提交 ec04e866 编写于 作者: D Dr. Stephen Henson

Update leak test to check return values.

Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
上级 4e482ae6
......@@ -56,23 +56,13 @@
#include <string.h>
#include <openssl/bio.h>
#include <openssl/crypto.h>
#include <setjmp.h>
#ifndef OPENSSL_NO_CRYPTO_MDEBUG
static sigjmp_buf env;
static void handler(int sig)
{
siglongjmp(env, 1);
}
#endif
int main(int argc, char **argv)
{
#ifndef OPENSSL_NO_CRYPTO_MDEBUG
char *p;
char *lost;
int aborted = 0;
int noleak;
p = getenv("OPENSSL_DEBUG_MEMORY");
if (p != NULL && strcmp(p, "on") == 0)
......@@ -85,18 +75,16 @@ int main(int argc, char **argv)
return 1;
}
signal(SIGABRT, handler);
if (argv[1] && strcmp(argv[1], "freeit") == 0) {
OPENSSL_free(lost);
lost = NULL;
}
if (sigsetjmp(env, 0) == 0)
CRYPTO_mem_leaks_fp(stderr);
else
aborted = 1;
return ((lost != NULL) ^ (aborted == 1));
noleak = CRYPTO_mem_leaks_fp(stderr);
/* If -1 return value something bad happened */
if (noleak == -1)
return 1;
return ((lost != NULL) ^ (noleak == 0));
#else
return 0;
#endif
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册