diff options
author | Andreas Schneider <asn@cryptomilk.org> | 2015-04-02 15:04:34 +0200 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2015-04-02 15:05:19 +0200 |
commit | d6fe9dc22023a389123e242ec4942f38bbfadfba (patch) | |
tree | 47c809e519ee354bcdc81f2ae8d6b25000ea447c | |
parent | e0a73d3dbe909f8e2cb486ed344e5beb8148032e (diff) | |
download | libssh-d6fe9dc22023a389123e242ec4942f38bbfadfba.tar.gz libssh-d6fe9dc22023a389123e242ec4942f38bbfadfba.tar.xz libssh-d6fe9dc22023a389123e242ec4942f38bbfadfba.zip |
unittests: Fix memory leak in torture_pki_ed25519
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r-- | tests/unittests/torture_pki_ed25519.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/tests/unittests/torture_pki_ed25519.c b/tests/unittests/torture_pki_ed25519.c index e3d44851..fd04821d 100644 --- a/tests/unittests/torture_pki_ed25519.c +++ b/tests/unittests/torture_pki_ed25519.c @@ -69,6 +69,7 @@ static void torture_pki_ed25519_verify(void **state){ ssh_key_free(pubkey); ssh_string_free(blob); + free(pkey_ptr); } static void torture_pki_ed25519_verify_bad(void **state){ @@ -104,6 +105,7 @@ static void torture_pki_ed25519_verify_bad(void **state){ } ssh_key_free(pubkey); ssh_string_free(blob); + free(pkey_ptr); } int torture_run_tests(void) { |