2019-01-29 08:50:20 +01:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
|
|
|
|
# Copyright (c) 2018, Arm Limited, All Rights Reserved.
|
|
|
|
# SPDX-License-Identifier: Apache-2.0
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
# not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
#
|
|
|
|
# This file is part of Mbed TLS (https://tls.mbed.org)
|
|
|
|
|
|
|
|
"""
|
2022-10-09 11:29:44 +02:00
|
|
|
Test Mbed TLS with a subset of algorithms.
|
2019-01-29 08:50:20 +01:00
|
|
|
|
2022-10-09 11:29:44 +02:00
|
|
|
This script can be divided into several steps:
|
|
|
|
|
|
|
|
First, include/mbedtls/mbedtls_config.h or a different config file passed
|
|
|
|
in the arguments is parsed to extract any configuration options (collect_config_symbols).
|
|
|
|
|
|
|
|
Then, test domains (groups of jobs, tests) are built based on predefined data
|
|
|
|
collected in the DomainData class. Here, each domain has five major traits:
|
|
|
|
- domain name, can be used to run only specific tests via commandline;
|
|
|
|
- configuration building method, described in detail below;
|
|
|
|
- list of symbols passed to the configuration building method;
|
|
|
|
- commands to be run on each job (only build, build and test, or any other custom);
|
|
|
|
- optional list of symbols to be excluded from testing.
|
|
|
|
|
|
|
|
The configuration building method can be one of the three following:
|
|
|
|
|
|
|
|
- ComplementaryDomain - build a job for each passed symbol by disabling a single
|
|
|
|
symbol and its reverse dependencies (defined in REVERSE_DEPENDENCIES);
|
|
|
|
|
|
|
|
- ExclusiveDomain - build a job where, for each passed symbol, only this particular
|
|
|
|
one is defined and other symbols from the list are unset. For each job look for
|
|
|
|
any non-standard symbols to set/unset in EXCLUSIVE_GROUPS. These are usually not
|
|
|
|
direct dependencies, but rather non-trivial results of other configs missing. Then
|
|
|
|
look for any unset symbols and handle their reverse dependencies.
|
|
|
|
Examples of EXCLUSIVE_GROUPS usage:
|
|
|
|
- MBEDTLS_SHA224 job turns off all hashes except SHA224, however, when investigating
|
|
|
|
reverse dependencies, SHA256 is found to depend on SHA224, so it is disabled,
|
|
|
|
and then SHA224 is found to depend on SHA256, so it is also disabled. To handle
|
|
|
|
this, there's a field in EXCLUSIVE_GROUPS that states that in a SHA224 test SHA256
|
|
|
|
should also be enabled before processing reverse dependencies:
|
|
|
|
'MBEDTLS_SHA224_C': ['MBEDTLS_SHA256_C']
|
|
|
|
- MBEDTLS_SHA512_C job turns off all hashes except SHA512. MBEDTLS_SSL_COOKIE_C
|
|
|
|
requires either SHA256 or SHA384 to work, so it also has to be disabled.
|
|
|
|
This is not a dependency on SHA512_C, but a result of an exclusive domain
|
|
|
|
config building method. Relevant field:
|
|
|
|
'MBEDTLS_SHA512_C': ['!MBEDTLS_SSL_COOKIE_C'],
|
|
|
|
|
|
|
|
- DualDomain - combination of the two above - both complementary and exclusive domain
|
|
|
|
job generation code will be run. Currently only used for hashes.
|
|
|
|
|
|
|
|
Lastly, the collected jobs are executed and (optionally) tested, with
|
|
|
|
error reporting and coloring as configured in options. Each test starts with
|
|
|
|
a full config without a couple of slowing down or unnecessary options
|
|
|
|
(see set_reference_config), then the specific job config is derived.
|
|
|
|
"""
|
2019-01-29 08:50:20 +01:00
|
|
|
import argparse
|
|
|
|
import os
|
|
|
|
import re
|
|
|
|
import shutil
|
|
|
|
import subprocess
|
|
|
|
import sys
|
|
|
|
import traceback
|
|
|
|
|
2022-10-04 21:02:41 +02:00
|
|
|
class Colors: # pylint: disable=too-few-public-methods
|
2019-01-29 18:48:48 +01:00
|
|
|
"""Minimalistic support for colored output.
|
|
|
|
Each field of an object of this class is either None if colored output
|
|
|
|
is not possible or not desired, or a pair of strings (start, stop) such
|
|
|
|
that outputting start switches the text color to the desired color and
|
|
|
|
stop switches the text color back to the default."""
|
|
|
|
red = None
|
|
|
|
green = None
|
|
|
|
bold_red = None
|
|
|
|
bold_green = None
|
|
|
|
def __init__(self, options=None):
|
2022-10-04 21:02:41 +02:00
|
|
|
"""Initialize color profile according to passed options."""
