diff options
author | Aris Adamantiadis <aris@0xbadc0de.be> | 2011-05-26 21:33:36 +0200 |
---|---|---|
committer | Aris Adamantiadis <aris@0xbadc0de.be> | 2011-05-26 21:33:36 +0200 |
commit | 34b05fd2dc7ead24386b24e9471fad729cb4189b (patch) | |
tree | b95eafd4e8189440b113a4cc046f9f513b3ba032 | |
parent | c483418b8210bc47a765f6b0e0dc99aec63e80fd (diff) | |
download | libssh-34b05fd2dc7ead24386b24e9471fad729cb4189b.tar.gz libssh-34b05fd2dc7ead24386b24e9471fad729cb4189b.tar.xz libssh-34b05fd2dc7ead24386b24e9471fad729cb4189b.zip |
Fix memory leaks in pki and testcase
-rw-r--r-- | src/keyfiles.c | 2 | ||||
-rw-r--r-- | tests/unittests/torture_pki.c | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/src/keyfiles.c b/src/keyfiles.c index 4e04668..6d8ced6 100644 --- a/src/keyfiles.c +++ b/src/keyfiles.c @@ -1039,7 +1039,6 @@ ssh_private_key privatekey_from_base64(ssh_session session, const char *b64_pkey dsa = PEM_read_bio_DSAPrivateKey(mem, NULL, NULL, (void *) passphrase); } - (void)BIO_set_close(mem, BIO_NOCLOSE); BIO_free(mem); if (dsa == NULL) { @@ -1083,7 +1082,6 @@ ssh_private_key privatekey_from_base64(ssh_session session, const char *b64_pkey rsa = PEM_read_bio_RSAPrivateKey(mem, NULL, NULL, (void *) passphrase); } - (void)BIO_set_close(mem, BIO_NOCLOSE); BIO_free(mem); if (rsa == NULL) { diff --git a/tests/unittests/torture_pki.c b/tests/unittests/torture_pki.c index f0dbd20..760c1ce 100644 --- a/tests/unittests/torture_pki.c +++ b/tests/unittests/torture_pki.c @@ -276,6 +276,7 @@ static void torture_pki_pki_publickey_from_privatekey_RSA(void **state) { free(key_str); ssh_key_free(key); + ssh_key_free(pubkey); } static void torture_pki_pki_publickey_from_privatekey_DSA(void **state) { @@ -300,6 +301,7 @@ static void torture_pki_pki_publickey_from_privatekey_DSA(void **state) { free(key_str); ssh_key_free(key); + ssh_key_free(pubkey); } int torture_run_tests(void) { |