From c621dd62c74284bfc307a351bec875eb6918bf0f Mon Sep 17 00:00:00 2001 From: Guus Sliepen Date: Sun, 15 Sep 2013 22:02:33 +0200 Subject: [PATCH] Don't leak memory during the key generation speed test. --- src/sptps_speed.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/src/sptps_speed.c b/src/sptps_speed.c index 99aaef83..69f75997 100644 --- a/src/sptps_speed.c +++ b/src/sptps_speed.c @@ -84,9 +84,12 @@ int main(int argc, char *argv[]) { fprintf(stderr, "Generating keys for 10 seconds: "); for(clock_start(); clock_countto(10);) - key1 = ecdsa_generate(); + ecdsa_free(ecdsa_generate()); fprintf(stderr, "%13.2lf op/s\n", rate); + key1 = ecdsa_generate(); + key2 = ecdsa_generate(); + // ECDSA signatures fprintf(stderr, "ECDSA sign for 10 seconds: "); @@ -110,8 +113,6 @@ int main(int argc, char *argv[]) { // SPTPS authentication phase - key2 = ecdsa_generate(); - int fd[2]; if(socketpair(AF_UNIX, SOCK_STREAM, 0, fd)) { fprintf(stderr, "Could not create a UNIX socket pair: %s\n", strerror(errno)); -- 2.20.1