Identification should include describing functions eligible to be called, and all other solutions are restricted.