[sv-cc] Comments on: Proposal uploaded for handling IP Encryption

From: Jim Vellenga <vellenga_at_.....>
Date: Thu Apr 14 2005 - 06:53:29 PDT
Comments on proposal for #345:

26.3.5

"an boolean constant" --> "a boolean constant"

In the last sentence, vpiType and vpiIsProtected should be represented 
in bold face.
----------

26.6.19

To me, "shall allow iteration over the vpiArgument relationship" begs a 
lot of questions.  What can one do with the resulting returned objects, 
since they presumably are in a protected region, and therefore, "access 
to object relationships and properties shall be an error"?  Strictly 
speaking, that means that we can at most (a) count them, (b) find their 
vpiType, and (c) find out that they're protected.

Also, if it's important to allow access of some sort to the arguments, 
should we also allow access to the user systf?
----------

27.19

"If a scope at any level of the searched hierarchy is protected" is 
ambiguous.  One could interpret "the searched hierarchy" to be the 
whole design (if _scope_ is NULL) or the whole tree rooted at _scope_.  
Under that interpretation, if any scope in the searched tree is 
protected, you couldn't return a handle by name for any object anywhere 
in the tree, even if all the scopes from the object to the root were 
unprotected.  Did you intend that, or did you intend to prevent access 
only to objects that are themselves either protected or inferior to 
protected scopes?

Also, if the named object is not a scope but is protected, and if all 
the (superior?) scopes are unprotected, vpi_handle_by_name returns the 
named object.  What happens if the named object is a protected scope 
but all the (superior?) scopes are unprotected?
----------

"unless otherwise specified"

The proposal uses "unless otherwise specified" in every routine that 
could be applied to a reference handle.  It appears that the only 
routines that have any exceptions specified at the current time are 
vpi_get and vpi_iterate.  What is the reason for including the 
exception phrase in all the others?
----------

General philosophy:

It appears that the general approach has been to allow relationships 
that point a protected object or objects to succeed, but then to hide 
further information about the objects -- other than their vpiType.  
Thus, most of the "vpi_" routines fail if the reference handle is 
protected, but not if the returned object (if any) is protected.

An exception to this is the vpi_handle_by_name routine, which fails 
either if the reference scope is protected or if any scope in the path 
name is protected.  However, it will not fail if all the scopes in the 
path are unprotected but the named object is protected.

Is that it?

Perhaps a NOTE on the general philosophy would be helpful in 26.3.5.

Regards,
Jim Vellenga

--------------------------------------------------------- 
James H. Vellenga                            978-262-6381 
Engineering Director                   (FAX) 978-262-6636 
Cadence Design Systems, Inc.         vellenga@cadence.com 
270 Billerica Rd 
Chelmsford, MA 01824-4179 
"We all work with partial information." 
---------------------------------------------------------- 
  
 

] -----Original Message-----
] From: owner-sv-cc@eda.org [mailto:owner-sv-cc@eda.org] On 
] Behalf Of Steven Dovich
] Sent: Monday, April 11, 2005 12:10 PM
] To: sv-cc@eda.org
] Subject: [sv-cc] Proposal uploaded for handling IP Encryption
] 
] Mantis #345 has a draft proposal attached.
] 
] /sjd
] 
] 
Received on Thu Apr 14 06:53:36 2005

This archive was generated by hypermail 2.1.8 : Thu Apr 14 2005 - 06:55:10 PDT