blob: 2ad01ad1931f2b32dc2b2216a57aaae1fe2a191a [file] [log] [blame]
Gilles Peskineb39e3ec2019-01-29 08:50:20 +01001#!/usr/bin/env python3
2
Dave Rodgman4eb44e42023-11-03 12:15:12 +00003# Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00004# SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Gilles Peskineb39e3ec2019-01-29 08:50:20 +01005
Gilles Peskineb39e3ec2019-01-29 08:50:20 +01006"""
Andrzej Kurek01af84a2022-10-09 05:29:44 -04007Test Mbed TLS with a subset of algorithms.
Gilles Peskineb39e3ec2019-01-29 08:50:20 +01008
Andrzej Kurek01af84a2022-10-09 05:29:44 -04009This script can be divided into several steps:
10
11First, include/mbedtls/mbedtls_config.h or a different config file passed
Andrzej Kurek3f930122022-10-26 08:08:26 -040012in the arguments is parsed to extract any configuration options (using config.py).
Andrzej Kurek01af84a2022-10-09 05:29:44 -040013
14Then, test domains (groups of jobs, tests) are built based on predefined data
15collected in the DomainData class. Here, each domain has five major traits:
Andrzej Kurek629c4122022-10-17 08:34:40 -040016- domain name, can be used to run only specific tests via command-line;
Andrzej Kurek01af84a2022-10-09 05:29:44 -040017- configuration building method, described in detail below;
18- list of symbols passed to the configuration building method;
19- commands to be run on each job (only build, build and test, or any other custom);
20- optional list of symbols to be excluded from testing.
21
22The configuration building method can be one of the three following:
23
24- ComplementaryDomain - build a job for each passed symbol by disabling a single
25 symbol and its reverse dependencies (defined in REVERSE_DEPENDENCIES);
26
27- ExclusiveDomain - build a job where, for each passed symbol, only this particular
28 one is defined and other symbols from the list are unset. For each job look for
29 any non-standard symbols to set/unset in EXCLUSIVE_GROUPS. These are usually not
30 direct dependencies, but rather non-trivial results of other configs missing. Then
31 look for any unset symbols and handle their reverse dependencies.
32 Examples of EXCLUSIVE_GROUPS usage:
Andrzej Kurek01af84a2022-10-09 05:29:44 -040033 - MBEDTLS_SHA512_C job turns off all hashes except SHA512. MBEDTLS_SSL_COOKIE_C
34 requires either SHA256 or SHA384 to work, so it also has to be disabled.
35 This is not a dependency on SHA512_C, but a result of an exclusive domain
36 config building method. Relevant field:
Andrzej Kurek629c4122022-10-17 08:34:40 -040037 'MBEDTLS_SHA512_C': ['-MBEDTLS_SSL_COOKIE_C'],
Andrzej Kurek01af84a2022-10-09 05:29:44 -040038
39- DualDomain - combination of the two above - both complementary and exclusive domain
40 job generation code will be run. Currently only used for hashes.
41
42Lastly, the collected jobs are executed and (optionally) tested, with
43error reporting and coloring as configured in options. Each test starts with
44a full config without a couple of slowing down or unnecessary options
45(see set_reference_config), then the specific job config is derived.
46"""
Gilles Peskineb39e3ec2019-01-29 08:50:20 +010047import argparse
48import os
49import re
Gilles Peskineb39e3ec2019-01-29 08:50:20 +010050import subprocess
51import sys
52import traceback
Andrzej Kurek576803f2023-01-24 07:40:42 -050053from typing import Union
54
Andrzej Kurek3b0215d2023-01-23 07:19:22 -050055# Add the Mbed TLS Python library directory to the module search path
Andrzej Kurek3f930122022-10-26 08:08:26 -040056import scripts_path # pylint: disable=unused-import
57import config
Gabor Mezei4e10d6c2024-08-03 14:26:13 +020058from mbedtls_framework import c_build_helper
Gilles Peskineb39e3ec2019-01-29 08:50:20 +010059
Andrzej Kurek3322c222022-10-04 15:02:41 -040060class Colors: # pylint: disable=too-few-public-methods
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +010061 """Minimalistic support for colored output.
62Each field of an object of this class is either None if colored output
63is not possible or not desired, or a pair of strings (start, stop) such
64that outputting start switches the text color to the desired color and
65stop switches the text color back to the default."""
66 red = None
67 green = None
Andrzej Kurek3f930122022-10-26 08:08:26 -040068 cyan = None
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +010069 bold_red = None
70 bold_green = None
71 def __init__(self, options=None):
Andrzej Kurek3322c222022-10-04 15:02:41 -040072 """Initialize color profile according to passed options."""
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +010073 if not options or options.color in ['no', 'never']:
74 want_color = False
75 elif options.color in ['yes', 'always']:
76 want_color = True
77 else:
78 want_color = sys.stderr.isatty()
79 if want_color:
80 # Assume ANSI compatible terminal
81 normal = '\033[0m'
82 self.red = ('\033[31m', normal)
83 self.green = ('\033[32m', normal)
Andrzej Kurek3f930122022-10-26 08:08:26 -040084 self.cyan = ('\033[36m', normal)
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +010085 self.bold_red = ('\033[1;31m', normal)
86 self.bold_green = ('\033[1;32m', normal)
87NO_COLORS = Colors(None)
88
89def log_line(text, prefix='depends.py:', suffix='', color=None):
Gilles Peskineb39e3ec2019-01-29 08:50:20 +010090 """Print a status message."""
