wireshark/epan/crypt
Peter Wu a7ab4af2ab airpdcap: add free_key_string function, fix memleaks
Do not leak the key and SSID. Note that there are still some leaks in
the GTK UI related to get_wireshark_keys(), but I did not track them
down.

Caught by LeakSanitizer.

Change-Id: I639166e6ea457605d6ae0ebd58e56d7594a7b7db
Reviewed-on: https://code.wireshark.org/review/10860
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Michael Mann <mmann78@netscape.net>
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
2015-10-09 14:35:41 +00:00
..
Custom.common From Jacob Nordgren and Rishie Sharma: 2012-08-09 16:42:31 +00:00
Makefile.am Support out-of-source checkapi 2014-04-25 04:23:46 +00:00
Makefile.common Continue to remove $Id$ from top of file 2014-03-31 18:48:06 +00:00
Makefile.nmake Add '*.nativecodeanalysis.xml' to 'clean' targets 2015-01-02 01:45:16 +00:00
airpdcap.c airpdcap: add free_key_string function, fix memleaks 2015-10-09 14:35:41 +00:00
airpdcap_ccmp.c Remove all $Id$ from top of file 2014-03-04 14:27:33 +00:00
airpdcap_debug.c Remove all $Id$ from top of file 2014-03-04 14:27:33 +00:00
airpdcap_debug.h Fix airpdcap debugging code. 2015-01-09 22:17:16 +00:00
airpdcap_int.h Remove all $Id$ from top of file 2014-03-04 14:27:33 +00:00
airpdcap_interop.h Remove all $Id$ from top of file 2014-03-04 14:27:33 +00:00
airpdcap_rijndael.c Allocate the unwrapped key in AES_unwrap(). 2015-05-10 02:18:24 +00:00
airpdcap_rijndael.h Allocate the unwrapped key in AES_unwrap(). 2015-05-10 02:18:24 +00:00
airpdcap_system.h IEEE 802.11: 802.1X (WPA-EAP) rekeying support 2015-05-08 04:27:49 +00:00
airpdcap_tkip.c Continue to remove $Id$ from top of file 2014-03-31 18:49:26 +00:00
airpdcap_user.h airpdcap: add free_key_string function, fix memleaks 2015-10-09 14:35:41 +00:00
airpdcap_ws.h Remove all $Id$ from top of file 2014-03-04 14:27:33 +00:00
kasumi.h Remove all $Id$ from top of file 2014-03-04 14:27:33 +00:00
wep-wpadefs.h Remove all $Id$ from top of file 2014-03-04 14:27:33 +00:00