|
2019-01-29 18:48:48 +01:00
|
|
|
if not options or options.color in ['no', 'never']:
|
|
|
|
want_color = False
|
|
|
|
elif options.color in ['yes', 'always']:
|
|
|
|
want_color = True
|
|
|
|
else:
|
|
|
|
want_color = sys.stderr.isatty()
|
|
|
|
if want_color:
|
|
|
|
# Assume ANSI compatible terminal
|
|
|
|
normal = '\033[0m'
|
|
|
|
self.red = ('\033[31m', normal)
|
|
|
|
self.green = ('\033[32m', normal)
|
|
|
|
self.bold_red = ('\033[1;31m', normal)
|
|
|
|
self.bold_green = ('\033[1;32m', normal)
|
|
|
|
NO_COLORS = Colors(None)
|
|
|
|
|
|
|
|
def log_line(text, prefix='depends.py:', suffix='', color=None):
|
2019-01-29 08:50:20 +01:00
|
|
|
"""Print a status message."""
|
2022-10-04 21:02:41 +02:00
|
|
|
if color is not None:
|
2019-01-29 18:48:48 +01:00
|
|
|
prefix = color[0] + prefix
|
|
|
|
suffix = suffix + color[1]
|
|
|
|
sys.stderr.write(prefix + ' ' + text + suffix + '\n')
|
2019-01-29 18:42:55 +01:00
|
|
|
sys.stderr.flush()
|
2019-01-29 08:50:20 +01:00
|
|
|
|
2019-01-29 18:46:34 +01:00
|
|
|
def log_command(cmd):
|
|
|
|
"""Print a trace of the specified command.
|
|
|
|
cmd is a list of strings: a command name and its arguments."""
|
|
|
|
log_line(' '.join(cmd), prefix='+')
|
|
|
|
|
2019-01-29 08:50:20 +01:00
|
|
|
def backup_config(options):
|
2022-09-28 09:17:56 +02:00
|
|
|
"""Back up the library configuration file (mbedtls_config.h).
|
2019-01-29 18:52:16 +01:00
|
|
|
If the backup file already exists, it is presumed to be the desired backup,
|
|
|
|
so don't make another backup."""
|
|
|
|
if os.path.exists(options.config_backup):
|
|
|
|
options.own_backup = False
|
|
|
|
else:
|
|
|
|
options.own_backup = True
|
|
|
|
shutil.copy(options.config, options.config_backup)
|
2019-01-29 08:50:20 +01:00
|
|
|
|
2019-01-29 18:52:16 +01:00
|
|
|
def restore_config(options):
|
2022-09-28 09:17:56 +02:00
|
|
|
"""Restore the library configuration file (mbedtls_config.h).
|
2019-01-29 18:52:16 +01:00
|
|
|
Remove the backup file if it was saved earlier."""
|
|
|
|
if options.own_backup:
|
2019-01-29 08:50:20 +01:00
|
|
|
shutil.move(options.config_backup, options.config)
|
|
|
|
else:
|
|
|
|
shutil.copy(options.config_backup, options.config)
|
2019-01-29 18:52:16 +01:00
|
|
|
|
2019-01-29 18:46:34 +01:00
|
|
|
def run_config_pl(options, args):
|
2022-10-04 21:02:41 +02:00
|
|
|
"""Run scripts/config.py with the specified arguments."""
|
|
|
|
cmd = ['scripts/config.py']
|
2022-09-28 09:17:56 +02:00
|
|
|
if options.config != 'include/mbedtls/mbedtls_config.h':
|
2019-01-29 18:46:34 +01:00
|
|
|
cmd += ['--file', options.config]
|
|
|
|
cmd += args
|
|
|
|
log_command(cmd)
|
|
|
|
subprocess.check_call(cmd)
|
2019-01-29 08:50:20 +01:00
|
|
|
|
2022-10-04 21:02:41 +02:00
|
|
|
def set_reference_config(options):
|
|
|
|
"""Change the library configuration file (mbedtls_config.h) to the reference state.
|
|
|
|
The reference state is the one from which the tested configurations are
|
|
|
|
derived."""
|
2022-10-14 13:06:43 +02:00
|
|
|
# Turn off options that are not relevant to the tests and slow them down.
|
2022-10-04 21:02:41 +02:00
|
|
|
run_config_pl(options, ['full'])
|
|
|
|
run_config_pl(options, ['unset', 'MBEDTLS_MEMORY_BACKTRACE'])
|
|
|
|
run_config_pl(options, ['unset', 'MBEDTLS_MEMORY_BUFFER_ALLOC_C'])
|
|
|
|
run_config_pl(options, ['unset', 'MBEDTLS_MEMORY_DEBUG'])
|
2022-10-07 22:07:58 +02:00
|
|
|
run_config_pl(options, ['unset', 'MBEDTLS_TEST_HOOKS'])
|
2022-10-04 21:02:41 +02:00
|
|
|
|
|
|
|
def collect_config_symbols(options):
|
|
|
|
"""Read the list of settings from mbedtls_config.h.
|
|
|
|
Return them in a generator."""