Andrzej Kurek3322c222022-10-04 15:02:41 -040091 if color is not None:
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +010092 prefix = color[0] + prefix
93 suffix = suffix + color[1]
94 sys.stderr.write(prefix + ' ' + text + suffix + '\n')
Gilles Peskine46c82562019-01-29 18:42:55 +010095 sys.stderr.flush()
Gilles Peskineb39e3ec2019-01-29 08:50:20 +010096
Gilles Peskine54aa5c62019-01-29 18:46:34 +010097def log_command(cmd):
98 """Print a trace of the specified command.
99cmd is a list of strings: a command name and its arguments."""
100 log_line(' '.join(cmd), prefix='+')
101
Andrzej Kurek3f930122022-10-26 08:08:26 -0400102def option_exists(conf, option):
Andrzej Kurek81cf5ad2023-02-06 10:48:43 +0100103 return option in conf.settings
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100104
Andrzej Kurek576803f2023-01-24 07:40:42 -0500105def set_config_option_value(conf, option, colors, value: Union[bool, str]):
106 """Set/unset a configuration option, optionally specifying a value.
107value can be either True/False (set/unset config option), or a string,
108which will make a symbol defined with a certain value."""
Andrzej Kurek3f930122022-10-26 08:08:26 -0400109 if not option_exists(conf, option):
110 log_line('Symbol {} was not found in {}'.format(option, conf.filename), color=colors.red)
111 return False
Andrzej Kurek3f930122022-10-26 08:08:26 -0400112
Andrzej Kurek3b0215d2023-01-23 07:19:22 -0500113 if value is False:
114 log_command(['config.py', 'unset', option])
115 conf.unset(option)
Andrzej Kurek72082dc2023-02-06 10:49:46 +0100116 elif value is True:
117 log_command(['config.py', 'set', option])
118 conf.set(option)
Andrzej Kurek3b0215d2023-01-23 07:19:22 -0500119 else:
Andrzej Kurek72082dc2023-02-06 10:49:46 +0100120 log_command(['config.py', 'set', option, value])
121 conf.set(option, value)
Andrzej Kurek3f930122022-10-26 08:08:26 -0400122 return True
123
Gabor Mezei9ce6d242024-06-19 17:47:05 +0200124def set_reference_config(conf, colors):
Andrzej Kurek3322c222022-10-04 15:02:41 -0400125 """Change the library configuration file (mbedtls_config.h) to the reference state.
126The reference state is the one from which the tested configurations are
127derived."""
Andrzej Kureka0cb4fa2022-10-14 07:06:43 -0400128 # Turn off options that are not relevant to the tests and slow them down.
Andrzej Kurek3f930122022-10-26 08:08:26 -0400129 log_command(['config.py', 'full'])
130 conf.adapt(config.full_adapter)
Andrzej Kurek3b0215d2023-01-23 07:19:22 -0500131 set_config_option_value(conf, 'MBEDTLS_TEST_HOOKS', colors, False)
Andrzej Kurek3322c222022-10-04 15:02:41 -0400132
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100133class Job:
134 """A job builds the library in a specific configuration and runs some tests."""
135 def __init__(self, name, config_settings, commands):
136 """Build a job object.
137The job uses the configuration described by config_settings. This is a
138dictionary where the keys are preprocessor symbols and the values are
139booleans or strings. A boolean indicates whether or not to #define the
140symbol. With a string, the symbol is #define'd to that value.
141After setting the configuration, the job runs the programs specified by
142commands. This is a list of lists of strings; each list of string is a
143command name and its arguments and is passed to subprocess.call with
144shell=False."""
145 self.name = name
146 self.config_settings = config_settings
147 self.commands = commands
148
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +0100149 def announce(self, colors, what):
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100150 '''Announce the start or completion of a job.
151If what is None, announce the start of the job.
152If what is True, announce that the job has passed.
153If what is False, announce that the job has failed.'''
154 if what is True:
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +0100155 log_line(self.name + ' PASSED', color=colors.green)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100156 elif what is False:
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +0100157 log_line(self.name + ' FAILED', color=colors.red)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100158 else:
Andrzej Kurek3f930122022-10-26 08:08:26 -0400159 log_line('starting ' + self.name, color=colors.cyan)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100160
Gabor Mezei9ce6d242024-06-19 17:47:05 +0200161 def configure(self, conf, colors):
Andrzej Kureka0cb4fa2022-10-14 07:06:43 -0400162 '''Set library configuration options as required for the job.'''
Gabor Mezei9ce6d242024-06-19 17:47:05 +0200163 set_reference_config(conf, colors)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100164 for key, value in sorted(self.config_settings.items()):
Andrzej Kurek3b0215d2023-01-23 07:19:22 -0500165 ret = set_config_option_value(conf, key, colors, value)
Andrzej Kurek3f930122022-10-26 08:08:26 -0400166 if ret is False:
167 return False
168 return True
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100169
Gabor Mezei4e10d6c2024-08-03 14:26:13 +0200170 def _consistency_check(self):
171 '''Check if the testable option is consistent with the goal.
172
173 The purpose of this function to ensure that every option is set or unset according to
174 the settings.
175 '''
176 log_command(['consistency check'])
177 c_name = None
178 exe_name = None
179 header = '#include "mbedtls/build_info.h"\n'
180
181 # Generate a C error directive for each setting to test if it is active
182 for option, value in sorted(self.config_settings.items()):
183 header += '#if '
184 if value:
185 header += '!'
