When I run the the openssl evptest suite in purify runtime memory usage analysis tool
it reports lots of memory segment errors in the AES crypto functions.

Question is how does purify calculate this segment boundary. Obviously it doesn't look at current %esp value [as there are no references to -N(%esp) in functions in question]. So how does it do it or rather is it possible to confuse purify and make it miscalculate the boundary? Point is that AES_[en|de]crypt allocates custom stack frame and aligns it in very specific manner...

Is it possible to make purify point out offending instruction? Maybe it's possible to make it dump the code instead of reporting error, in which case you can use debugger to find the offending instruction... A.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to