error 0 crypto_encrypt_open does not handle c=t overlap ==1457== Memcheck, a memory error detector ==1457== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==1457== Using Valgrind-3.15.0.GIT and LibVEX; rerun with -h for copyright info ==1457== Command: ./try ==1457== ==1457== Conditional jump or move depends on uninitialised value(s) ==1457== at 0x4C32734: __memcmp_sse4_1 (vg_replace_strmem.c:1112) ==1457== by 0x4017D9: test (try.c:151) ==1457== by 0x401EB2: main (try-anything.c:295) ==1457== Uninitialised value was created by a stack allocation ==1457== at 0x403790: crypto_symenc_decrypt (crypto.c:76) ==1457== ==1457== ==1457== HEAP SUMMARY: ==1457== in use at exit: 7,145,392 bytes in 12 blocks ==1457== total heap usage: 2,118 allocs, 2,106 frees, 7,254,112 bytes allocated ==1457== ==1457== LEAK SUMMARY: ==1457== definitely lost: 0 bytes in 0 blocks ==1457== indirectly lost: 0 bytes in 0 blocks ==1457== possibly lost: 7,144,960 bytes in 10 blocks ==1457== still reachable: 432 bytes in 2 blocks ==1457== suppressed: 0 bytes in 0 blocks ==1457== Rerun with --leak-check=full to see details of leaked memory ==1457== ==1457== For lists of detected and suppressed errors, rerun with: -s ==1457== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)