Gabor Mezeic9f01cf2024-09-26 13:02:01 +0200186 header += f'defined({option})\n'
187 header += f'#error "{option}"\n'
Gabor Mezei4e10d6c2024-08-03 14:26:13 +0200188 header += '#endif\n'
189 include_path = ['include', 'tf-psa-crypto/include',
190 'tf-psa-crypto/drivers/builtin/include']
191
192 try:
193 # Generate a C file, build and run it
194 c_file, c_name, exe_name = c_build_helper.create_c_file(self.name)
195 c_build_helper.generate_c_file(c_file, 'depends.py', header, lambda x: '')
196 c_file.close()
197 c_build_helper.compile_c_file(c_name, exe_name, include_path)
Gabor Mezei4e10d6c2024-08-03 14:26:13 +0200198 return True
199
200 except c_build_helper.CompileError as e:
201 # Read the command line output to find out which setting has been failed
202 failed = {m.group(1) for m in re.finditer('.*#error "(.*)"', e.message) if m}
203 log_line('Inconsistent config option(s):')
204 for option in sorted(failed):
205 log_line(' ' + option)
Gabor Mezei4e10d6c2024-08-03 14:26:13 +0200206 return False
207
208 finally:
209 c_build_helper.remove_file_if_exists(c_name)
210 c_build_helper.remove_file_if_exists(exe_name)
211
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100212 def test(self, options):
213 '''Run the job's build and test commands.
214Return True if all the commands succeed and False otherwise.
215If options.keep_going is false, stop as soon as one command fails. Otherwise
216run all the commands, except that if the first command fails, none of the
217other commands are run (typically, the first command is a build command
218and subsequent commands are tests that cannot run if the build failed).'''
Gabor Mezei4e10d6c2024-08-03 14:26:13 +0200219 if not self._consistency_check():
220 return False
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100221 built = False
222 success = True
223 for command in self.commands:
Gilles Peskine54aa5c62019-01-29 18:46:34 +0100224 log_command(command)
Gilles Peskine35cb3192024-02-12 14:16:05 +0100225 env = os.environ.copy()
226 if 'MBEDTLS_TEST_CONFIGURATION' in env:
227 env['MBEDTLS_TEST_CONFIGURATION'] += '-' + self.name
228 ret = subprocess.call(command, env=env)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100229 if ret != 0:
230 if command[0] not in ['make', options.make_command]:
231 log_line('*** [{}] Error {}'.format(' '.join(command), ret))
232 if not options.keep_going or not built:
233 return False
234 success = False
235 built = True
236 return success
237
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100238# If the configuration option A requires B, make sure that
Andrzej Kurek202932f2022-10-04 16:22:22 -0400239# B in REVERSE_DEPENDENCIES[A].
Gabor Mezei610e6e22024-08-03 14:33:21 +0200240# All the information here should be contained in check_config.h or check_crypto_config.h.
241# This file includes a copy because it changes rarely and it would be a pain
Gilles Peskine584c24a2019-01-29 19:30:40 +0100242# to extract automatically.
Andrzej Kurek202932f2022-10-04 16:22:22 -0400243REVERSE_DEPENDENCIES = {
Gabor Mezeib50043b2024-06-18 20:30:36 +0200244 'PSA_WANT_KEY_TYPE_AES': ['PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128',
245 'MBEDTLS_CTR_DRBG_C',
246 'MBEDTLS_NIST_KW_C'],
247 'PSA_WANT_KEY_TYPE_CHACHA20': ['PSA_WANT_ALG_CHACHA20_POLY1305',
248 'PSA_WANT_ALG_STREAM_CIPHER'],
249 'PSA_WANT_ALG_CCM': ['PSA_WANT_ALG_CCM_STAR_NO_TAG'],
250 'PSA_WANT_ALG_CMAC': ['PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128'],
Gabor Mezei610e6e22024-08-03 14:33:21 +0200251
252 'MBEDTLS_CIPHER_MODE_CBC': ['PSA_WANT_ALG_CBC_PKCS7',
253 'PSA_WANT_ALG_CBC_NO_PADDING'],
254 'MBEDTLS_CIPHER_MODE_CFB': ['PSA_WANT_ALG_CFB'],
255 'MBEDTLS_CIPHER_MODE_CTR': ['PSA_WANT_ALG_CTR'],
256 'MBEDTLS_CIPHER_MODE_OFB': ['PSA_WANT_ALG_OFB'],
257
Gabor Mezei8f944852024-09-12 16:24:38 +0200258 'MBEDTLS_CIPHER_PADDING_PKCS7': ['MBEDTLS_PKCS5_C',
259 'MBEDTLS_PKCS12_C',
260 'PSA_WANT_ALG_CBC_PKCS7'],
Gabor Mezei610e6e22024-08-03 14:33:21 +0200261
262 'MBEDTLS_ECP_DP_BP256R1_ENABLED': ['PSA_WANT_ECC_BRAINPOOL_P_R1_256'],
263 'MBEDTLS_ECP_DP_BP384R1_ENABLED': ['PSA_WANT_ECC_BRAINPOOL_P_R1_384'],
264 'MBEDTLS_ECP_DP_BP512R1_ENABLED': ['PSA_WANT_ECC_BRAINPOOL_P_R1_512'],
265 'MBEDTLS_ECP_DP_CURVE25519_ENABLED': ['PSA_WANT_ECC_MONTGOMERY_255'],
266 'MBEDTLS_ECP_DP_CURVE448_ENABLED': ['PSA_WANT_ECC_MONTGOMERY_448'],
267 'MBEDTLS_ECP_DP_SECP192R1_ENABLED': ['PSA_WANT_ECC_SECP_R1_192'],
268 'MBEDTLS_ECP_DP_SECP224R1_ENABLED': ['PSA_WANT_ECC_SECP_R1_224'],
Gabor Mezei4fef7972024-10-09 15:47:07 +0200269 'MBEDTLS_ECP_DP_SECP256R1_ENABLED': ['PSA_WANT_ECC_SECP_R1_256',
270 'PSA_WANT_ALG_JPAKE',
271 'MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED'],
Gabor Mezei610e6e22024-08-03 14:33:21 +0200272 'MBEDTLS_ECP_DP_SECP384R1_ENABLED': ['PSA_WANT_ECC_SECP_R1_384'],
273 'MBEDTLS_ECP_DP_SECP512R1_ENABLED': ['PSA_WANT_ECC_SECP_R1_512'],
274 'MBEDTLS_ECP_DP_SECP521R1_ENABLED': ['PSA_WANT_ECC_SECP_R1_521'],
275 'MBEDTLS_ECP_DP_SECP192K1_ENABLED': ['PSA_WANT_ECC_SECP_K1_192'],
276 'MBEDTLS_ECP_DP_SECP256K1_ENABLED': ['PSA_WANT_ECC_SECP_K1_256'],
277
Andrzej Kureke05b17f2022-09-28 03:17:56 -0400278 'MBEDTLS_ECDSA_C': ['MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED',
Gabor Mezei610e6e22024-08-03 14:33:21 +0200279 'MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED',
280 'PSA_WANT_ALG_ECDSA',
281 'PSA_WANT_ALG_DETERMINISTIC_ECDSA'],
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100282 'MBEDTLS_ECP_C': ['MBEDTLS_ECDSA_C',
Gabor Mezei610e6e22024-08-03 14:33:21 +0200283 'MBEDTLS_ECDH_C', 'PSA_WANT_ALG_ECDH',
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100284 'MBEDTLS_ECJPAKE_C',
Manuel Pégourié-Gonnardad45c4d2022-12-06 13:20:06 +0100285 'MBEDTLS_ECP_RESTARTABLE',
Valerio Setti15e70442023-06-15 09:47:26 +0200286 'MBEDTLS_PK_PARSE_EC_EXTENDED',
287 'MBEDTLS_PK_PARSE_EC_COMPRESSED',
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100288 'MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED',
289 'MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED',
290 'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
Ronald Crond8d2ea52022-10-04 15:48:06 +0200291 'MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED',
Gabor Mezei610e6e22024-08-03 14:33:21 +0200292 'MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED',
293 'PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY',
294 'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC',
295 'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT',
296 'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_EXPORT',
297 'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_GENERATE',
298 'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_DERIVE'],
299 'MBEDTLS_ECJPAKE_C': ['MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED',
300 'PSA_WANT_ALG_JPAKE'],
301 'MBEDTLS_PKCS1_V21': ['MBEDTLS_X509_RSASSA_PSS_SUPPORT',
302 'PSA_WANT_ALG_RSA_OAEP',
303 'PSA_WANT_ALG_RSA_PSS'],
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100304 'MBEDTLS_PKCS1_V15': ['MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED',
305 'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
306 'MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED',
Gabor Mezei610e6e22024-08-03 14:33:21 +0200307 'MBEDTLS_KEY_EXCHANGE_RSA_ENABLED',
308 'PSA_WANT_ALG_RSA_PKCS1V15_CRYPT',
309 'PSA_WANT_ALG_RSA_PKCS1V15_SIGN'],
Gabor Mezei8ec990b2024-07-31 17:14:04 +0200310 'MBEDTLS_RSA_C': ['MBEDTLS_PKCS1_V15',
311 'MBEDTLS_PKCS1_V21',
Gabor Mezei610e6e22024-08-03 14:33:21 +0200312 'MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED',
313 'PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY',
314 'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC',
315 'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT',
316 'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT',
317 'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE'],
318
319 'MBEDTLS_MD5_C' : ['PSA_WANT_ALG_MD5'],
320 'MBEDTLS_RIPEMD160_C' : ['PSA_WANT_ALG_RIPEMD160'],
321 'MBEDTLS_SHA1_C' : ['PSA_WANT_ALG_SHA_1'],
322 'MBEDTLS_SHA224_C': ['MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED',
323 'MBEDTLS_ENTROPY_FORCE_SHA256',
324 'MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_IF_PRESENT',
325 'MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_ONLY',
326 'PSA_WANT_ALG_SHA_224'],
Gilles Peskine584c24a2019-01-29 19:30:40 +0100327 'MBEDTLS_SHA256_C': ['MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED',
Andrzej Kureke05b17f2022-09-28 03:17:56 -0400328 'MBEDTLS_ENTROPY_FORCE_SHA256',
Dave Rodgmand680d4f2023-10-11 11:05:22 +0100329 'MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_IF_PRESENT',
330 'MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_ONLY',
Andrzej Kurek22b959d2022-10-16 12:51:41 -0400331 'MBEDTLS_LMS_C',
Gabor Mezei610e6e22024-08-03 14:33:21 +0200332 'MBEDTLS_LMS_PRIVATE',
333 'PSA_WANT_ALG_SHA_256',
334 'PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS'],
335 'MBEDTLS_SHA384_C' : ['PSA_WANT_ALG_SHA_384'],
Valerio Settie7221a22022-12-16 11:53:45 +0100336 'MBEDTLS_SHA512_C': ['MBEDTLS_SHA512_USE_A64_CRYPTO_IF_PRESENT',
Gabor Mezei610e6e22024-08-03 14:33:21 +0200337 'MBEDTLS_SHA512_USE_A64_CRYPTO_ONLY',
338 'PSA_WANT_ALG_SHA_512'],
339 'MBEDTLS_SHA3_C' : ['PSA_WANT_ALG_SHA3_224',
340 'PSA_WANT_ALG_SHA3_256',
341 'PSA_WANT_ALG_SHA3_384',
342 'PSA_WANT_ALG_SHA3_512'],
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100343}
344
Andrzej Kureke05b17f2022-09-28 03:17:56 -0400345# If an option is tested in an exclusive test, alter the following defines.
Andrzej Kurek01af84a2022-10-09 05:29:44 -0400346# These are not necessarily dependencies, but just minimal required changes
Andrzej Kureke05b17f2022-09-28 03:17:56 -0400347# if a given define is the only one enabled from an exclusive group.
Andrzej Kurek202932f2022-10-04 16:22:22 -0400348EXCLUSIVE_GROUPS = {
Andrzej Kurek65b2ac12022-10-14 08:09:16 -0400349 'MBEDTLS_SHA512_C': ['-MBEDTLS_SSL_COOKIE_C',
Manuel Pégourié-Gonnard5a51d0d2023-03-22 13:04:08 +0100350 '-MBEDTLS_SSL_TLS_C'],
Andrzej Kurek65b2ac12022-10-14 08:09:16 -0400351 'MBEDTLS_ECP_DP_CURVE448_ENABLED': ['-MBEDTLS_ECDSA_C',
352 '-MBEDTLS_ECDSA_DETERMINISTIC',
Gabor Mezei610e6e22024-08-03 14:33:21 +0200353 '-MBEDTLS_ECJPAKE_C',],
Andrzej Kurek65b2ac12022-10-14 08:09:16 -0400354 'MBEDTLS_ECP_DP_CURVE25519_ENABLED': ['-MBEDTLS_ECDSA_C',
355 '-MBEDTLS_ECDSA_DETERMINISTIC',
Gabor Mezei610e6e22024-08-03 14:33:21 +0200356 '-MBEDTLS_ECJPAKE_C'],
Gabor Mezeib50043b2024-06-18 20:30:36 +0200357 'PSA_WANT_KEY_TYPE_ARIA': ['-PSA_WANT_ALG_CMAC',
358 '-PSA_WANT_ALG_CCM',
359 '-PSA_WANT_ALG_GCM',
360 '-MBEDTLS_SSL_TICKET_C',
361 '-MBEDTLS_SSL_CONTEXT_SERIALIZATION'],
362 'PSA_WANT_KEY_TYPE_CAMELLIA': ['-PSA_WANT_ALG_CMAC'],
363 'PSA_WANT_KEY_TYPE_CHACHA20': ['-PSA_WANT_ALG_CMAC',
364 '-PSA_WANT_ALG_CCM',
365 '-PSA_WANT_ALG_GCM',
366 '-PSA_WANT_ALG_ECB_NO_PADDING'],
367 'PSA_WANT_KEY_TYPE_DES': ['-PSA_WANT_ALG_CCM',
368 '-PSA_WANT_ALG_GCM',
369 '-MBEDTLS_SSL_TICKET_C',
370 '-MBEDTLS_SSL_CONTEXT_SERIALIZATION'],
Andrzej Kureke05b17f2022-09-28 03:17:56 -0400371}
372def handle_exclusive_groups(config_settings, symbol):
373 """For every symbol tested in an exclusive group check if there are other
374defines to be altered. """
Andrzej Kurek202932f2022-10-04 16:22:22 -0400375 for dep in EXCLUSIVE_GROUPS.get(symbol, []):
Andrzej Kurek65b2ac12022-10-14 08:09:16 -0400376 unset = dep.startswith('-')
377 dep = dep[1:]
Andrzej Kureke05b17f2022-09-28 03:17:56 -0400378 config_settings[dep] = not unset
379
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100380def turn_off_dependencies(config_settings):
381 """For every option turned off config_settings, also turn off what depends on it.
Gabor Mezeifb061012024-09-24 18:58:14 +0200382
383 An option O is turned off if config_settings[O] is False.
384 Handle the dependencies recursively.
385 """
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100386 for key, value in sorted(config_settings.items()):
387 if value is not False:
388 continue
Gabor Mezeifb061012024-09-24 18:58:14 +0200389
390 # Save the processed settings to handle cross referencies
Gabor Mezei8ec990b2024-07-31 17:14:04 +0200391 revdep = set(REVERSE_DEPENDENCIES.get(key, []))
Gabor Mezeifb061012024-09-24 18:58:14 +0200392 history = set()
Gabor Mezei8ec990b2024-07-31 17:14:04 +0200393 while revdep:
394 dep = revdep.pop()
Gabor Mezeifb061012024-09-24 18:58:14 +0200395 history.add(dep)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100396 config_settings[dep] = False
Gabor Mezeifb061012024-09-24 18:58:14 +0200397 # Do not add symbols which are already processed
398 revdep.update(set(REVERSE_DEPENDENCIES.get(dep, [])) - history)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100399
Andrzej Kurek228b12c2022-10-06 18:52:44 -0400400class BaseDomain: # pylint: disable=too-few-public-methods, unused-argument
401 """A base class for all domains."""
