Hi,
> It certainly would, but Valgrind isn't the only analysis tool people
> might want to use. A runtime flag provides a means of obtaining accurate
> results with any tool.
Unfortunately, for am attacker it also provides a means of (possibly)
weakening your program's randomness behind your back, so IMO any way
to configure this behaviour at runtime is a potential security issue.
IMO it's better to tell people unable to ignore "bogus" warnings (or
make their analysis tool ignore them, e.g. via a suppressions file) to
use a special build option, like it's currently done.
In fact, I'd generally (i.e. not specifically for OpenSSL) wish
developers would invest more of their time into fixing bugs and/or
adding features rather than trying to get rid of the last "bogus"
warnings caused by some more or less obscure compiler or analysis
tool - that would also (need to) result in a healthier reaction to
such warnings by other developers and packagers: just assume that
the authors know what they are doing instead of trying to "fix" even
the last warning by whatever inappropriate means.
Regards,
Stefan
P.S.: Of course, I realize it's a problem if you have lots of bogus
warnings and can't even find the real problematic ones in
between them, but there must be a reasonable compromise
somewhere between "a lot" and "zero".
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [email protected]
Automated List Manager [EMAIL PROTECTED]