On 05/02/14 23:00, Jeffrey Walton wrote:

> Well, I'm not sure how to proceed since RAND_init_fips is the linchpin.
>
> A call to ... -> RAND_init_fips -> ... -> fips_aes_encrypt is OK.
>
> A call to ... -> AES_encrypt -> ... -> fips_aes_encrypt is BAD.
>
> I'm fairly certain I need to include RAND_init_fips to rule out a
> legitimate uninitialized read, but I'm not sure how to do it.
>
> Any ideas how to craft this rule?

You can't. There is no way to write a suppression which says "don't 
worry about reads from the memory that was allocated at location X" 
which is what you are tryng to do.

Your problem presumably is that something is deliberately mixing 
uninitialised memory into the random pool - whether that is a sensible 
idea is a good question but lets not repeat the whole Debian openssl 
debate again...

The best fix is to have whatever is doing that use a client request to 
deliberately mark the data in the random as initialised because in a 
logical sense it is even though strictly speaking it isn't.

Otherwise you're stuck trying to suppress everything that winds up 
depending on data from the random pool.

Tom

-- 
Tom Hughes (t...@compton.nu)
http://compton.nu/

------------------------------------------------------------------------------
Managing the Performance of Cloud-Based Applications
Take advantage of what the Cloud has to offer - Avoid Common Pitfalls.
Read the Whitepaper.
http://pubads.g.doubleclick.net/gampad/clk?id=121051231&iu=/4140/ostg.clktrk
_______________________________________________
Valgrind-users mailing list
Valgrind-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to