|
|
|
|
with open(options.config, encoding="utf-8") as config_file:
|
|
|
|
rx = re.compile(r'\s*(?://\s*)?#define\s+(\w+)\s*(?:$|/[/*])')
|
|
|
|
for line in config_file:
|
|
|
|
m = re.match(rx, line)
|
|
|
|
if m:
|
|
|
|
yield m.group(1)
|
|
|
|
|
2019-01-29 08:50:20 +01:00
|
|
|
class Job:
|
|
|
|
"""A job builds the library in a specific configuration and runs some tests."""
|
|
|
|
def __init__(self, name, config_settings, commands):
|
|
|
|
"""Build a job object.
|
|
|
|
The job uses the configuration described by config_settings. This is a
|
|
|
|
dictionary where the keys are preprocessor symbols and the values are
|
|
|
|
booleans or strings. A boolean indicates whether or not to #define the
|
|
|
|
symbol. With a string, the symbol is #define'd to that value.
|
|
|
|
After setting the configuration, the job runs the programs specified by
|
|
|
|
commands. This is a list of lists of strings; each list of string is a
|
|
|
|
command name and its arguments and is passed to subprocess.call with
|
|
|
|
shell=False."""
|
|
|
|
self.name = name
|
|
|
|
self.config_settings = config_settings
|
|
|
|
self.commands = commands
|
|
|
|
|
2019-01-29 18:48:48 +01:00
|
|
|
def announce(self, colors, what):
|
2019-01-29 08:50:20 +01:00
|
|
|
'''Announce the start or completion of a job.
|
|
|
|
If what is None, announce the start of the job.
|
|
|
|
If what is True, announce that the job has passed.
|
|
|
|
If what is False, announce that the job has failed.'''
|
|
|
|
if what is True:
|
2019-01-29 18:48:48 +01:00
|
|
|
log_line(self.name + ' PASSED', color=colors.green)
|
2019-01-29 08:50:20 +01:00
|
|
|
elif what is False:
|
2019-01-29 18:48:48 +01:00
|
|
|
log_line(self.name + ' FAILED', color=colors.red)
|
2019-01-29 08:50:20 +01:00
|
|
|
else:
|
|
|
|
log_line('starting ' + self.name)
|
|
|
|
|
2019-01-29 18:46:34 +01:00
|
|
|
def configure(self, options):
|
2022-10-14 13:06:43 +02:00
|
|
|
'''Set library configuration options as required for the job.'''
|
2022-10-04 21:02:41 +02:00
|
|
|
set_reference_config(options)
|
2019-01-29 08:50:20 +01:00
|
|
|
for key, value in sorted(self.config_settings.items()):
|
|
|
|
if value is True:
|
|
|
|
args = ['set', key]
|
|
|
|
elif value is False:
|
|
|
|
args = ['unset', key]
|
|
|
|
else:
|
|
|
|
args = ['set', key, value]
|
2019-01-29 18:46:34 +01:00
|
|
|
run_config_pl(options, args)
|
2019-01-29 08:50:20 +01:00
|
|
|
|
|
|
|
def test(self, options):
|
|
|
|
'''Run the job's build and test commands.
|
|
|
|
Return True if all the commands succeed and False otherwise.
|
|
|
|
If options.keep_going is false, stop as soon as one command fails. Otherwise
|
|
|
|
run all the commands, except that if the first command fails, none of the
|
|
|
|
other commands are run (typically, the first command is a build command
|
|
|
|
and subsequent commands are tests that cannot run if the build failed).'''
|
|
|
|
built = False
|
|
|
|
success = True
|
|
|
|
for command in self.commands:
|
2019-01-29 18:46:34 +01:00
|
|
|
log_command(command)
|
2019-01-29 08:50:20 +01:00
|
|
|
ret = subprocess.call(command)
|
|
|
|
if ret != 0:
|
|
|
|
if command[0] not in ['make', options.make_command]:
|
|
|
|
log_line('*** [{}] Error {}'.format(' '.join(command), ret))
|
|
|
|
if not options.keep_going or not built:
