diff options
author | Andreas Schneider <asn@cryptomilk.org> | 2018-08-08 07:23:55 +0200 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2018-08-08 15:04:59 +0200 |
commit | 460026459b049f99d25b2940b0bb19fe1c61feb1 (patch) | |
tree | bc430882059595b801f0054133d6bd4c1955fae9 | |
parent | 6c87316a9c7e1b85ee23c0696d75c5669e656bc5 (diff) | |
download | libssh-460026459b049f99d25b2940b0bb19fe1c61feb1.tar.gz libssh-460026459b049f99d25b2940b0bb19fe1c61feb1.tar.xz libssh-460026459b049f99d25b2940b0bb19fe1c61feb1.zip |
tests: Do not leak memory when freeing ed25519 keys
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r-- | tests/unittests/torture_pki_ed25519.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/tests/unittests/torture_pki_ed25519.c b/tests/unittests/torture_pki_ed25519.c index 3ba6f6e2..4401af9a 100644 --- a/tests/unittests/torture_pki_ed25519.c +++ b/tests/unittests/torture_pki_ed25519.c @@ -478,8 +478,8 @@ static void torture_pki_ed25519_privkey_dup(void **state) dup = ssh_key_dup(key); assert_non_null(dup); - SAFE_FREE(key); - SAFE_FREE(dup); + ssh_key_free(key); + ssh_key_free(dup); } static void torture_pki_ed25519_pubkey_dup(void **state) @@ -515,8 +515,8 @@ static void torture_pki_ed25519_pubkey_dup(void **state) assert_true(rc == 1); SAFE_FREE(pub_str); - SAFE_FREE(pubkey); - SAFE_FREE(dup); + ssh_key_free(pubkey); + ssh_key_free(dup); } int torture_run_tests(void) { |