Richard Salz wrote:
Yes, exactly my point. Until someone enhances valgrind, however, something like this might work well:
        {
                RAND_bytes1
                Memcheck: Value1
                /* notused */
                RAND_bytes
        }
and repeat that four times with 2, 4, 8, 16 replacing the two 1's.

I betcha that catches almost all problems; at least within OpenSSL.

A "suppression rule" is not the same as the rule I'm referring to.

Suppressions work on the symptom what would otherwise be reported, to suppress that report. So this means you have to supress EVERY stack trace of the EVERY user of the data returned by RAND_xxxx(). As you can imagine this just is not possible and like duck hunt at the fair ground.

So I agree with your general concept of valgrind needing a rule to learn this particular case is correct, but it is not a "supression rule" and I've never had any success with the approach you suggest as new cases just keep on appearing and I keep adding rules and rules and rules. YYMV



Darryl
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to