aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2019-09-15 12:10:44 +0200
committerChristian Grothoff <christian@grothoff.org>2019-09-15 12:10:44 +0200
commita3d272eb9d1fdb130e98fc9d67198106a2aef53d (patch)
tree98e96eef3e76e72e4eff4ba70d287fef8b9e1688
parent3a8581bc5e2a6b9434aea17b5f4c144d8972a36c (diff)
downloadexchange-a3d272eb9d1fdb130e98fc9d67198106a2aef53d.tar.gz
exchange-a3d272eb9d1fdb130e98fc9d67198106a2aef53d.zip
fix leak
-rw-r--r--src/lib/exchange_api_handle.c1
-rw-r--r--src/lib/testing_api_cmd_serialize_keys.c4
2 files changed, 3 insertions, 2 deletions
diff --git a/src/lib/exchange_api_handle.c b/src/lib/exchange_api_handle.c
index bbe5f45a0..80a07318b 100644
--- a/src/lib/exchange_api_handle.c
+++ b/src/lib/exchange_api_handle.c
@@ -961,6 +961,7 @@ decode_keys_json (const json_t *resp_obj,
961 /* Okay, but why breaking here? It could be that the 961 /* Okay, but why breaking here? It could be that the
962 * user redownloaded all the keys in a forced way. */ 962 * user redownloaded all the keys in a forced way. */
963 GNUNET_break_op (0 == current); 963 GNUNET_break_op (0 == current);
964 GNUNET_CRYPTO_rsa_public_key_free (dk.key.rsa_public_key);
964 continue; 965 continue;
965 } 966 }
966 if (key_data->denom_keys_size == key_data->num_denom_keys) 967 if (key_data->denom_keys_size == key_data->num_denom_keys)
diff --git a/src/lib/testing_api_cmd_serialize_keys.c b/src/lib/testing_api_cmd_serialize_keys.c
index 7ef03fe5d..98e7cc9d6 100644
--- a/src/lib/testing_api_cmd_serialize_keys.c
+++ b/src/lib/testing_api_cmd_serialize_keys.c
@@ -44,7 +44,7 @@ struct SerializeKeysState
44 * from, after keys serialization. This value is then needed by 44 * from, after keys serialization. This value is then needed by
45 * subsequent commands that have to reconnect to the exchagne. 45 * subsequent commands that have to reconnect to the exchagne.
46 */ 46 */
47 const char *exchange_url; 47 char *exchange_url;
48}; 48};
49 49
50 50
@@ -120,7 +120,7 @@ serialize_keys_cleanup (void *cls,
120 { 120 {
121 json_decref (sks->keys); 121 json_decref (sks->keys);
122 } 122 }
123 GNUNET_free ((char *) sks->exchange_url); 123 GNUNET_free (sks->exchange_url);
124 GNUNET_free (sks); 124 GNUNET_free (sks);
125} 125}
126 126