[openssl-users] Warnings Compiling openssl 1.0.2d

Jeffrey Walton noloader at gmail.com
Tue Jul 21 20:44:51 UTC 2015

On Tue, Jul 21, 2015 at 4:06 PM, Matt Caswell <matt at openssl.org> wrote:
> On 21/07/15 20:54, Jeffrey Walton wrote:
>>>>                           ^
>>>> d1_both.c: In function 'dtls1_retransmit_message':
>>>> d1_both.c:1261:9: warning: 'save_write_sequence' may be used
>>>> uninitialized in this function [-Wmaybe-uninitialized]
>>>>          memcpy(s->s3->write_sequence, save_write_sequence,
>>>>          ^
>>> This one is entirely bogus. "save_write_sequence" is initialized on line
>>> 1241. The compiler just isn't clever enough to figure that out.
>> Right. But we need to learn to work with our tools :) The other option
>> throws the baby out with the bath water by disabling warnings. Or, it
>> leaves the problem in places so thousands or millions of folks have to
>> look at the issue and clear it.
> Agree to a point. I always config with --strict-warnings to add dev team
> flags (as do the rest of the dev team).

This is a good point. You are saying "trust the developers, they know
what is best." I'm fine with that because they really do know what's
best. No one knows the code better.

... Then C&A creeps in. For some companies, they have to acceptance
test libraries before using them. Its a matter of governance, polices
and procedures. If an organization's bar is lower than OpenSSL's, then
everything is fine. If the bar is higher, then its a pain pint.

Folks like Rich Salz knows exactly what I am talking about and
experiences the pain points regularly. (I've worn Rich's hat and
walked in his shoes).

> We could spend a huge amount of time tracking all of those down for
> little benefit.

To play devil's advocate, To Whom? If 10,000 people each spend 15
minutes looking at (and re-analyzing) one warning, then the community
collectively lost 4,000 man hours. 2 minutes for a dev to clear the
issue once versus 4,000 man hours seems like a very good return on

And to be fair, I just cleared a similar warning in Crypto++:
I new damn well all those variables were initialized, and the problem
was with analyzer's inter-procedural analysis.

For the d04b813e8 commit, I had to analyze it to ensure it was not a
legitimate squawk. But my choices after analyzing it were: (1) spend
30 seconds on the clear-commit-push cycle; or (2) allow the community
to spend countless hours reanalyzing it, and spend countless hours
explaining the reason for the dirty compile on the mailing list
(q.v.!). I opted for (1) because it was easier on me, and
organizations don't have to worry about C&A and governance issues.

Like I said, its learning to play well with your tools :)


More information about the openssl-users mailing list