You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
First of all, I love the idea behind ctgrind, and having a way to actually test whether some piece of code has branches or memory accesses that depend on secret data is a tremendous addition to a developer's toolbox, so a big thank you for that!
I'm afraid some people who may benefit from this might be put off by having to patch valgrind, so to avoid that, I wanted to document that at least with recent versions of valgrind, this doesn't seem to be necessary, as valgrind already provides a macro doing what we want:
First of all, I love the idea behind ctgrind, and having a way to actually test whether some piece of code has branches or memory accesses that depend on secret data is a tremendous addition to a developer's toolbox, so a big thank you for that!
I'm afraid some people who may benefit from this might be put off by having to patch valgrind, so to avoid that, I wanted to document that at least with recent versions of valgrind, this doesn't seem to be necessary, as valgrind already provides a macro doing what we want:
I hope this helps more people test their code for secret-dependent branches and memory accesses.
The text was updated successfully, but these errors were encountered: