summaryrefslogtreecommitdiff
path: root/src/lib/exchange_api_handle.c
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2019-09-15 12:10:44 +0200
committerChristian Grothoff <christian@grothoff.org>2019-09-15 12:10:44 +0200
commita3d272eb9d1fdb130e98fc9d67198106a2aef53d (patch)
tree98e96eef3e76e72e4eff4ba70d287fef8b9e1688 /src/lib/exchange_api_handle.c
parent3a8581bc5e2a6b9434aea17b5f4c144d8972a36c (diff)
downloadexchange-a3d272eb9d1fdb130e98fc9d67198106a2aef53d.tar.gz
exchange-a3d272eb9d1fdb130e98fc9d67198106a2aef53d.tar.bz2
exchange-a3d272eb9d1fdb130e98fc9d67198106a2aef53d.zip
fix leak
Diffstat (limited to 'src/lib/exchange_api_handle.c')
-rw-r--r--src/lib/exchange_api_handle.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/lib/exchange_api_handle.c b/src/lib/exchange_api_handle.c
index bbe5f45a..80a07318 100644
--- a/src/lib/exchange_api_handle.c
+++ b/src/lib/exchange_api_handle.c
@@ -961,6 +961,7 @@ decode_keys_json (const json_t *resp_obj,
/* Okay, but why breaking here? It could be that the
* user redownloaded all the keys in a forced way. */
GNUNET_break_op (0 == current);
+ GNUNET_CRYPTO_rsa_public_key_free (dk.key.rsa_public_key);
continue;
}
if (key_data->denom_keys_size == key_data->num_denom_keys)