From: Martin Willi Date: Thu, 28 Aug 2014 09:10:21 +0000 (+0200) Subject: leak-detective: Whitelist libssl SSL_COMP_get_compression_methods() X-Git-Tag: 5.2.1dr1~44^2~4 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=6eaec1e349922974fcc82c697a505feb93f23714;p=thirdparty%2Fstrongswan.git leak-detective: Whitelist libssl SSL_COMP_get_compression_methods() This function is called by libcurl initialization with SSL, and uses a static allocation of compression algorithms not freed. --- diff --git a/src/libstrongswan/utils/leak_detective.c b/src/libstrongswan/utils/leak_detective.c index a2bca193d3..bc8432aea3 100644 --- a/src/libstrongswan/utils/leak_detective.c +++ b/src/libstrongswan/utils/leak_detective.c @@ -561,6 +561,8 @@ char *whitelist[] = { "ECDSA_do_sign_ex", "ECDSA_verify", "RSA_new_method", + /* OpenSSL libssl */ + "SSL_COMP_get_compression_methods", /* NSPR */ "PR_CallOnce", /* libapr */