402 def __init__(self, symbols, commands, exclude):
403 """Initialize the jobs container"""
404 self.jobs = []
405
406class ExclusiveDomain(BaseDomain): # pylint: disable=too-few-public-methods
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100407 """A domain consisting of a set of conceptually-equivalent settings.
408Establish a list of configuration symbols. For each symbol, run a test job
Andrzej Kurekfe469492022-10-06 16:57:38 -0400409with this symbol set and the others unset."""
Gilles Peskineb1284cf2019-01-29 18:56:03 +0100410 def __init__(self, symbols, commands, exclude=None):
411 """Build a domain for the specified list of configuration symbols.
Andrzej Kurekfe469492022-10-06 16:57:38 -0400412The domain contains a set of jobs that enable one of the elements
413of symbols and disable the others.
Gilles Peskineb1284cf2019-01-29 18:56:03 +0100414Each job runs the specified commands.
415If exclude is a regular expression, skip generated jobs whose description
416would match this regular expression."""
Andrzej Kurek228b12c2022-10-06 18:52:44 -0400417 super().__init__(symbols, commands, exclude)
Andrzej Kurekfe469492022-10-06 16:57:38 -0400418 base_config_settings = {}
419 for symbol in symbols:
420 base_config_settings[symbol] = False
421 for symbol in symbols:
422 description = symbol
423 if exclude and re.match(exclude, description):
424 continue
425 config_settings = base_config_settings.copy()
426 config_settings[symbol] = True
427 handle_exclusive_groups(config_settings, symbol)
428 turn_off_dependencies(config_settings)
429 job = Job(description, config_settings, commands)
430 self.jobs.append(job)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100431
Andrzej Kurek228b12c2022-10-06 18:52:44 -0400432class ComplementaryDomain(BaseDomain): # pylint: disable=too-few-public-methods
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100433 """A domain consisting of a set of loosely-related settings.
434Establish a list of configuration symbols. For each symbol, run a test job
Andrzej Kureka0cb4fa2022-10-14 07:06:43 -0400435with this symbol unset.
436If exclude is a regular expression, skip generated jobs whose description
437would match this regular expression."""
Andrzej Kurek228b12c2022-10-06 18:52:44 -0400438 def __init__(self, symbols, commands, exclude=None):
Gilles Peskineb1284cf2019-01-29 18:56:03 +0100439 """Build a domain for the specified list of configuration symbols.
440Each job in the domain disables one of the specified symbols.
441Each job runs the specified commands."""
Andrzej Kurek228b12c2022-10-06 18:52:44 -0400442 super().__init__(symbols, commands, exclude)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100443 for symbol in symbols:
444 description = '!' + symbol
Andrzej Kurek228b12c2022-10-06 18:52:44 -0400445 if exclude and re.match(exclude, description):
446 continue
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100447 config_settings = {symbol: False}
448 turn_off_dependencies(config_settings)
449 job = Job(description, config_settings, commands)
450 self.jobs.append(job)
451
Andrzej Kurek228b12c2022-10-06 18:52:44 -0400452class DualDomain(ExclusiveDomain, ComplementaryDomain): # pylint: disable=too-few-public-methods
Andrzej Kureka0cb4fa2022-10-14 07:06:43 -0400453 """A domain that contains both the ExclusiveDomain and BaseDomain tests.
Andrzej Kurekf4b18672022-10-14 07:57:00 -0400454Both parent class __init__ calls are performed in any order and
Andrzej Kureka0cb4fa2022-10-14 07:06:43 -0400455each call adds respective jobs. The job array initialization is done once in
456BaseDomain, before the parent __init__ calls."""
Andrzej Kurek228b12c2022-10-06 18:52:44 -0400457
Andrzej Kurek3322c222022-10-04 15:02:41 -0400458class CipherInfo: # pylint: disable=too-few-public-methods
Gilles Peskine34a15572019-01-29 23:12:28 +0100459 """Collect data about cipher.h."""
Andrzej Kurek3322c222022-10-04 15:02:41 -0400460 def __init__(self):
Gilles Peskine34a15572019-01-29 23:12:28 +0100461 self.base_symbols = set()
Ronald Cronb50d30f2024-06-21 08:56:43 +0200462 if os.path.isdir('tf-psa-crypto'):
463 cipher_h_path = 'tf-psa-crypto/drivers/builtin/include/mbedtls/cipher.h'
464 else:
465 cipher_h_path = 'include/mbedtls/cipher.h'
466 with open(cipher_h_path, encoding="utf-8") as fh:
Gilles Peskine34a15572019-01-29 23:12:28 +0100467 for line in fh:
468 m = re.match(r' *MBEDTLS_CIPHER_ID_(\w+),', line)
469 if m and m.group(1) not in ['NONE', 'NULL', '3DES']:
Gabor Mezeib50043b2024-06-18 20:30:36 +0200470 self.base_symbols.add('PSA_WANT_KEY_TYPE_' + m.group(1))
Gilles Peskine34a15572019-01-29 23:12:28 +0100471
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100472class DomainData:
Andrzej Kurek3322c222022-10-04 15:02:41 -0400473 """A container for domains and jobs, used to structurize testing."""
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100474 def config_symbols_matching(self, regexp):
Andrzej Kureke05b17f2022-09-28 03:17:56 -0400475 """List the mbedtls_config.h settings matching regexp."""
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100476 return [symbol for symbol in self.all_config_symbols
477 if re.match(regexp, symbol)]
478
Andrzej Kurek3f930122022-10-26 08:08:26 -0400479 def __init__(self, options, conf):
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100480 """Gather data about the library and establish a list of domains to test."""
