openssl: Whitelist OPENSSL_init_crypto() and others in leak detective
authorTobias Brunner <tobias@strongswan.org>
Mon, 27 Jun 2016 15:44:57 +0000 (17:44 +0200)
committerTobias Brunner <tobias@strongswan.org>
Wed, 29 Jun 2016 09:09:38 +0000 (11:09 +0200)
commitc1410cb045169c47c59459673219f2e7d878c22c
treeaeaf501a12178f4bbb4123bd5c81a43b61cdcb0d
parentfedec33f5a1a3a7a02ddfebc650fb44190faf1bc
openssl: Whitelist OPENSSL_init_crypto() and others in leak detective

Lots of static data is allocated in this function, which isn't freed until
the library is unloaded (we can't call OPENSSL_cleanup() as initialization
would fail when calling it again later).  When enabling the leak
detective the test runner eventually crashes as all the data allocated during
initialization has an invalid size when freed after leak detective has been
unloaded.
src/libstrongswan/utils/leak_detective.c