There are many functions that allocate memory. Each of these functions must document the corresponding destruction function. This ensures that all memory is properly freed and (if necessary) overwritten to protect confidential data.
The necessary infrastructure has been added in 5a7693f.