Dave Rodgman84125a12024-01-02 11:42:38 +0000481 build_command = [options.make_command, 'CFLAGS=-Werror -O2']
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100482 build_and_test = [build_command, [options.make_command, 'test']]
Andrzej Kurek3f930122022-10-26 08:08:26 -0400483 self.all_config_symbols = set(conf.settings.keys())
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100484 # Find hash modules by name.
485 hash_symbols = self.config_symbols_matching(r'MBEDTLS_(MD|RIPEMD|SHA)[0-9]+_C\Z')
486 # Find elliptic curve enabling macros by name.
487 curve_symbols = self.config_symbols_matching(r'MBEDTLS_ECP_DP_\w+_ENABLED\Z')
488 # Find key exchange enabling macros by name.
489 key_exchange_symbols = self.config_symbols_matching(r'MBEDTLS_KEY_EXCHANGE_\w+_ENABLED\Z')
Gabor Mezeib50043b2024-06-18 20:30:36 +0200490
Gilles Peskine34a15572019-01-29 23:12:28 +0100491 # Find cipher IDs (block permutations and stream ciphers --- chaining
492 # and padding modes are exercised separately) information by parsing
Andrzej Kureke05b17f2022-09-28 03:17:56 -0400493 # cipher.h, as the information is not readily available in mbedtls_config.h.
Andrzej Kurek3322c222022-10-04 15:02:41 -0400494 cipher_info = CipherInfo()
Gilles Peskine34a15572019-01-29 23:12:28 +0100495 # Find block cipher chaining and padding mode enabling macros by name.
496 cipher_chaining_symbols = self.config_symbols_matching(r'MBEDTLS_CIPHER_MODE_\w+\Z')
497 cipher_padding_symbols = self.config_symbols_matching(r'MBEDTLS_CIPHER_PADDING_\w+\Z')
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100498 self.domains = {
Gilles Peskine34a15572019-01-29 23:12:28 +0100499 # Cipher IDs, chaining modes and padding modes. Run the test suites.
500 'cipher_id': ExclusiveDomain(cipher_info.base_symbols,
501 build_and_test),
502 'cipher_chaining': ExclusiveDomain(cipher_chaining_symbols,
503 build_and_test),
504 'cipher_padding': ExclusiveDomain(cipher_padding_symbols,
505 build_and_test),
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100506 # Elliptic curves. Run the test suites.
507 'curves': ExclusiveDomain(curve_symbols, build_and_test),
Valerio Settiea8c88f2022-12-29 11:08:35 +0100508 # Hash algorithms. Excluding exclusive domains of MD, RIPEMD, SHA1,
509 # SHA224 and SHA384 because MBEDTLS_ENTROPY_C is extensively used
510 # across various modules, but it depends on either SHA256 or SHA512.
511 # As a consequence an "exclusive" test of anything other than SHA256
512 # or SHA512 with MBEDTLS_ENTROPY_C enabled is not possible.
Andrzej Kurek228b12c2022-10-06 18:52:44 -0400513 'hashes': DualDomain(hash_symbols, build_and_test,
Andrzej Kureka0cb4fa2022-10-14 07:06:43 -0400514 exclude=r'MBEDTLS_(MD|RIPEMD|SHA1_)' \
Valerio Settib6bf7dc2022-12-22 14:28:03 +0100515 '|MBEDTLS_SHA224_' \
Pol Henarejosaa426e02023-02-08 12:52:10 +0100516 '|MBEDTLS_SHA384_' \
517 '|MBEDTLS_SHA3_'),
Andrzej Kurek98682b52023-01-23 06:16:23 -0500518 # Key exchange types.
Andrzej Kurek1ff73362022-11-02 04:50:16 -0400519 'kex': ExclusiveDomain(key_exchange_symbols, build_and_test),
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100520 'pkalgs': ComplementaryDomain(['MBEDTLS_ECDSA_C',
521 'MBEDTLS_ECP_C',
522 'MBEDTLS_PKCS1_V21',
523 'MBEDTLS_PKCS1_V15',
524 'MBEDTLS_RSA_C',
525 'MBEDTLS_X509_RSASSA_PSS_SUPPORT'],
526 build_and_test),
527 }
528 self.jobs = {}
529 for domain in self.domains.values():
530 for job in domain.jobs:
531 self.jobs[job.name] = job
532
533 def get_jobs(self, name):
534 """Return the list of jobs identified by the given name.
535A name can either be the name of a domain or the name of one specific job."""
536 if name in self.domains:
537 return sorted(self.domains[name].jobs, key=lambda job: job.name)
538 else:
539 return [self.jobs[name]]
540
Andrzej Kurek3f930122022-10-26 08:08:26 -0400541def run(options, job, conf, colors=NO_COLORS):
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100542 """Run the specified job (a Job instance)."""
543 subprocess.check_call([options.make_command, 'clean'])
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +0100544 job.announce(colors, None)
Gabor Mezei9ce6d242024-06-19 17:47:05 +0200545 if not job.configure(conf, colors):
Andrzej Kurek3f930122022-10-26 08:08:26 -0400546 job.announce(colors, False)
547 return False
548 conf.write()
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100549 success = job.test(options)
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +0100550 job.announce(colors, success)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100551 return success
552
Andrzej Kurek3f930122022-10-26 08:08:26 -0400553def run_tests(options, domain_data, conf):
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100554 """Run the desired jobs.
555domain_data should be a DomainData instance that describes the available
556domains and jobs.
Andrzej Kurekb8a97e72022-10-17 08:39:09 -0400557Run the jobs listed in options.tasks."""
