diff options
author | Niels Möller <nisse@lysator.liu.se> | 2012-09-16 07:57:04 +0200 |
---|---|---|
committer | Niels Möller <nisse@lysator.liu.se> | 2012-09-16 07:57:04 +0200 |
commit | 5a77574eb4117e58cc564d97ff2760840f41f7ff (patch) | |
tree | 442e9bcbadb32ac4942a2278c4346ca8507b1388 /tools | |
parent | b59383d971fac7105c91597d7897ef65c81ec42c (diff) | |
download | nettle-5a77574eb4117e58cc564d97ff2760840f41f7ff.tar.gz |
Fixed memory leak in pkcs1-conv.
Diffstat (limited to 'tools')
-rw-r--r-- | tools/pkcs1-conv.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/tools/pkcs1-conv.c b/tools/pkcs1-conv.c index 40420c44..231b2acd 100644 --- a/tools/pkcs1-conv.c +++ b/tools/pkcs1-conv.c @@ -415,6 +415,7 @@ convert_public_key(struct nettle_buffer *buffer, unsigned length, const uint8_t nettle_buffer_reset(buffer); res = dsa_keypair_to_sexp(buffer, NULL, &pub, NULL) > 0; } + dsa_public_key_clear(&pub); } if (!res) werror("SubjectPublicKeyInfo: Invalid DSA key.\n"); @@ -438,6 +439,7 @@ convert_public_key(struct nettle_buffer *buffer, unsigned length, const uint8_t nettle_buffer_reset(buffer); res = rsa_keypair_to_sexp(buffer, NULL, &pub, NULL) > 0; } + rsa_public_key_clear(&pub); } if (!res) werror("SubjectPublicKeyInfo: Invalid RSA key.\n"); @@ -448,7 +450,7 @@ convert_public_key(struct nettle_buffer *buffer, unsigned length, const uint8_t } else werror("SubjectPublicKeyInfo: Invalid object.\n"); - + return res; } @@ -656,5 +658,7 @@ main(int argc, char **argv) fclose(f); } } + nettle_buffer_clear (&buffer); + return EXIT_SUCCESS; } |