-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 According to https://www.openssl.org/docs/crypto/pem.html free the memory before, otherwise cppcheck blames it b/c of :
[crypt_prog.cpp:366]: (error) Memory leak: rsa_key_ [crypt_prog.cpp:380]: (error) Memory leak: rsa_key_ - -- MfG/Sincerely Toralf Förster pgp finger print:1A37 6F99 4A9D 026F 13E2 4DCF C4EA CDDE 0076 E94E -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iF4EAREIAAYFAlLaSkEACgkQxOrN3gB26U5ongD/fxxXWnlMalICBpavgjJQS8LG gcnVfFXr4w3chA8ji/cA/iMIX/D6LVxiU+guD/k7NxDR/9VROwuo5V7i75K1JCa4 =jwCA -----END PGP SIGNATURE-----
diff --git a/lib/crypt_prog.cpp b/lib/crypt_prog.cpp
index 3d45361..14a978a 100644
--- a/lib/crypt_prog.cpp
+++ b/lib/crypt_prog.cpp
@@ -363,6 +363,7 @@ int main(int argc, char** argv) {
}
if (kpriv) {
fpriv = fopen (argv[4], "r");
+ X509_free(rsa_key_);
rsa_key_ = PEM_read_RSAPrivateKey(fpriv, NULL, NULL, NULL);
fclose(fpriv);
if (rsa_key_ == NULL) {
@@ -377,6 +378,7 @@ int main(int argc, char** argv) {
print_key_hex(fpriv, (KEY*)&private_key, sizeof(private_key));
} else {
fpub = fopen (argv[4], "r");
+ X509_free(rsa_key_);
rsa_key_ = PEM_read_RSA_PUBKEY(fpub, NULL, NULL, NULL);
fclose(fpub);
if (rsa_key_ == NULL) {
free_rsa_key_before.patch.sig
Description: PGP signature
_______________________________________________ boinc_dev mailing list [email protected] http://lists.ssl.berkeley.edu/mailman/listinfo/boinc_dev To unsubscribe, visit the above URL and (near bottom of page) enter your email address.
