aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorAlex Gaynor <alex.gaynor@gmail.com>2017-07-08 20:35:02 -0400
committerPaul Kehrer <paul.l.kehrer@gmail.com>2017-07-08 19:35:02 -0500
commit601ed631adf5d1df8a1138c5f037d93e7d943685 (patch)
tree03b2da4faf0b6e1cae6a0425f06a82141dcabce0 /src
parentbf128a470bbcfe9443eeade9da24c6b317296348 (diff)
downloadcryptography-601ed631adf5d1df8a1138c5f037d93e7d943685.tar.gz
cryptography-601ed631adf5d1df8a1138c5f037d93e7d943685.tar.bz2
cryptography-601ed631adf5d1df8a1138c5f037d93e7d943685.zip
Attempt to use coverage to quantify how many of the CONDITIONAL_NAMES we really use (#3763)
* Attempt to use coverage to quantify how many of the CONDITIONAL_NAMES we really use * rewrite file to improve coverage * Write it this way so we can use line coverage * lost this one :-( * fix comment and flake8 * update the docs as well * flake8
Diffstat (limited to 'src')
-rw-r--r--src/cryptography/hazmat/bindings/openssl/_conditional.py246
-rw-r--r--src/cryptography/hazmat/bindings/openssl/binding.py4
2 files changed, 185 insertions, 65 deletions
diff --git a/src/cryptography/hazmat/bindings/openssl/_conditional.py b/src/cryptography/hazmat/bindings/openssl/_conditional.py
index e9bbba69..b4926d25 100644
--- a/src/cryptography/hazmat/bindings/openssl/_conditional.py
+++ b/src/cryptography/hazmat/bindings/openssl/_conditional.py
@@ -4,12 +4,9 @@
from __future__ import absolute_import, division, print_function
-# This is a mapping of {condition: names-dependent-on-that-condition} so we can
-# loop over them and delete unsupported names at runtime. It will be removed
-# when cffi supports #if in cdef.
-CONDITIONAL_NAMES = {
- "Cryptography_HAS_CMS": [
+def cryptography_has_cms():
+ return [
"BIO_new_CMS",
"i2d_CMS_bio_stream",
"PEM_write_bio_CMS_stream",
@@ -39,9 +36,11 @@ CONDITIONAL_NAMES = {
"CMS_REUSE_DIGEST",
"CMS_USE_KEYID",
"CMS_DEBUG_DECRYPT",
- ],
+ ]
- "Cryptography_HAS_EC2M": [
+
+def cryptography_has_ec2m():
+ return [
"EC_GF2m_simple_method",
"EC_POINT_set_affine_coordinates_GF2m",
"EC_POINT_get_affine_coordinates_GF2m",
@@ -49,53 +48,80 @@ CONDITIONAL_NAMES = {
"EC_GROUP_set_curve_GF2m",
"EC_GROUP_get_curve_GF2m",
"EC_GROUP_new_curve_GF2m",
- ],
+ ]
+
- "Cryptography_HAS_EC_1_0_2": [
+def cryptography_has_ec_1_0_2():
+ return [
"EC_curve_nid2nist",
- ],
- "Cryptography_HAS_SET_ECDH_AUTO": [
+ ]
+
+
+def cryptography_has_set_ecdh_auto():
+ return [
"SSL_CTX_set_ecdh_auto",
- ],
- "Cryptography_HAS_ENGINE_CRYPTODEV": [
+ ]
+
+
+def cryptography_has_engine_cryptodev():
+ return [
"ENGINE_load_cryptodev"
- ],
- "Cryptography_HAS_RSA_R_PKCS_DECODING_ERROR": [
+ ]
+
+
+def cryptography_has_rsa_r_pkcs_decoding_error():
+ return [
"RSA_R_PKCS_DECODING_ERROR"
- ],
- "Cryptography_HAS_EGD": [
+ ]
+
+
+def cryptography_has_egd():
+ return [
"RAND_egd",
"RAND_egd_bytes",
"RAND_query_egd_bytes",
- ],
- "Cryptography_HAS_RSA_OAEP_MD": [
+ ]
+
+
+def cryptography_has_rsa_oaep_md():
+ return [
"EVP_PKEY_CTX_set_rsa_oaep_md",
- ],
+ ]
- "Cryptography_HAS_SSL3_METHOD": [
+
+def cryptography_has_ssl3_method():
+ return [
"SSLv3_method",
"SSLv3_client_method",
"SSLv3_server_method",
- ],
+ ]
+
- "Cryptography_HAS_ALPN": [
+def cryptography_has_alpn():
+ return [
"SSL_CTX_set_alpn_protos",
"SSL_set_alpn_protos",
"SSL_CTX_set_alpn_select_cb",
"SSL_get0_alpn_selected",
- ],
+ ]
- "Cryptography_HAS_COMPRESSION": [
+
+def cryptography_has_compression():
+ return [
"SSL_get_current_compression",
"SSL_get_current_expansion",
