/overview/conventions.html#output-buffer-sizes). Any other data is assumed to…
19 …artition's memory directly. Partitions are meant to be isolated from each other: a partition may o…
21 … service**. The crypto service receives remote procedure calls (RPC) from other partitions, valida…
23 When the data is accessible to another partition, there is a risk that this other partition will ac…
74 …lients, using a single shared key. Clients are not allowed to access each other's data. The provis…
102 The following rules guarantee that shared memory cannot result in a security violation other than […
142 …n expected benefit in some cases is that there are practical protection methods other than copying.
178 …mits its output as a stream, with no error condition detected after setup other than operational f…
261 On the other hand, the only advantage of ad-hoc copying is slightly greater flexibility.
332 …suitable for our purposes. However, approach (4) is more complex than the other two. To implement …
340 … poisoning function, although it's remotely possible that this will cause other problems. Valgrind…
395 If all other approaches turn out to be prohibitively difficult, code review exists as a fallback op…
459 …* Flexibility - Could the prototype be extended to cover other careful-access testing that may be …
616 A second advantage of using macros for the copying (other than simple convenience) is that it allow…