]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
leak-detective: Whitelist OpenSSL 3.0 functions
authorTobias Brunner <tobias@strongswan.org>
Wed, 23 Feb 2022 16:39:39 +0000 (17:39 +0100)
committerTobias Brunner <tobias@strongswan.org>
Thu, 14 Apr 2022 17:05:44 +0000 (19:05 +0200)
src/libstrongswan/utils/leak_detective.c

index 0476353ada8acdf5b91f4012ca59d8939120e87f..5e3be5acc15cac9c65af2c305b99f9701c0f8723 100644 (file)
@@ -597,6 +597,29 @@ static char *whitelist[] = {
        "RAND_DRBG_get0_master",
        "RAND_DRBG_get0_private",
        "RAND_DRBG_get0_public",
+       /* OpenSSL 3.0 caches even more static stuff */
+       "ERR_set_debug",
+       "ERR_set_error",
+       "EVP_DigestSignInit",
+       "EVP_DigestVerifyInit",
+       "EVP_PKEY_encrypt_init",
+       "EVP_PKEY_decrypt_init",
+       "EVP_PKEY_derive_init",
+       "EVP_PKEY_sign_init",
+       "EVP_ASYM_CIPHER_fetch",
+       "EVP_CIPHER_fetch",
+       "EVP_KDF_fetch",
+       "EVP_KEYEXCH_fetch",
+       "EVP_KEYMGMT_fetch",
+       "EVP_MAC_fetch",
+       "EVP_MD_fetch",
+       "EVP_SIGNATURE_fetch",
+       "OSSL_DECODER_do_all_provided",
+       "OSSL_ENCODER_do_all_provided",
+       "OSSL_PROVIDER_try_load",
+       "OSSL_PROVIDER_load",
+       "RAND_get0_private",
+       "RAND_get0_public",
        /* We get this via libcurl and OpenSSL 1.1.1 */
        "CRYPTO_get_ex_new_index",
        /* OpenSSL libssl */