From aa8822bbf18bce2763182cf7e9fc68b6a35d8671 Mon Sep 17 00:00:00 2001 From: Shreyas Sheth Date: Wed, 13 Dec 2023 15:54:50 +0530 Subject: [PATCH] fix(wpa_supplicant): Resolve memory leak for unit test of fast pbkdf2 --- components/wpa_supplicant/test/test_fast_pbkdf2.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/components/wpa_supplicant/test/test_fast_pbkdf2.c b/components/wpa_supplicant/test/test_fast_pbkdf2.c index ec08525d36..34c8dfcb7c 100644 --- a/components/wpa_supplicant/test/test_fast_pbkdf2.c +++ b/components/wpa_supplicant/test/test_fast_pbkdf2.c @@ -47,6 +47,8 @@ TEST_CASE("Test pbkdf2", "[crypto-pbkdf2]") TEST_ASSERT(memcmp(PMK, expected_pmk, PMK_LEN) == 0); ESP_LOG_BUFFER_HEXDUMP("PMK", PMK, PMK_LEN, ESP_LOG_INFO); ESP_LOG_BUFFER_HEXDUMP("expected_pmk", expected_pmk, PMK_LEN, ESP_LOG_INFO); + mbedtls_md_free(&sha1_ctx); + /* Calculate PMK using random ssid and passphrase and compare */ os_memset(ssid, 0, MAX_SSID_LEN); os_memset(passphrase, 0, MAX_PASSPHRASE_LEN); @@ -71,4 +73,5 @@ TEST_CASE("Test pbkdf2", "[crypto-pbkdf2]") ESP_LOG_BUFFER_HEXDUMP("PMK", PMK, PMK_LEN, ESP_LOG_INFO); ESP_LOG_BUFFER_HEXDUMP("expected_pmk", expected_pmk1, PMK_LEN, ESP_LOG_INFO); TEST_ASSERT(memcmp(PMK, expected_pmk1, PMK_LEN) == 0); + mbedtls_md_free(&sha1_ctx_1); }