aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cryptomilk.org>2018-08-08 07:23:55 +0200
committerAndreas Schneider <asn@cryptomilk.org>2018-08-08 15:04:59 +0200
commit460026459b049f99d25b2940b0bb19fe1c61feb1 (patch)
treebc430882059595b801f0054133d6bd4c1955fae9
parent6c87316a9c7e1b85ee23c0696d75c5669e656bc5 (diff)
downloadlibssh-460026459b049f99d25b2940b0bb19fe1c61feb1.tar.gz
libssh-460026459b049f99d25b2940b0bb19fe1c61feb1.tar.xz
libssh-460026459b049f99d25b2940b0bb19fe1c61feb1.zip
tests: Do not leak memory when freeing ed25519 keys
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r--tests/unittests/torture_pki_ed25519.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/tests/unittests/torture_pki_ed25519.c b/tests/unittests/torture_pki_ed25519.c
index 3ba6f6e2..4401af9a 100644
--- a/tests/unittests/torture_pki_ed25519.c
+++ b/tests/unittests/torture_pki_ed25519.c
@@ -478,8 +478,8 @@ static void torture_pki_ed25519_privkey_dup(void **state)
dup = ssh_key_dup(key);
assert_non_null(dup);
- SAFE_FREE(key);
- SAFE_FREE(dup);
+ ssh_key_free(key);
+ ssh_key_free(dup);
}
static void torture_pki_ed25519_pubkey_dup(void **state)
@@ -515,8 +515,8 @@ static void torture_pki_ed25519_pubkey_dup(void **state)
assert_true(rc == 1);
SAFE_FREE(pub_str);
- SAFE_FREE(pubkey);
- SAFE_FREE(dup);
+ ssh_key_free(pubkey);
+ ssh_key_free(dup);
}
int torture_run_tests(void) {