-
Notifications
You must be signed in to change notification settings - Fork 57
Investigate use of unsafe
and panicking
#2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
See https://github.com/rust-secure-code/safety-dance for |
Also: https://rust-lang.github.io/unsafe-code-guidelines/ |
We have to decide what kind of guarantees we provide when we offer a safe function in an interface and probably the easiest one to reason about would be something like
I think this leaves us with the sole responsability of being the middle-man, but not putting any pressure related to checking the arguments that we pass down (apart from a process safety perspective) - and by this I'm only talking about the For any abstractions, we would definitely need to make sure that the intended operations work out of the box, barring invalid arguments (that we validate ourselves). @hug-dev - does that make sense? |
I think so, preventing invalid argument to be given to the underlining |
Ensure PcrSelectionList retains order, #2
At the moment, our methods implemented on
Context
appear to be safe for clients of the crate to use, but it might not be so. We should decide whatunsafe
behaviour means for us and what functionality we report as (un)safe.We should also look into our uses of
unwrap
and try to reduce them as much as possible.The text was updated successfully, but these errors were encountered: