[WGID-83003,99244] Fixed memory leak 43/87343/1 accepted/tizen/common/20160912.180826 accepted/tizen/ivi/20160912.053946 accepted/tizen/mobile/20160912.053856 accepted/tizen/tv/20160912.053911 accepted/tizen/wearable/20160912.053929 submit/tizen/20160912.021246
authorSeonah Moon <seonah1.moon@samsung.com>
Wed, 7 Sep 2016 10:51:21 +0000 (19:51 +0900)
committerSeonah Moon <seonah1.moon@samsung.com>
Wed, 7 Sep 2016 11:24:41 +0000 (20:24 +0900)
Change-Id: Ia47d5a431d6a8f122c5199c5b45e931fc2c0b1bc
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
packaging/mobileap-agent.spec
src/mobileap_notification.c
src/mobileap_wifi.c

index de181bd..06c06eb 100644 (file)
@@ -1,6 +1,6 @@
 Name:          mobileap-agent
 Summary:       Mobile AP daemon for setting tethering environments
-Version:       1.0.72
+Version:       1.0.73
 Release:       1
 Group:         System/Network
 License:       Apache-2.0
index e546437..8d9c651 100644 (file)
@@ -454,6 +454,7 @@ int _update_connected_noti(mobile_ap_type_e type, int count)
        ret = notification_free(noti);
        if (ret != NOTIFICATION_ERROR_NONE) {
                ERR("Fail to notification_free [%d]\n", ret);
+               free(icon_path);
                return MOBILE_AP_ERROR_INTERNAL;
        }
 
index f791c12..4d441c6 100755 (executable)
@@ -1266,7 +1266,7 @@ static mobile_ap_error_code_e __get_passphrase(char *passphrase,
        char *alias = NULL;
        char *passwd = NULL;
        char tmp[MOBILE_AP_WIFI_KEY_MAX_LEN + 1] = {0, };
-       ckmc_raw_buffer_s *ckmc_buf;
+       ckmc_raw_buffer_s *ckmc_buf = NULL;
 
        alias = __get_key_manager_alias(MOBILE_AP_WIFI_PASSPHRASE_STORE_KEY);
        ret = ckmc_get_data(alias, passwd, &ckmc_buf);