|
|
|
|
return False
|
|
|
|
success = False
|
|
|
|
built = True
|
|
|
|
return success
|
|
|
|
|
|
|
|
# If the configuration option A requires B, make sure that
|
2022-10-04 22:22:22 +02:00
|
|
|
# B in REVERSE_DEPENDENCIES[A].
|
2019-01-29 19:30:40 +01:00
|
|
|
# All the information here should be contained in check_config.h. This
|
|
|
|
# file includes a copy because it changes rarely and it would be a pain
|
|
|
|
# to extract automatically.
|
2022-10-04 22:22:22 +02:00
|
|
|
REVERSE_DEPENDENCIES = {
|
2019-01-29 23:12:28 +01:00
|
|
|
'MBEDTLS_AES_C': ['MBEDTLS_CTR_DRBG_C',
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_NIST_KW_C'],
|
2019-01-29 23:12:28 +01:00
|
|
|
'MBEDTLS_CHACHA20_C': ['MBEDTLS_CHACHAPOLY_C'],
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_ECDSA_C': ['MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED'],
|
2019-01-29 08:50:20 +01:00
|
|
|
'MBEDTLS_ECP_C': ['MBEDTLS_ECDSA_C',
|
|
|
|
'MBEDTLS_ECDH_C',
|
|
|
|
'MBEDTLS_ECJPAKE_C',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED'],
|
2019-01-29 19:30:40 +01:00
|
|
|
'MBEDTLS_ECP_DP_SECP256R1_ENABLED': ['MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED'],
|
2019-01-29 08:50:20 +01:00
|
|
|
'MBEDTLS_PKCS1_V21': ['MBEDTLS_X509_RSASSA_PSS_SUPPORT'],
|
|
|
|
'MBEDTLS_PKCS1_V15': ['MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_RSA_ENABLED'],
|
|
|
|
'MBEDTLS_RSA_C': ['MBEDTLS_X509_RSASSA_PSS_SUPPORT',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED',
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_KEY_EXCHANGE_RSA_ENABLED',
|
|
|
|
'MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED'],
|
2019-01-29 19:30:40 +01:00
|
|
|
'MBEDTLS_SHA256_C': ['MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED',
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_ENTROPY_FORCE_SHA256',
|
|
|
|
'MBEDTLS_SHA224_C',
|
|
|
|
'MBEDTLS_SHA256_USE_A64_CRYPTO_IF_PRESENT',
|
2022-10-14 13:57:00 +02:00
|
|
|
'MBEDTLS_SHA256_USE_A64_CRYPTO_ONLY'],
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_SHA512_C': ['MBEDTLS_SHA384_C',
|
|
|
|
'MBEDTLS_SHA512_USE_A64_CRYPTO_IF_PRESENT',
|
|
|
|
'MBEDTLS_SHA512_USE_A64_CRYPTO_ONLY'],
|
|
|
|
'MBEDTLS_SHA224_C': ['MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED',
|
|
|
|
'MBEDTLS_ENTROPY_FORCE_SHA256',
|
|
|
|
'MBEDTLS_SHA256_C',
|
|
|
|
'MBEDTLS_SHA256_USE_A64_CRYPTO_IF_PRESENT',
|
|
|
|
'MBEDTLS_SHA256_USE_A64_CRYPTO_ONLY'],
|
|
|
|
'MBEDTLS_X509_RSASSA_PSS_SUPPORT': []
|
2019-01-29 08:50:20 +01:00
|
|
|
}
|
|
|
|
|
2022-09-28 09:17:56 +02:00
|
|
|
# If an option is tested in an exclusive test, alter the following defines.
|
2022-10-09 11:29:44 +02:00
|
|
|
# These are not necessarily dependencies, but just minimal required changes
|
2022-09-28 09:17:56 +02:00
|
|
|
# if a given define is the only one enabled from an exclusive group.
|
2022-10-04 22:22:22 +02:00
|
|
|
EXCLUSIVE_GROUPS = {
|
2022-10-14 13:06:43 +02:00
|
|
|
'MBEDTLS_SHA256_C': ['MBEDTLS_SHA224_C'],
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_SHA384_C': ['MBEDTLS_SHA512_C'],
|
2022-10-14 13:57:00 +02:00
|
|
|
'MBEDTLS_SHA512_C': ['!MBEDTLS_SSL_COOKIE_C', '!MBEDTLS_SSL_PROTO_TLS1_3'],
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_ECP_DP_CURVE448_ENABLED': ['!MBEDTLS_ECDSA_C',
|
2022-10-04 17:14:59 +02:00
|
|
|
'!MBEDTLS_ECDSA_DETERMINISTIC',
|
|
|
|
'!MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED',
|
|
|
|
'!MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED',
|
|
|
|
'!MBEDTLS_ECJPAKE_C',
|
|
|
|
'!MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED'],
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_ECP_DP_CURVE25519_ENABLED': ['!MBEDTLS_ECDSA_C',
|
2022-10-04 17:14:59 +02:00
|
|
|
'!MBEDTLS_ECDSA_DETERMINISTIC',
|
|
|
|
'!MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED',
|
|
|
|
'!MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED',
|
|
|
|
'!MBEDTLS_ECJPAKE_C',
|
|
|
|
'!MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED'],
|
2022-09-28 09:17:56 +02:00
|
|
|
'MBEDTLS_ARIA_C': ['!MBEDTLS_CMAC_C'],
|
|
|
|
'MBEDTLS_CAMELLIA_C': ['!MBEDTLS_CMAC_C'],
|
|
|
|
'MBEDTLS_CHACHA20_C': ['!MBEDTLS_CMAC_C', '!MBEDTLS_CCM_C', '!MBEDTLS_GCM_C'],
|
2022-10-13 15:07:47 +02:00
|
|
|
'MBEDTLS_DES_C': ['!MBEDTLS_CCM_C', '!MBEDTLS_GCM_C', '!MBEDTLS_SSL_TICKET_C',
|
|
|
|
'!MBEDTLS_SSL_CONTEXT_SERIALIZATION'],
|
2022-09-28 09:17:56 +02:00
|
|
|
}
|
|
|
|
def handle_exclusive_groups(config_settings, symbol):
|
|
|
|
"""For every symbol tested in an exclusive group check if there are other
|
|
|
|
defines to be altered. """
|
2022-10-04 22:22:22 +02:00
|
|
|
for dep in EXCLUSIVE_GROUPS.get(symbol, []):
|
2022-09-28 09:17:56 +02:00
|
|
|
unset = dep.startswith('!')
|
|
|
|
if unset:
|
2022-10-04 17:14:59 +02:00
|
|
|
dep = dep[1:]
|
2022-09-28 09:17:56 +02:00
|
|
|
config_settings[dep] = not unset
|
|
|
|
|
2019-01-29 08:50:20 +01:00
|
|
|
def turn_off_dependencies(config_settings):
|
|
|
|
"""For every option turned off config_settings, also turn off what depends on it.
|
|
|
|
An option O is turned off if config_settings[O] is False."""
|
|
|
|
for key, value in sorted(config_settings.items()):
|
|
|
|
if value is not False:
|
|
|
|
continue
|
2022-10-04 22:22:22 +02:00
|
|
|
for dep in REVERSE_DEPENDENCIES.get(key, []):
|
2019-01-29 08:50:20 +01:00
|
|
|
config_settings[dep] = False
|
|
|
|
|
2022-10-07 00:52:44 +02:00
|
|
|
class BaseDomain: # pylint: disable=too-few-public-methods, unused-argument
|
|
|
|
"""A base class for all domains."""
|
|
|
|
def __init__(self, symbols, commands, exclude):
|
|
|
|
"""Initialize the jobs container"""
|
|
|
|
self.jobs = []
|
|
|
|
|
|
|
|
class ExclusiveDomain(BaseDomain): # pylint: disable=too-few-public-methods
|
2019-01-29 08:50:20 +01:00
|
|
|
"""A domain consisting of a set of conceptually-equivalent settings.
|
|
|
|
Establish a list of configuration symbols. For each symbol, run a test job
|
2022-10-06 22:57:38 +02:00
|
|
|
with this symbol set and the others unset."""
|
2019-01-29 18:56:03 +01:00
|
|
|
def __init__(self, symbols, commands, exclude=None):
|
|
|
|
"""Build a domain for the specified list of configuration symbols.
|
2022-10-06 22:57:38 +02:00
|
|
|
The domain contains a set of jobs that enable one of the elements
|
|
|
|
of symbols and disable the others.
|
2019-01-29 18:56:03 +01:00
|
|
|
Each job runs the specified commands.
|
|
|
|
If exclude is a regular expression, skip generated jobs whose description
|
|
|
|
would match this regular expression."""
|
2022-10-07 00:52:44 +02:00
|
|
|
super().__init__(symbols, commands, exclude)
|
2022-10-06 22:57:38 +02:00
|
|
|
base_config_settings = {}
|
|
|
|
for symbol in symbols:
|
|
|
|
base_config_settings[symbol] = False
|
|
|
|
for symbol in symbols:
|
|
|
|
description = symbol
|
|
|
|
if exclude and re.match(exclude, description):
|
|
|
|
continue
|
|
|
|
config_settings = base_config_settings.copy()
|
|
|
|
config_settings[symbol] = True
|
|
|
|
handle_exclusive_groups(config_settings, symbol)
|
|
|
|
turn_off_dependencies(config_settings)
|
|
|
|
job = Job(description, config_settings, commands)
|
|
|
|
self.jobs.append(job)
|
2019-01-29 08:50:20 +01:00
|
|
|
|
2022-10-07 00:52:44 +02:00
|
|
|
class ComplementaryDomain(BaseDomain): # pylint: disable=too-few-public-methods
|
2019-01-29 08:50:20 +01:00
|
|
|
"""A domain consisting of a set of loosely-related settings.
|
|
|
|
Establish a list of configuration symbols. For each symbol, run a test job
|
2022-10-14 13:06:43 +02:00
|
|
|
with this symbol unset.
|
|
|
|
If exclude is a regular expression, skip generated jobs whose description
|
|
|
|
would match this regular expression."""
|
2022-10-07 00:52:44 +02:00
|
|
|
def __init__(self, symbols, commands, exclude=None):
|
2019-01-29 18:56:03 +01:00
|
|
|
"""Build a domain for the specified list of configuration symbols.
|
|
|
|
Each job in the domain disables one of the specified symbols.
|
|
|
|
Each job runs the specified commands."""
