You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: dh/implementation/README.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,10 @@ This allows us to treat outgoing messages as being untainted from a taint analys
10
10
For this purpose, `library/io.go` provides a function `PerformVirtualOutputOperation` that enforces (via its specification) that a caller gives up an I/O permission for sending a message.
11
11
Thus, we configure the taint analysis (in `../argot-proofs/argot-config-dh.yaml`) to treat this function as a sanitizer, i.e., that this returns untainted data.
12
12
13
+
Protocol steps in the Core are easy to locate as each step requires justification by the I/O specification. I.e., `unfold io.P_Alice(...)` (`unfold iospec.P_Agent(...)` in the SSM Agent case study) applies the I/O specification to obtain the I/O permission for the subsequent operation such as sending or receiving a message or performing an internal operation. These internal operations directly correspond to a transition in the Tamarin model.
14
+
15
+
`dh/implementation/initiator/initiator.go` provides detailed comments explaining the application of the I/O specification for the `ProduceHsMsg1` method in the DH case study.
0 commit comments