"SSL_COMP_get_name",
- ],
+ ]
+
- "Cryptography_HAS_GET_SERVER_TMP_KEY": [
+def cryptography_has_get_server_tmp_key():
+ return [
"SSL_get_server_tmp_key",
- ],
+ ]
- "Cryptography_HAS_102_VERIFICATION_ERROR_CODES": [
+
+def cryptography_has_102_verification_error_codes():
+ return [
'X509_V_ERR_SUITE_B_INVALID_VERSION',
'X509_V_ERR_SUITE_B_INVALID_ALGORITHM',
'X509_V_ERR_SUITE_B_INVALID_CURVE',
@@ -105,8 +131,11 @@ CONDITIONAL_NAMES = {
'X509_V_ERR_HOSTNAME_MISMATCH',
'X509_V_ERR_EMAIL_MISMATCH',
'X509_V_ERR_IP_ADDRESS_MISMATCH'
- ],
- "Cryptography_HAS_102_VERIFICATION_PARAMS": [
+ ]
+
+
+def cryptography_has_102_verification_params():
+ return [
"X509_V_FLAG_SUITEB_128_LOS_ONLY",
"X509_V_FLAG_SUITEB_192_LOS",
"X509_V_FLAG_SUITEB_128_LOS",
@@ -115,52 +144,82 @@ CONDITIONAL_NAMES = {
"X509_VERIFY_PARAM_set1_ip",
"X509_VERIFY_PARAM_set1_ip_asc",
"X509_VERIFY_PARAM_set_hostflags",
- ],
- "Cryptography_HAS_X509_V_FLAG_TRUSTED_FIRST": [
+ ]
+
+
+def cryptography_has_x509_v_flag_trusted_first():
+ return [
"X509_V_FLAG_TRUSTED_FIRST",
- ],
- "Cryptography_HAS_X509_V_FLAG_PARTIAL_CHAIN": [
+ ]
+
+
+def cryptography_has_x509_v_flag_partial_chain():
+ return [
"X509_V_FLAG_PARTIAL_CHAIN",
- ],
- "Cryptography_HAS_SET_CERT_CB": [
+ ]
+
+
+def cryptography_has_set_cert_cb():
+ return [
"SSL_CTX_set_cert_cb",
"SSL_set_cert_cb",
- ],
- "Cryptography_HAS_SSL_ST": [
+ ]
+
+
+def cryptography_has_ssl_st():
+ return [
"SSL_ST_BEFORE",
"SSL_ST_OK",
"SSL_ST_INIT",
"SSL_ST_RENEGOTIATE",
- ],
- "Cryptography_HAS_TLS_ST": [
+ ]
+
+
+def cryptography_has_tls_st():
+ return [
"TLS_ST_BEFORE",
"TLS_ST_OK",
- ],
- "Cryptography_HAS_LOCKING_CALLBACKS": [
+ ]
+
+
+def cryptography_has_locking_callbacks():
+ return [
"CRYPTO_LOCK",
"CRYPTO_UNLOCK",
"CRYPTO_READ",
"CRYPTO_LOCK_SSL",
"CRYPTO_lock",
- ],
- "Cryptography_HAS_SCRYPT": [
+ ]
+
+
+def cryptography_has_scrypt():
+ return [
"EVP_PBE_scrypt",
- ],
- "Cryptography_HAS_GENERIC_DTLS_METHOD": [
+ ]
+
+
+def cryptography_has_generic_dtls_method():
+ return [
"DTLS_method",
"DTLS_server_method",
"DTLS_client_method",
- ],
- "Cryptography_HAS_EVP_PKEY_DHX": [
+ ]
+
+
+def cryptography_has_evp_pkey_dhx():
+ return [
"EVP_PKEY_DHX",
- "Cryptography_d2i_DHxparams_bio",
- "Cryptography_i2d_DHxparams_bio",
- "PEM_write_bio_DHxparams",
- ],
- "Cryptography_HAS_MEM_FUNCTIONS": [
+ ]
+
+
+def cryptography_has_mem_functions():
+ return [
"Cryptography_CRYPTO_set_mem_functions",
- ],
- "Cryptography_HAS_SCT": [
+ ]
+
+
+def cryptography_has_sct():
+ return [
"SCT_get_version",
"SCT_get_log_entry_type",
"SCT_get0_log_id",
@@ -169,16 +228,77 @@ CONDITIONAL_NAMES = {
"sk_SCT_num",
"sk_SCT_value",
"SCT_LIST_free",
- ],
- "Cryptography_HAS_X509_STORE_CTX_GET_ISSUER": [
+ ]
+
+
+def cryptography_has_x509_store_ctx_get_issuer():
+ return [
"X509_STORE_get_get_issuer",
"X509_STORE_set_get_issuer",
- ],
- "Cryptography_HAS_X25519": [
+ ]
+
+
+def cryptography_has_x25519():
+ return [
"NID_X25519",
- ],
- "Cryptography_HAS_EVP_PKEY_get_set_tls_encodedpoint": [
+ ]
+
+
+def cryptography_has_evp_pkey_get_set_tls_encodedpoint():
+ return [
"EVP_PKEY_get1_tls_encodedpoint",
"EVP_PKEY_set1_tls_encodedpoint",
- ],
+ ]
+
+
+# This is a mapping of
+# {condition: function-returning-names-dependent-on-that-condition} so we can
+# loop over them and delete unsupported names at runtime. It will be removed
+# when cffi supports #if in cdef. We use functions instead of just a dict of
+# lists so we can use coverage to measure which are used.
