From: Tobias Brunner Date: Wed, 23 Feb 2022 16:39:39 +0000 (+0100) Subject: leak-detective: Whitelist OpenSSL 3.0 functions X-Git-Tag: 5.9.6rc1~1^2~13 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=519bc22091b6bb56abed86f86013a527250fe9ee;p=thirdparty%2Fstrongswan.git leak-detective: Whitelist OpenSSL 3.0 functions --- diff --git a/src/libstrongswan/utils/leak_detective.c b/src/libstrongswan/utils/leak_detective.c index 0476353ada..5e3be5acc1 100644 --- a/src/libstrongswan/utils/leak_detective.c +++ b/src/libstrongswan/utils/leak_detective.c @@ -597,6 +597,29 @@ static char *whitelist[] = { "RAND_DRBG_get0_master", "RAND_DRBG_get0_private", "RAND_DRBG_get0_public", + /* OpenSSL 3.0 caches even more static stuff */ + "ERR_set_debug", + "ERR_set_error", + "EVP_DigestSignInit", + "EVP_DigestVerifyInit", + "EVP_PKEY_encrypt_init", + "EVP_PKEY_decrypt_init", + "EVP_PKEY_derive_init", + "EVP_PKEY_sign_init", + "EVP_ASYM_CIPHER_fetch", + "EVP_CIPHER_fetch", + "EVP_KDF_fetch", + "EVP_KEYEXCH_fetch", + "EVP_KEYMGMT_fetch", + "EVP_MAC_fetch", + "EVP_MD_fetch", + "EVP_SIGNATURE_fetch", + "OSSL_DECODER_do_all_provided", + "OSSL_ENCODER_do_all_provided", + "OSSL_PROVIDER_try_load", + "OSSL_PROVIDER_load", + "RAND_get0_private", + "RAND_get0_public", /* We get this via libcurl and OpenSSL 1.1.1 */ "CRYPTO_get_ex_new_index", /* OpenSSL libssl */