|
2022-10-07 00:52:44 +02:00
|
|
|
super().__init__(symbols, commands, exclude)
|
2019-01-29 08:50:20 +01:00
|
|
|
for symbol in symbols:
|
|
|
|
description = '!' + symbol
|
2022-10-07 00:52:44 +02:00
|
|
|
if exclude and re.match(exclude, description):
|
|
|
|
continue
|
2019-01-29 08:50:20 +01:00
|
|
|
config_settings = {symbol: False}
|
|
|
|
turn_off_dependencies(config_settings)
|
|
|
|
job = Job(description, config_settings, commands)
|
|
|
|
self.jobs.append(job)
|
|
|
|
|
2022-10-07 00:52:44 +02:00
|
|
|
class DualDomain(ExclusiveDomain, ComplementaryDomain): # pylint: disable=too-few-public-methods
|
2022-10-14 13:06:43 +02:00
|
|
|
"""A domain that contains both the ExclusiveDomain and BaseDomain tests.
|
2022-10-14 13:57:00 +02:00
|
|
|
Both parent class __init__ calls are performed in any order and
|
2022-10-14 13:06:43 +02:00
|
|
|
each call adds respective jobs. The job array initialization is done once in
|
|
|
|
BaseDomain, before the parent __init__ calls."""
|
2022-10-07 00:52:44 +02:00
|
|
|
|
2022-10-04 21:02:41 +02:00
|
|
|
class CipherInfo: # pylint: disable=too-few-public-methods
|
2019-01-29 23:12:28 +01:00
|
|
|
"""Collect data about cipher.h."""
|
2022-10-04 21:02:41 +02:00
|
|
|
def __init__(self):
|
2019-01-29 23:12:28 +01:00
|
|
|
self.base_symbols = set()
|
2022-10-04 21:02:41 +02:00
|
|
|
with open('include/mbedtls/cipher.h', encoding="utf-8") as fh:
|
2019-01-29 23:12:28 +01:00
|
|
|
for line in fh:
|
|
|
|
m = re.match(r' *MBEDTLS_CIPHER_ID_(\w+),', line)
|
|
|
|
if m and m.group(1) not in ['NONE', 'NULL', '3DES']:
|
|
|
|
self.base_symbols.add('MBEDTLS_' + m.group(1) + '_C')
|
|
|
|
|
2019-01-29 08:50:20 +01:00
|
|
|
class DomainData:
|
2022-10-04 21:02:41 +02:00
|
|
|
"""A container for domains and jobs, used to structurize testing."""
|
2019-01-29 08:50:20 +01:00
|
|
|
def config_symbols_matching(self, regexp):
|
2022-09-28 09:17:56 +02:00
|
|
|
"""List the mbedtls_config.h settings matching regexp."""
|
2019-01-29 08:50:20 +01:00
|
|
|
return [symbol for symbol in self.all_config_symbols
|
|
|
|
if re.match(regexp, symbol)]
|
|
|
|
|
|
|
|
def __init__(self, options):
|
|
|
|
"""Gather data about the library and establish a list of domains to test."""
|
|
|
|
build_command = [options.make_command, 'CFLAGS=-Werror']
|
|
|
|
build_and_test = [build_command, [options.make_command, 'test']]
|
2022-10-04 21:02:41 +02:00
|
|
|
self.all_config_symbols = set(collect_config_symbols(options))
|
2019-01-29 08:50:20 +01:00
|
|
|
# Find hash modules by name.
|
|
|
|
hash_symbols = self.config_symbols_matching(r'MBEDTLS_(MD|RIPEMD|SHA)[0-9]+_C\Z')
|
|
|
|
# Find elliptic curve enabling macros by name.
|
|
|
|
curve_symbols = self.config_symbols_matching(r'MBEDTLS_ECP_DP_\w+_ENABLED\Z')
|
|
|
|
# Find key exchange enabling macros by name.
|
|
|
|
key_exchange_symbols = self.config_symbols_matching(r'MBEDTLS_KEY_EXCHANGE_\w+_ENABLED\Z')
|
2019-01-29 23:12:28 +01:00
|
|
|
# Find cipher IDs (block permutations and stream ciphers --- chaining
|
|
|
|
# and padding modes are exercised separately) information by parsing
|
2022-09-28 09:17:56 +02:00
|
|
|
# cipher.h, as the information is not readily available in mbedtls_config.h.
|
2022-10-04 21:02:41 +02:00
|
|
|
cipher_info = CipherInfo()
|
2019-01-29 23:12:28 +01:00
|
|
|
# Find block cipher chaining and padding mode enabling macros by name.
|
|
|
|
cipher_chaining_symbols = self.config_symbols_matching(r'MBEDTLS_CIPHER_MODE_\w+\Z')
|
|
|
|
cipher_padding_symbols = self.config_symbols_matching(r'MBEDTLS_CIPHER_PADDING_\w+\Z')
|
2019-01-29 08:50:20 +01:00
|
|
|
self.domains = {
|
2019-01-29 23:12:28 +01:00
|
|
|
# Cipher IDs, chaining modes and padding modes. Run the test suites.
|
|
|
|
'cipher_id': ExclusiveDomain(cipher_info.base_symbols,
|
|
|
|
build_and_test),
|
|
|
|
'cipher_chaining': ExclusiveDomain(cipher_chaining_symbols,
|
|
|
|
build_and_test),
|
|
|
|
'cipher_padding': ExclusiveDomain(cipher_padding_symbols,
|
|
|
|
build_and_test),
|
2019-01-29 08:50:20 +01:00
|
|
|
# Elliptic curves. Run the test suites.
|
|
|
|
'curves': ExclusiveDomain(curve_symbols, build_and_test),
|
2022-10-14 13:06:43 +02:00
|
|
|
# Hash algorithms. Exclude three groups:
|
|
|
|
# - Exclusive domain of MD, RIPEMD, SHA1 (obsolete);
|
|
|
|
# - Exclusive domain of SHA224 (tested with and depends on SHA256);
|
|
|
|
# - Complementary domain of SHA224 and SHA384 - tested with and depend
|
|
|
|
# on SHA256 and SHA512, respectively.
|
2022-10-07 00:52:44 +02:00
|
|
|
'hashes': DualDomain(hash_symbols, build_and_test,
|
2022-10-14 13:06:43 +02:00
|
|
|
exclude=r'MBEDTLS_(MD|RIPEMD|SHA1_)' \
|
|
|
|
'|MBEDTLS_SHA224_'\
|
|
|
|
'|!MBEDTLS_(SHA224_|SHA384_)'),
|
2019-01-29 19:33:05 +01:00
|
|
|
# Key exchange types. Only build the library and the sample
|
|
|
|
# programs.
|
|
|
|
'kex': ExclusiveDomain(key_exchange_symbols,
|
|
|
|
[build_command + ['lib'],
|
|
|
|
build_command + ['-C', 'programs']]),
|
2019-01-29 08:50:20 +01:00
|
|
|
'pkalgs': ComplementaryDomain(['MBEDTLS_ECDSA_C',
|
|
|
|
'MBEDTLS_ECP_C',
|
|
|
|
'MBEDTLS_PKCS1_V21',
|
|
|
|
'MBEDTLS_PKCS1_V15',
|
|
|
|
'MBEDTLS_RSA_C',
|
|
|
|
'MBEDTLS_X509_RSASSA_PSS_SUPPORT'],
|
|
|
|
build_and_test),
|
|
|
|
}
|
|
|
|
self.jobs = {}
|
|
|
|
for domain in self.domains.values():
|
|
|
|
for job in domain.jobs:
|
|
|
|
self.jobs[job.name] = job
|
|
|
|
|
|
|
|
def get_jobs(self, name):
|
|
|
|
"""Return the list of jobs identified by the given name.
|
|
|
|
A name can either be the name of a domain or the name of one specific job."""
|
|
|
|
if name in self.domains:
|
|
|
|
return sorted(self.domains[name].jobs, key=lambda job: job.name)
|
|
|
|
else:
|
|
|
|
return [self.jobs[name]]
|
|
|
|
|
2019-01-29 18:48:48 +01:00
|
|
|
def run(options, job, colors=NO_COLORS):
|
2019-01-29 08:50:20 +01:00
|
|
|
"""Run the specified job (a Job instance)."""
|
|
|
|
subprocess.check_call([options.make_command, 'clean'])
|
2019-01-29 18:48:48 +01:00
|
|
|
job.announce(colors, None)
|
2019-01-29 18:46:34 +01:00
|
|
|
job.configure(options)
|
2019-01-29 08:50:20 +01:00
|
|
|
success = job.test(options)
|
2019-01-29 18:48:48 +01:00
|
|
|
job.announce(colors, success)
|
2019-01-29 08:50:20 +01:00
|
|
|
return success
|
|
|
|
|
2022-10-04 21:02:41 +02:00
|
|
|
def run_tests(options, domain_data):
|
2019-01-29 08:50:20 +01:00
|
|
|
"""Run the desired jobs.
|
|
|
|
domain_data should be a DomainData instance that describes the available
|
|
|
|
domains and jobs.
|
|
|
|
Run the jobs listed in options.domains."""
|
|
|
|
if not hasattr(options, 'config_backup'):
|
|
|
|
options.config_backup = options.config + '.bak'
|
2019-01-29 18:48:48 +01:00
|
|
|
colors = Colors(options)
|
2019-01-29 08:50:20 +01:00
|
|
|
jobs = []
|
|
|
|
failures = []
|
|
|
|
successes = []
|
|
|
|
for name in options.domains:
|
|
|
|
jobs += domain_data.get_jobs(name)
|
|
|
|
backup_config(options)
|
|
|
|
try:
|
|
|
|
for job in jobs:
|
2019-01-29 18:48:48 +01:00
|
|
|
success = run(options, job, colors=colors)
|
2019-01-29 08:50:20 +01:00
|
|
|
if not success:
|
|
|
|
if options.keep_going:
|
|
|
|
failures.append(job.name)
|
|
|
|
else:
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
successes.append(job.name)
|
2019-01-29 18:52:16 +01:00
|
|
|
restore_config(options)
|
|
|
|
except:
|
|
|
|
# Restore the configuration, except in stop-on-error mode if there
|
|
|
|
# was an error, where we leave the failing configuration up for
|
|
|
|
# developer convenience.
|
2019-01-29 08:50:20 +01:00
|
|
|
if options.keep_going:
|
2019-01-29 18:52:16 +01:00
|
|
|
restore_config(options)
|
|
|
|
raise
|
2019-01-29 18:50:03 +01:00
|
|
|
if successes:
|
|
|
|
log_line('{} passed'.format(' '.join(successes)), color=colors.bold_green)
|
2019-01-29 08:50:20 +01:00
|
|
|
if failures:
|
2019-01-29 18:50:03 +01:00
|
|
|
log_line('{} FAILED'.format(' '.join(failures)), color=colors.bold_red)
|
2019-01-29 08:50:20 +01:00
|
|
|
return False
|
|
|
|
else:
|
|
|
|
return True
|
|
|
|
|
2022-10-04 21:02:41 +02:00
|
|
|
def main():
|
2019-01-29 08:50:20 +01:00
|
|
|
try:
|
2022-10-09 11:29:44 +02:00
|
|
|
parser = argparse.ArgumentParser(
|
|
|
|
formatter_class=argparse.RawDescriptionHelpFormatter,
|
|
|
|
description=
|
|
|
|
"Test Mbed TLS with a subset of algorithms.\n\n"
|
|
|
|
"Example usage:\n"
|
|
|
|
r"./tests/scripts/depends.py \!MBEDTLS_SHA1_C MBEDTLS_SHA224_C""\n"
|
|
|
|
"./tests/scripts/depends.py MBEDTLS_AES_C hashes\n"
|
|
|
|
"./tests/scripts/depends.py cipher_id cipher_chaining\n")
|
2019-01-29 18:48:48 +01:00
|
|
|
parser.add_argument('--color', metavar='WHEN',
|
|
|
|
help='Colorize the output (always/auto/never)',
|
|
|
|
choices=['always', 'auto', 'never'], default='auto')
|
2019-01-29 08:50:20 +01:00
|
|
|
parser.add_argument('-c', '--config', metavar='FILE',
|
|
|
|
help='Configuration file to modify',
|
2022-09-28 09:17:56 +02:00
|
|
|
default='include/mbedtls/mbedtls_config.h')
|
2019-01-29 08:50:20 +01:00
|
|
|
parser.add_argument('-C', '--directory', metavar='DIR',
|
|
|
|
help='Change to this directory before anything else',
|
|
|
|
default='.')
|
|
|
|
parser.add_argument('-k', '--keep-going',
|
|
|
|
help='Try all configurations even if some fail (default)',
|
|
|
|
action='store_true', dest='keep_going', default=True)
|
|
|
|
parser.add_argument('-e', '--no-keep-going',
|
|
|
|
help='Stop as soon as a configuration fails',
|
|
|
|
action='store_false', dest='keep_going')
|
|
|
|
parser.add_argument('--list-jobs',
|
|
|
|
help='List supported jobs and exit',
|
|
|
|
action='append_const', dest='list', const='jobs')
|
|
|
|
parser.add_argument('--list-domains',
|
|
|
|
help='List supported domains and exit',
|
|
|
|
action='append_const', dest='list', const='domains')
|
|
|
|
parser.add_argument('--make-command', metavar='CMD',
|
|
|
|
help='Command to run instead of make (e.g. gmake)',
|
|
|
|
action='store', default='make')
|
|
|
|
parser.add_argument('domains', metavar='DOMAIN', nargs='*',
|
2022-10-04 21:02:41 +02:00
|
|
|
help='The domain(s) to test (default: all). This can \
|
|
|
|
be also a list of jobs to run.',
|
2019-01-29 08:50:20 +01:00
|
|
|
default=True)
|
|
|
|
options = parser.parse_args()
|
|
|
|
os.chdir(options.directory)
|
|
|
|
domain_data = DomainData(options)
|
2022-10-04 21:02:41 +02:00
|
|
|
if options.domains is True:
|
2019-01-29 08:50:20 +01:00
|
|
|
options.domains = sorted(domain_data.domains.keys())
|
|
|
|
if options.list:
|
2022-10-04 21:02:41 +02:00
|
|
|
for arg in options.list:
|
|
|
|
for domain_name in sorted(getattr(domain_data, arg).keys()):
|
|
|
|
print(domain_name)
|
|
|
|
sys.exit(0)
|
2019-01-29 08:50:20 +01:00
|
|
|
else:
|
2022-10-04 21:02:41 +02:00
|
|
|
sys.exit(0 if run_tests(options, domain_data) else 1)
|
|
|
|
except Exception: # pylint: disable=broad-except
|
2019-01-29 08:50:20 +01:00
|
|
|
traceback.print_exc()
|
2022-10-04 21:02:41 +02:00
|
|
|
sys.exit(3)
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
main()
|