+CONDITIONAL_NAMES = {
+ "Cryptography_HAS_CMS": cryptography_has_cms,
+ "Cryptography_HAS_EC2M": cryptography_has_ec2m,
+ "Cryptography_HAS_EC_1_0_2": cryptography_has_ec_1_0_2,
+ "Cryptography_HAS_SET_ECDH_AUTO": cryptography_has_set_ecdh_auto,
+ "Cryptography_HAS_ENGINE_CRYPTODEV": cryptography_has_engine_cryptodev,
+ "Cryptography_HAS_RSA_R_PKCS_DECODING_ERROR": (
+ cryptography_has_rsa_r_pkcs_decoding_error
+ ),
+ "Cryptography_HAS_EGD": cryptography_has_egd,
+ "Cryptography_HAS_RSA_OAEP_MD": cryptography_has_rsa_oaep_md,
+ "Cryptography_HAS_SSL3_METHOD": cryptography_has_ssl3_method,
+ "Cryptography_HAS_ALPN": cryptography_has_alpn,
+ "Cryptography_HAS_COMPRESSION": cryptography_has_compression,
+ "Cryptography_HAS_GET_SERVER_TMP_KEY": cryptography_has_get_server_tmp_key,
+ "Cryptography_HAS_102_VERIFICATION_ERROR_CODES": (
+ cryptography_has_102_verification_error_codes
+ ),
+ "Cryptography_HAS_102_VERIFICATION_PARAMS": (
+ cryptography_has_102_verification_params
+ ),
+ "Cryptography_HAS_X509_V_FLAG_TRUSTED_FIRST": (
+ cryptography_has_x509_v_flag_trusted_first
+ ),
+ "Cryptography_HAS_X509_V_FLAG_PARTIAL_CHAIN": (
+ cryptography_has_x509_v_flag_partial_chain
+ ),
+ "Cryptography_HAS_SET_CERT_CB": cryptography_has_set_cert_cb,
+ "Cryptography_HAS_SSL_ST": cryptography_has_ssl_st,
+ "Cryptography_HAS_TLS_ST": cryptography_has_tls_st,
+ "Cryptography_HAS_LOCKING_CALLBACKS": cryptography_has_locking_callbacks,
+ "Cryptography_HAS_SCRYPT": cryptography_has_scrypt,
+ "Cryptography_HAS_GENERIC_DTLS_METHOD": (
+ cryptography_has_generic_dtls_method
+ ),
+ "Cryptography_HAS_EVP_PKEY_DHX": cryptography_has_evp_pkey_dhx,
+ "Cryptography_HAS_MEM_FUNCTIONS": cryptography_has_mem_functions,
+ "Cryptography_HAS_SCT": cryptography_has_sct,
+ "Cryptography_HAS_X509_STORE_CTX_GET_ISSUER": (
+ cryptography_has_x509_store_ctx_get_issuer
+ ),
+ "Cryptography_HAS_X25519": cryptography_has_x25519,
+ "Cryptography_HAS_EVP_PKEY_get_set_tls_encodedpoint": (
+ cryptography_has_evp_pkey_get_set_tls_encodedpoint
+ ),
}
diff --git a/src/cryptography/hazmat/bindings/openssl/binding.py b/src/cryptography/hazmat/bindings/openssl/binding.py
index d00fc794..7790213e 100644
--- a/src/cryptography/hazmat/bindings/openssl/binding.py
+++ b/src/cryptography/hazmat/bindings/openssl/binding.py
@@ -80,9 +80,9 @@ def build_conditional_library(lib, conditional_names):
conditional_lib = types.ModuleType("lib")
conditional_lib._original_lib = lib
excluded_names = set()
- for condition, names in conditional_names.items():
+ for condition, names_cb in conditional_names.items():
if not getattr(lib, condition):
- excluded_names |= set(names)
+ excluded_names.update(names_cb())
for attr in dir(lib):
if attr not in excluded_names: