From 8142aafa8f81d261ba1b67c35a2cac066cff10fe Mon Sep 17 00:00:00 2001 From: tb Date: Wed, 29 Dec 2021 22:49:23 +0000 Subject: [PATCH] Plug memleak CID 345160 --- regress/lib/libssl/tlsext/tlsexttest.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/regress/lib/libssl/tlsext/tlsexttest.c b/regress/lib/libssl/tlsext/tlsexttest.c index 9bd438f24ba..91bf69c6a53 100644 --- a/regress/lib/libssl/tlsext/tlsexttest.c +++ b/regress/lib/libssl/tlsext/tlsexttest.c @@ -1,4 +1,4 @@ -/* $OpenBSD: tlsexttest.c,v 1.53 2021/11/02 14:39:09 jsing Exp $ */ +/* $OpenBSD: tlsexttest.c,v 1.54 2021/12/29 22:49:23 tb Exp $ */ /* * Copyright (c) 2017 Joel Sing * Copyright (c) 2017 Doug Hogan @@ -2069,7 +2069,7 @@ test_tlsext_sessionticket_client(void) /* Test disabling tickets. */ if ((SSL_set_options(ssl, SSL_OP_NO_TICKET) & SSL_OP_NO_TICKET) == 0) { FAIL("Cannot disable tickets in the TLS connection\n"); - return 0; + goto err; } if (tlsext_sessionticket_client_needs(ssl, SSL_TLSEXT_MSG_CH)) { FAIL("client should not need SessionTicket if it was disabled\n"); @@ -3670,7 +3670,7 @@ test_tlsext_is_valid_hostname(const struct tls_sni_test *tst) int failure = 0; int is_ip; CBS cbs; - + CBS_init(&cbs, tst->hostname, strlen(tst->hostname)); if (tlsext_sni_is_valid_hostname(&cbs, &is_ip) != tst->valid) { if (tst->valid) { -- 2.20.1