Summary: 30 instances, 27 unique Text Count // TODO - eliminate the data_key type 1 * TODO - Finish splitting cipher.c into common code and backend, and move this into the backends. 1 // TODO - eliminate the struct data_key type and use the unencrypted_data_key buffer directly 1 // TODO - should we free the parsed header here? 2 // TODO: Footer 1 # TODO: Fix these? 1 * TODO: Should we re-hash to deal with CMMs which don't pre-hash? 1 // TODO - unify everything on byte_bufs when the aws-c-common refactor lands 1 /* TODO: Saturation */ 1 // TODO: check for post-condition aws_cryptosdk_keyring_trace_is_valid(trace) 1 // TODO: should the signature be a cursor after all? 1 // TODO: Make encrypted_data_keys a pointer? 1 // TODO: We currently _only_ accept compressed points. Should we accept uncompressed points as well? 1 /* TODO: Refactor once writing routines are moved to aws_byte_bufs */ 1 // TODO check for KR config/etc? 1 // TODO - should we try to write incrementally? 1 // TODO: Initialize the cipher once and reuse it 1 /* TODO: Better name for this property? */ 1 // TODO: add preconditions that if the ctx/pkey/keypair exist, they are valid. 1 // TODO: Cache? Are EC_GROUPs threadsafe? 1 // TODO: we should actually perform memcpy and not memcpy_havoc 3 // TODO AWS_BAD_STATE 1 # TODO: 1 // TODO - is this the right error? 1 // TODO: When aws-c-common removes the NUL terminator fix this 1 /* TODO: assert(evp_pkey_ctx_is_valid(ctx)); */ 1 // TODO: initialization for trailing signature key, if necessary 1