Package: openssl
Version: 0.9.7e
Severity: wishlist

Suppressions don't seem to be good enough to eliminate this
unfortunately - the uninitializedness taints all the users of the
openssl random number generator, producing valgrind hits throughout
your program, making it unnecessarily difficult to see the wood for
the trees.

ttfn/rjk

--- openssl-0.9.7e.orig/crypto/rand/rand_unix.c 2003-12-27 16:01:52.000000000 
+0000
+++ openssl-0.9.7e/crypto/rand/rand_unix.c      2006-04-19 15:42:32.000000000 
+0100
@@ -160,6 +160,9 @@
        const char **egdsocket = NULL;
 #endif

+       /* Keep valgrind happy */
+       memset(tmpbuf, 0, sizeof tmpbuf);
+
 #ifdef DEVRANDOM
        /* Use a random entropy pool device. Linux, FreeBSD and OpenBSD
         * have this. Use /dev/urandom if you can as /dev/random may block


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to