From a641b6ea790d99c172ce111970c6323a3009254e Mon Sep 17 00:00:00 2001 From: Andreas Schneider Date: Sat, 1 Sep 2018 10:16:32 +0200 Subject: [PATCH] tests: Fix memory leaks in torture_hashes Signed-off-by: Andreas Schneider (cherry picked from commit 1c0ac0b12eac6bf82f0d471cec584ebfbf6a7bdd) --- tests/unittests/torture_hashes.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/tests/unittests/torture_hashes.c b/tests/unittests/torture_hashes.c index ed84342b..2e242563 100644 --- a/tests/unittests/torture_hashes.c +++ b/tests/unittests/torture_hashes.c @@ -57,6 +57,7 @@ static void torture_md5_hash(void **state) assert_true(rc == 0); hexa = ssh_get_hexa(hash, hlen); + ssh_string_free_char((char *)hash); assert_string_equal(hexa, "50:15:a0:9b:92:bf:33:1c:01:c5:8c:fe:18:fa:ce:78"); @@ -75,6 +76,7 @@ static void torture_sha1_hash(void **state) assert_true(rc == 0); sha1 = ssh_get_b64_unpadded(hash, hlen); + ssh_string_free_char((char *)hash); assert_string_equal(sha1, "6wP+houujQmxLBiFugTcoeoODCM"); ssh_string_free_char(sha1); @@ -92,6 +94,7 @@ static void torture_sha256_hash(void **state) assert_true(rc == 0); sha256 = ssh_get_b64_unpadded(hash, hlen); + ssh_string_free_char((char *)hash); assert_string_equal(sha256, "jXstVLLe84fSDo1kEYGn6iumnPCSorhaiWxnJz8VTII"); ssh_string_free_char(sha256);