diff options
-rwxr-xr-x | src/identity-provider/test_idp.sh | 18 | ||||
-rw-r--r-- | src/util/crypto_abe.c | 7 |
2 files changed, 9 insertions, 16 deletions
diff --git a/src/identity-provider/test_idp.sh b/src/identity-provider/test_idp.sh index 9947dfe30..2eeb27ce9 100755 --- a/src/identity-provider/test_idp.sh +++ b/src/identity-provider/test_idp.sh | |||
@@ -25,17 +25,7 @@ which timeout &> /dev/null && DO_TIMEOUT="timeout 30" | |||
25 | TEST_ATTR="test" | 25 | TEST_ATTR="test" |
26 | gnunet-arm -s -c test_idp.conf | 26 | gnunet-arm -s -c test_idp.conf |
27 | gnunet-identity -C testego -c test_idp.conf | 27 | gnunet-identity -C testego -c test_idp.conf |
28 | $DO_TIMEOUT valgrind gnunet-idp -e testego --init -c test_idp.conf | 28 | gnunet-idp -e testego --init -c test_idp.conf |
29 | $DO_TIMEOUT valgrind gnunet-idp -e testego -a email -V john@doe.gnu -c test_idp.conf | 29 | gnunet-idp -e testego -a email -V john@doe.gnu -c test_idp.conf |
30 | STATUS=$? | 30 | gnunet-idp -e testego -D -c test_idp.conf |
31 | gnunet-namestore -z testego -D -c test_idp.conf | 31 | gnunet-arm -e -c test_idp.conf |
32 | $DO_TIMEOUT valgrind --leak-check=full gnunet-idp -e testego -D -c test_idp.conf | ||
33 | |||
34 | if test $? != 0 | ||
35 | then | ||
36 | echo "Error issuing..." | ||
37 | exit 1 | ||
38 | fi | ||
39 | #Try import | ||
40 | gnunet-arm -e -c test_idp_lookup.conf | ||
41 | exit $RES | ||
diff --git a/src/util/crypto_abe.c b/src/util/crypto_abe.c index 798a74f87..f84aaf9f9 100644 --- a/src/util/crypto_abe.c +++ b/src/util/crypto_abe.c | |||
@@ -145,7 +145,6 @@ GNUNET_CRYPTO_cpabe_create_master_key (void) | |||
145 | key->msk = bswabe_msk_serialize(msk); | 145 | key->msk = bswabe_msk_serialize(msk); |
146 | GNUNET_assert (NULL != key->pub); | 146 | GNUNET_assert (NULL != key->pub); |
147 | GNUNET_assert (NULL != key->msk); | 147 | GNUNET_assert (NULL != key->msk); |
148 | bswabe_pub_free (pub); | ||
149 | bswabe_msk_free (msk); | 148 | bswabe_msk_free (msk); |
150 | return key; | 149 | return key; |
151 | } | 150 | } |
@@ -174,6 +173,8 @@ GNUNET_CRYPTO_cpabe_create_key (struct GNUNET_CRYPTO_AbeMasterKey *key, | |||
174 | prv_key->prv = bswabe_prv_serialize(prv); | 173 | prv_key->prv = bswabe_prv_serialize(prv); |
175 | prv_key->pub = bswabe_pub_serialize (pub); | 174 | prv_key->pub = bswabe_pub_serialize (pub); |
176 | GNUNET_assert (NULL != prv_key->prv); | 175 | GNUNET_assert (NULL != prv_key->prv); |
176 | //Memory management in bswabe is buggy | ||
177 | //bswabe_prv_free (prv); | ||
177 | bswabe_msk_free (msk); | 178 | bswabe_msk_free (msk); |
178 | return prv_key; | 179 | return prv_key; |
179 | } | 180 | } |
@@ -296,6 +297,7 @@ GNUNET_CRYPTO_cpabe_decrypt (const void *block, | |||
296 | if( !bswabe_dec(pub, prv, cph, m) ) { | 297 | if( !bswabe_dec(pub, prv, cph, m) ) { |
297 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, | 298 | GNUNET_log (GNUNET_ERROR_TYPE_ERROR, |
298 | "%s\n", bswabe_error()); | 299 | "%s\n", bswabe_error()); |
300 | bswabe_cph_free(cph); | ||
299 | return GNUNET_SYSERR; | 301 | return GNUNET_SYSERR; |
300 | } | 302 | } |
301 | bswabe_cph_free(cph); | 303 | bswabe_cph_free(cph); |
@@ -304,7 +306,8 @@ GNUNET_CRYPTO_cpabe_decrypt (const void *block, | |||
304 | g_byte_array_free(aes_buf, 1); | 306 | g_byte_array_free(aes_buf, 1); |
305 | *result = GNUNET_malloc (plt->len); | 307 | *result = GNUNET_malloc (plt->len); |
306 | GNUNET_memcpy (*result, plt->data, plt->len); | 308 | GNUNET_memcpy (*result, plt->data, plt->len); |
307 | bswabe_prv_free (prv); | 309 | //freeing is buggy in bswabe |
310 | //bswabe_prv_free (prv); | ||
308 | bswabe_pub_free (pub); | 311 | bswabe_pub_free (pub); |
309 | return pt_size; | 312 | return pt_size; |
310 | } | 313 | } |