Loading crypto/bn/bntest.c +1 −2 Original line number Diff line number Diff line Loading @@ -1042,7 +1042,6 @@ int test_mod_exp_mont_consttime(BIO *bp, BN_CTX *ctx) int test_mod_exp_mont5(BIO *bp, BN_CTX *ctx) { BIGNUM *a, *p, *m, *d, *e; BN_MONT_CTX *mont; a = BN_new(); Loading @@ -1050,7 +1049,6 @@ int test_mod_exp_mont5(BIO *bp, BN_CTX *ctx) m = BN_new(); d = BN_new(); e = BN_new(); mont = BN_MONT_CTX_new(); BN_bntest_rand(m, 1024, 0, 1); /* must be odd for montgomery */ Loading Loading @@ -1099,6 +1097,7 @@ int test_mod_exp_mont5(BIO *bp, BN_CTX *ctx) fprintf(stderr, "Modular exponentiation test failed!\n"); return 0; } BN_MONT_CTX_free(mont); BN_free(a); BN_free(p); BN_free(m); Loading crypto/hmac/hmactest.c +3 −0 Original line number Diff line number Diff line Loading @@ -195,6 +195,7 @@ int main(int argc, char *argv[]) } printf("test 4 ok\n"); test5: HMAC_CTX_cleanup(&ctx); HMAC_CTX_init(&ctx); if (HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, NULL, NULL)) { printf("Should fail to initialise HMAC with empty MD (test 5)\n"); Loading Loading @@ -284,6 +285,7 @@ test5: printf("test 5 ok\n"); } test6: HMAC_CTX_cleanup(&ctx); HMAC_CTX_init(&ctx); if (!HMAC_Init_ex(&ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) { printf("Failed to initialise HMAC (test 6)\n"); Loading Loading @@ -314,6 +316,7 @@ test6: printf("test 6 ok\n"); } end: HMAC_CTX_cleanup(&ctx); EXIT(err); return (0); } Loading crypto/srp/srptest.c +1 −0 Original line number Diff line number Diff line Loading @@ -148,6 +148,7 @@ int main(int argc, char **argv) ERR_remove_thread_state(NULL); ERR_free_strings(); CRYPTO_mem_leaks(bio_err); BIO_free(bio_err); return 0; } Loading Loading
crypto/bn/bntest.c +1 −2 Original line number Diff line number Diff line Loading @@ -1042,7 +1042,6 @@ int test_mod_exp_mont_consttime(BIO *bp, BN_CTX *ctx) int test_mod_exp_mont5(BIO *bp, BN_CTX *ctx) { BIGNUM *a, *p, *m, *d, *e; BN_MONT_CTX *mont; a = BN_new(); Loading @@ -1050,7 +1049,6 @@ int test_mod_exp_mont5(BIO *bp, BN_CTX *ctx) m = BN_new(); d = BN_new(); e = BN_new(); mont = BN_MONT_CTX_new(); BN_bntest_rand(m, 1024, 0, 1); /* must be odd for montgomery */ Loading Loading @@ -1099,6 +1097,7 @@ int test_mod_exp_mont5(BIO *bp, BN_CTX *ctx) fprintf(stderr, "Modular exponentiation test failed!\n"); return 0; } BN_MONT_CTX_free(mont); BN_free(a); BN_free(p); BN_free(m); Loading
crypto/hmac/hmactest.c +3 −0 Original line number Diff line number Diff line Loading @@ -195,6 +195,7 @@ int main(int argc, char *argv[]) } printf("test 4 ok\n"); test5: HMAC_CTX_cleanup(&ctx); HMAC_CTX_init(&ctx); if (HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, NULL, NULL)) { printf("Should fail to initialise HMAC with empty MD (test 5)\n"); Loading Loading @@ -284,6 +285,7 @@ test5: printf("test 5 ok\n"); } test6: HMAC_CTX_cleanup(&ctx); HMAC_CTX_init(&ctx); if (!HMAC_Init_ex(&ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) { printf("Failed to initialise HMAC (test 6)\n"); Loading Loading @@ -314,6 +316,7 @@ test6: printf("test 6 ok\n"); } end: HMAC_CTX_cleanup(&ctx); EXIT(err); return (0); } Loading
crypto/srp/srptest.c +1 −0 Original line number Diff line number Diff line Loading @@ -148,6 +148,7 @@ int main(int argc, char **argv) ERR_remove_thread_state(NULL); ERR_free_strings(); CRYPTO_mem_leaks(bio_err); BIO_free(bio_err); return 0; } Loading