You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 40 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5890bdad-7148-4ce1-82da-20d8f0a00aa2"><ac:parameter ac:name=""> asynchronous-safe</ac:parameter></ac:structured-macro>
asynchronous-safe [[GNU Pth]]
A function is asynchronous-safe, or asynchronous-signal safe, if it can be called safely and without side effects from within a signal handler context. That is, it must be able to be interrupted at any point to run linearly out of sequence without causing an inconsistent state. It must also function properly when global data might itself be in an inconsistent state. Some asynchronous-safe operations are listed here:

  • call the signal() function to reinstall a signal handler
  • unconditionally modify a volatile sig_atomic_t variable (as modification to this type is atomic)
  • call the _Exit() function to immediately terminate program execution
  • invoke an asynchronous-safe function, as specified by your implementation

Few functions are portably asynchronous-safe. If a function performs any other operations, it is probably not portably asynchronous-safe.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="284187be-6c9c-4bd6-9155-d8f4e574404a"><ac:parameter ac:name=""> availability</ac:parameter></ac:structured-macro>
availability [[IEEE Std 610.12 1990]]
The degree to which a system or component is operational and accessible when required for use. Often expressed as a probability.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36fb8686-1688-4c04-bf07-3c4abc66c8ff"><ac:parameter ac:name=""> conforming program</ac:parameter></ac:structured-macro>
conforming [[ISO/IEC 9899-1999]]
Conforming programs may depend on nonportable features of a conforming implementation.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="672ee968-c5a4-47c2-84b5-e971c56b296c"><ac:parameter ac:name=""> error tolerance</ac:parameter></ac:structured-macro>
error tolerance [[IEEE Std 610.12 1990]]
The ability of a system or component to continue normal operation despite the presence of erroneous inputs.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57af7b49-ad89-4826-839c-e4b7c35f0b64"><ac:parameter ac:name=""> exploit</ac:parameter></ac:structured-macro>
exploit [[Seacord 05a]]
A piece of software or a technique that takes advantage of a security vulnerability to violate an explicit or implicit security policy.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52b917bf-5bba-4016-80c8-8b92592bc42a"><ac:parameter ac:name=""> fail safe</ac:parameter></ac:structured-macro>
fail safe [[IEEE Std 610.12 1990]]
Pertaining to a system or component that automatically places itself in a safe operating mode in the event of a failure; for example, a traffic light that reverts to blinking red in all directions when normal operation fails.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1fce0807-2573-4275-b55d-fb787df10337"><ac:parameter ac:name=""> fail soft</ac:parameter></ac:structured-macro>
fail soft [[IEEE Std 610.12 1990]]
Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures; for example, a traffic light that continues to alternate between red and green if the yellow light fails.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7950092-ee8a-4ca3-ab06-409401a98ce6"><ac:parameter ac:name=""> fault tolerance</ac:parameter></ac:structured-macro>
fault tolerance [[IEEE Std 610.12 1990]]
The ability of a system or component to continue normal operation despite the presence of hardware or software faults.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce37fac0-e243-465b-b8d9-a37a03f6d53b"><ac:parameter ac:name=""> freestanding environment</ac:parameter></ac:structured-macro>
freestanding environment [[ISO/IEC 9899-1999]]
An environment in which C program execution may take place without any benefit of an operating system.  Program startup might occur at some function other than main(), complex types might not be implemented, and only certain minimal library facilities are guaranteed to be available.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f9c2232-c7df-4a6f-907d-920b632a9367"><ac:parameter ac:name=""> hosted environment</ac:parameter></ac:structured-macro>
hosted environment [[ISO/IEC 9899-1999]]
An environment that is not freestanding.  Program startup occurs at main(), complex types are implemented, and all C standard library facilities are available.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="118fa0da-a8d0-458a-9fb5-79a2301735d0"><ac:parameter ac:name=""> implementation</ac:parameter></ac:structured-macro>
implementation [[ISO/IEC 9899-1999]]
Particular set of software, running in a particular translation environment under particular control options, that performs translation of programs for, and supports execution of functions in, a particular execution environment.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7957112-e5e6-4238-ac82-f23eaaf6b4db"><ac:parameter ac:name=""> implementation-defined behavior</ac:parameter></ac:structured-macro>
implementation-defined behavior [[ISO/IEC 9899-1999]]
Unspecified behavior whereby each implementation documents how the choice is made.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6cbbb437-3511-458e-a9d0-2e174054de85"><ac:parameter ac:name=""> incomplete type</ac:parameter></ac:structured-macro>
incomplete type [[ISO/IEC 9899-1999]]
A type that describes an identifier but lacks information needed to determine the size of the identifier.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66dd943c-dcdd-45b1-97f1-352017d9e8d1"><ac:parameter ac:name=""> locale-specific behavior</ac:parameter></ac:structured-macro>
locale-specific behavior [[ISO/IEC 9899-1999]]
Behavior that depends on local conventions of nationality, culture, and language that each implementation documents.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb60f5f9-c628-4997-9df1-fefda090550c"><ac:parameter ac:name=""> lvalue</ac:parameter></ac:structured-macro>
lvalue [[ISO/IEC 9899-1999]]
An expression with an object type or an incomplete type other than void. The name lvalue comes originally from the assignment expression E1 = E2, in which the left operand E1 is required to be a (modifiable) lvalue. It is perhaps better considered as representing an object "locator value".

