error 0 crypto_encrypt_open does not handle c=t overlap ==7763== Memcheck, a memory error detector ==7763== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==7763== Using Valgrind-3.15.0.GIT and LibVEX; rerun with -h for copyright info ==7763== Command: ./try ==7763== ==7763== Conditional jump or move depends on uninitialised value(s) ==7763== at 0x4C32734: __memcmp_sse4_1 (vg_replace_strmem.c:1112) ==7763== by 0x1099D9: test (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==7763== by 0x1090B4: main (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==7763== Uninitialised value was created by a stack allocation ==7763== at 0x10B2AD: crypto_symenc_decrypt (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==7763== ==7763== ==7763== HEAP SUMMARY: ==7763== in use at exit: 11,266,992 bytes in 12 blocks ==7763== total heap usage: 2,118 allocs, 2,106 frees, 11,375,744 bytes allocated ==7763== ==7763== LEAK SUMMARY: ==7763== definitely lost: 0 bytes in 0 blocks ==7763== indirectly lost: 0 bytes in 0 blocks ==7763== possibly lost: 11,266,560 bytes in 10 blocks ==7763== still reachable: 432 bytes in 2 blocks ==7763== suppressed: 0 bytes in 0 blocks ==7763== Rerun with --leak-check=full to see details of leaked memory ==7763== ==7763== For lists of detected and suppressed errors, rerun with: -s ==7763== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)