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +0100558 colors = Colors(options)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100559 jobs = []
560 failures = []
561 successes = []
Andrzej Kurekb8a97e72022-10-17 08:39:09 -0400562 for name in options.tasks:
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100563 jobs += domain_data.get_jobs(name)
Gabor Mezei035d7c82024-06-19 15:46:21 +0200564 conf.backup()
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100565 try:
566 for job in jobs:
Andrzej Kurek3f930122022-10-26 08:08:26 -0400567 success = run(options, job, conf, colors=colors)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100568 if not success:
569 if options.keep_going:
570 failures.append(job.name)
571 else:
572 return False
573 else:
574 successes.append(job.name)
Gabor Mezei035d7c82024-06-19 15:46:21 +0200575 conf.restore()
Gilles Peskinebf7537d2019-01-29 18:52:16 +0100576 except:
577 # Restore the configuration, except in stop-on-error mode if there
578 # was an error, where we leave the failing configuration up for
579 # developer convenience.
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100580 if options.keep_going:
Gabor Mezei035d7c82024-06-19 15:46:21 +0200581 conf.restore()
Gilles Peskinebf7537d2019-01-29 18:52:16 +0100582 raise
Gilles Peskinee85163b2019-01-29 18:50:03 +0100583 if successes:
584 log_line('{} passed'.format(' '.join(successes)), color=colors.bold_green)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100585 if failures:
Gilles Peskinee85163b2019-01-29 18:50:03 +0100586 log_line('{} FAILED'.format(' '.join(failures)), color=colors.bold_red)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100587 return False
588 else:
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100589 return True
590
Andrzej Kurek3322c222022-10-04 15:02:41 -0400591def main():
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100592 try:
Andrzej Kurek01af84a2022-10-09 05:29:44 -0400593 parser = argparse.ArgumentParser(
594 formatter_class=argparse.RawDescriptionHelpFormatter,
595 description=
596 "Test Mbed TLS with a subset of algorithms.\n\n"
597 "Example usage:\n"
Andrzej Kurek629c4122022-10-17 08:34:40 -0400598 r"./tests/scripts/depends.py \!MBEDTLS_SHA1_C MBEDTLS_SHA256_C""\n"
Andrzej Kurek01af84a2022-10-09 05:29:44 -0400599 "./tests/scripts/depends.py MBEDTLS_AES_C hashes\n"
600 "./tests/scripts/depends.py cipher_id cipher_chaining\n")
Gilles Peskine0fa7cbe2019-01-29 18:48:48 +0100601 parser.add_argument('--color', metavar='WHEN',
602 help='Colorize the output (always/auto/never)',
603 choices=['always', 'auto', 'never'], default='auto')
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100604 parser.add_argument('-c', '--config', metavar='FILE',
605 help='Configuration file to modify',
Gabor Mezeif5408f02024-06-14 15:25:46 +0200606 default=config.MbedTLSConfigFile.default_path[0])
607 parser.add_argument('-r', '--crypto-config', metavar='FILE',
608 help='Crypto configuration file to modify',
609 default=config.CryptoConfigFile.default_path[0])
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100610 parser.add_argument('-C', '--directory', metavar='DIR',
611 help='Change to this directory before anything else',
612 default='.')
613 parser.add_argument('-k', '--keep-going',
614 help='Try all configurations even if some fail (default)',
615 action='store_true', dest='keep_going', default=True)
616 parser.add_argument('-e', '--no-keep-going',
617 help='Stop as soon as a configuration fails',
618 action='store_false', dest='keep_going')
619 parser.add_argument('--list-jobs',
620 help='List supported jobs and exit',
621 action='append_const', dest='list', const='jobs')
622 parser.add_argument('--list-domains',
623 help='List supported domains and exit',
624 action='append_const', dest='list', const='domains')
625 parser.add_argument('--make-command', metavar='CMD',
626 help='Command to run instead of make (e.g. gmake)',
627 action='store', default='make')
Andrzej Kurekb8a97e72022-10-17 08:39:09 -0400628 parser.add_argument('tasks', metavar='TASKS', nargs='*',
629 help='The domain(s) or job(s) to test (default: all).',
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100630 default=True)
631 options = parser.parse_args()
632 os.chdir(options.directory)
Gabor Mezeif5408f02024-06-14 15:25:46 +0200633 conf = config.CombinedConfig(config.MbedTLSConfigFile(options.config),
634 config.CryptoConfigFile(options.crypto_config))
Andrzej Kurek3f930122022-10-26 08:08:26 -0400635 domain_data = DomainData(options, conf)
636
Andrzej Kurekb8a97e72022-10-17 08:39:09 -0400637 if options.tasks is True:
638 options.tasks = sorted(domain_data.domains.keys())
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100639 if options.list:
Andrzej Kurek3322c222022-10-04 15:02:41 -0400640 for arg in options.list:
641 for domain_name in sorted(getattr(domain_data, arg).keys()):
642 print(domain_name)
643 sys.exit(0)
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100644 else:
Andrzej Kurek3f930122022-10-26 08:08:26 -0400645 sys.exit(0 if run_tests(options, domain_data, conf) else 1)
Andrzej Kurek3322c222022-10-04 15:02:41 -0400646 except Exception: # pylint: disable=broad-except
Gilles Peskineb39e3ec2019-01-29 08:50:20 +0100647 traceback.print_exc()
Andrzej Kurek3322c222022-10-04 15:02:41 -0400648 sys.exit(3)
649
650if __name__ == '__main__':
651 main()