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f87e8aa-8417-4749-bba9-f418a1889c05"><ac:parameter ac:name=""> mitigation</ac:parameter></ac:structured-macro>
mitigation [[Seacord 05a]]
Methods, techniques, processes, tools, or runtime libraries that can prevent or limit exploits against vulnerabilities.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbc9ba69-b56c-43a3-8df6-fdad3543146f"><ac:parameter ac:name=""> reentrant</ac:parameter></ac:structured-macro>
reentrant [[Dowd 06]]
A function is reentrant if multiple instances of the same function can run in the same address space concurrently without creating the potential for inconsistent states.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9399d95d-ed03-40ff-90c5-d5325d2dc88d"><ac:parameter ac:name=""> reliability</ac:parameter></ac:structured-macro>
reliability [[IEEE Std 610.12 1990]]
The ability of a system or component to perform its required functions under stated conditions for a specified period of time.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abe0135e-d4a9-45da-b1ba-bdc777dc4b99"><ac:parameter ac:name=""> rvalue</ac:parameter></ac:structured-macro>
rvalue [[ISO/IEC 9899-1999]]
Value of an expression.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c23db32-7df8-4f21-8dc8-3bd9178e2a3b"><ac:parameter ac:name=""> security flaw</ac:parameter></ac:structured-macro>
security flaw [[Seacord 05a]]
A software defect that poses a potential security risk.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff59373e-2d34-489f-957b-61ba0f89c033"><ac:parameter ac:name=""> security policy</ac:parameter></ac:structured-macro>
security policy [[Internet Society 00]]
A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb219003-70d1-4839-a824-00695f863d27"><ac:parameter ac:name=""> sequence point</ac:parameter></ac:structured-macro>
sequence point C99 [[ISO/IEC 9899-1999]]
Evaluation of an expression may produce side effects. At specific points in the execution sequence called sequence points, all side effects of previous evaluations have completed, and no side effects of subsequent evaluations have yet taken place.

The following sequence points are defined by C99 [[ISO/IEC 9899-1999]]:

  • the call to a function, after the arguments have been evaluated
  • the end of the first operand of the following operators: && (logical AND); || (logical OR); ? (conditional); , (comma operator)
  • the end of a full declarator
  • the end of a full expression: an initializer; the expression in an expression statement (that is, at the semicolon); the controlling expression of a selection statement (if or switch); the controlling expression of a while or do statement; each of the expressions of a for statement; the expression in a return statement
  • immediately before a function returns
  • after the actions associated with each formatted input/output function conversion specifier
  • immediately before and immediately after each call to a comparison function, by a standard searching or sorting function, and between any call to a comparison function and any movement of the objects passed as arguments to that call

Note that not all instances of a comma in C code denote a usage of the comma operator. For example, the comma between arguments in a function call is not a sequence point.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa22e990-2f1d-4080-9c46-ed88c99beed0"><ac:parameter ac:name=""> strictly conforming</ac:parameter></ac:structured-macro>
strictly conforming [[ISO/IEC 9899-1999]]
A strictly conforming program is one that uses only those features of the language and library specified in the international standard. Strictly conforming programs are intended to be maximally portable among conforming implementations and can't, for example, depend on implementation-defined behavior.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94376bea-2b42-4b4c-b410-0e29553fccb5"><ac:parameter ac:name=""> undefined behavior</ac:parameter></ac:structured-macro>
undefined behavior [[ISO/IEC 9899-1999]]
Behavior, upon use of a nonportable or erroneous program construct or of erroneous data, for which the standard imposes no requirements. An example of undefined behavior is the behavior on integer overflow.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="282338ac-bdb7-4a48-af28-480339ffa84d"><ac:parameter ac:name=""> unspecified behavior</ac:parameter></ac:structured-macro>
unspecified behavior [[ISO/IEC 9899-1999]]
Behavior for which the standard provides two or more possibilities and imposes no further requirements on which is chosen in any instance.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01270eaa-80d5-4de9-afa3-6c37ab0c52d3"><ac:parameter ac:name=""> validation</ac:parameter></ac:structured-macro>
validation [[IEC 61508-4]]
Confirmation by examination and provision of objective evidence that the particular requirements for a specific intended use are fulfilled.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e3ca71d-ad28-4fc7-bb13-10d8fda258ff"><ac:parameter ac:name=""> verification</ac:parameter></ac:structured-macro>
verification [[IEC 61508-4]]
Confirmation by examination and provision of objective evidence that the requirements have been fulfilled.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7befc234-5686-46eb-ad43-e0e439023fc7"><ac:parameter ac:name=""> vulnerability</ac:parameter></ac:structured-macro>
vulnerability [[Seacord 05a]]
A set of conditions that allows an attacker to violate an explicit or implicit security policy.


AA. C References      CERT C Secure Coding Standard      CERT C Secure Coding Standard

  • No labels