summaryrefslogtreecommitdiff
path: root/leakcheck
diff options
context:
space:
mode:
authorJean-Paul Calderone <exarkun@boson>2008-02-19 22:29:57 -0500
committerJean-Paul Calderone <exarkun@boson>2008-02-19 22:29:57 -0500
commit19555b97df992945d70a2dd24934481ace288661 (patch)
treec4f03c09e2a1dec4e9e50ac30424a5a7ba4e8fb3 /leakcheck
parent420bf2163368426a133f663cfe772b32e52fb8f4 (diff)
downloadpyopenssl-19555b97df992945d70a2dd24934481ace288661.tar.gz
Get rid of X509_get_pubkey leak
Diffstat (limited to 'leakcheck')
-rw-r--r--leakcheck/crypto.py59
1 files changed, 59 insertions, 0 deletions
diff --git a/leakcheck/crypto.py b/leakcheck/crypto.py
new file mode 100644
index 0000000..eb00182
--- /dev/null
+++ b/leakcheck/crypto.py
@@ -0,0 +1,59 @@
+import sys
+
+from OpenSSL.crypto import TYPE_DSA, Error, PKey, X509
+
+class Checker_X509_get_pubkey(object):
+ """
+ Leak checks for L{X509.get_pubkey}.
+ """
+ def __init__(self, iterations):
+ self.iterations = iterations
+
+
+ def check_exception(self):
+ """
+ Call the method repeatedly such that it will raise an exception.
+ """
+ for i in xrange(self.iterations):
+ cert = X509()
+ try:
+ cert.get_pubkey()
+ except Error:
+ pass
+
+
+ def check_success(self):
+ """
+ Call the method repeatedly such that it will return a PKey object.
+ """
+ small = xrange(3)
+ for i in xrange(self.iterations):
+ key = PKey()
+ key.generate_key(TYPE_DSA, 256)
+ for i in small:
+ cert = X509()
+ cert.set_pubkey(key)
+ for i in small:
+ cert.get_pubkey()
+
+
+def vmsize():
+ return [x for x in file('/proc/self/status').readlines() if 'VmSize' in x]
+
+
+def main(iterations='1000'):
+ iterations = int(iterations)
+ for klass in globals():
+ if klass.startswith('Checker_'):
+ klass = globals()[klass]
+ print klass
+ checker = klass(iterations)
+ for meth in dir(checker):
+ if meth.startswith('check_'):
+ print '\t', meth, vmsize(), '...',
+ getattr(checker, meth)()
+ print vmsize()
+
+
+if __name__ == '__main__':
+ main(*sys.argv[1:])