aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cryptomilk.org>2015-04-02 15:04:34 +0200
committerAndreas Schneider <asn@cryptomilk.org>2015-04-02 15:05:19 +0200
commitd6fe9dc22023a389123e242ec4942f38bbfadfba (patch)
tree47c809e519ee354bcdc81f2ae8d6b25000ea447c
parente0a73d3dbe909f8e2cb486ed344e5beb8148032e (diff)
downloadlibssh-d6fe9dc22023a389123e242ec4942f38bbfadfba.tar.gz
libssh-d6fe9dc22023a389123e242ec4942f38bbfadfba.tar.xz
libssh-d6fe9dc22023a389123e242ec4942f38bbfadfba.zip
unittests: Fix memory leak in torture_pki_ed25519
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r--tests/unittests/torture_pki_ed25519.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/tests/unittests/torture_pki_ed25519.c b/tests/unittests/torture_pki_ed25519.c
index e3d44851..fd04821d 100644
--- a/tests/unittests/torture_pki_ed25519.c
+++ b/tests/unittests/torture_pki_ed25519.c
@@ -69,6 +69,7 @@ static void torture_pki_ed25519_verify(void **state){
ssh_key_free(pubkey);
ssh_string_free(blob);
+ free(pkey_ptr);
}
static void torture_pki_ed25519_verify_bad(void **state){
@@ -104,6 +105,7 @@ static void torture_pki_ed25519_verify_bad(void **state){
}
ssh_key_free(pubkey);
ssh_string_free(blob);
+ free(pkey_ptr);
}
int torture_run_tests(void) {