From d1e8c394f7ee6136bef213b69c2178e7722a538e Mon Sep 17 00:00:00 2001 From: Jacob Jo Date: Sat, 1 Mar 2025 00:28:43 +0000 Subject: [PATCH] auto formatted --- .../test_client_authentication.py | 7 ++- .../test_dynamic_record_sizes.py | 5 +- tests/integrationv2/test_early_data.py | 8 ++- tests/integrationv2/test_external_psk.py | 8 ++- tests/integrationv2/test_fragmentation.py | 15 +++++- tests/integrationv2/test_happy_path.py | 14 ++++- .../test_hello_retry_requests.py | 24 +++++++-- tests/integrationv2/test_key_update.py | 12 ++++- tests/integrationv2/test_npn.py | 51 ++++++++++++++++--- tests/integrationv2/test_ocsp.py | 16 +++++- tests/integrationv2/test_pq_handshake.py | 8 ++- tests/integrationv2/test_record_padding.py | 16 +++++- tests/integrationv2/test_renegotiate.py | 35 +++++++++++-- tests/integrationv2/test_serialization.py | 6 ++- .../integrationv2/test_session_resumption.py | 16 +++++- tests/integrationv2/test_sslyze.py | 6 ++- .../integrationv2/test_version_negotiation.py | 16 +++++- 17 files changed, 226 insertions(+), 37 deletions(-) diff --git a/tests/integrationv2/test_client_authentication.py b/tests/integrationv2/test_client_authentication.py index dd9863f5992..4a8e1dcd74e 100644 --- a/tests/integrationv2/test_client_authentication.py +++ b/tests/integrationv2/test_client_authentication.py @@ -175,7 +175,12 @@ def test_client_auth_with_s2n_server_using_nonmatching_certs( @pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name) @pytest.mark.parametrize("certificate", CERTS_TO_TEST, ids=get_parameter_name) def test_client_auth_with_s2n_client_no_cert( - managed_process, provider, other_provider, protocol, cipher, certificate # noqa: F811 + managed_process, + provider, + other_provider, + protocol, + cipher, + certificate, # noqa: F811 ): port = next(available_ports) diff --git a/tests/integrationv2/test_dynamic_record_sizes.py b/tests/integrationv2/test_dynamic_record_sizes.py index eaffe556406..37050cff7c0 100644 --- a/tests/integrationv2/test_dynamic_record_sizes.py +++ b/tests/integrationv2/test_dynamic_record_sizes.py @@ -11,7 +11,10 @@ PROTOCOLS, ) from common import ProviderOptions, data_bytes -from fixtures import custom_mtu, managed_process # lgtm [py/unused-import] # noqa: F401 +from fixtures import ( + custom_mtu, + managed_process, +) # lgtm [py/unused-import] # noqa: F401 from providers import Provider, S2N, OpenSSL, Tcpdump from utils import ( invalid_test_parameters, diff --git a/tests/integrationv2/test_early_data.py b/tests/integrationv2/test_early_data.py index eacb298ef4d..b4181890745 100644 --- a/tests/integrationv2/test_early_data.py +++ b/tests/integrationv2/test_early_data.py @@ -297,7 +297,13 @@ def test_s2n_client_with_early_data( @pytest.mark.parametrize("provider", SERVER_PROVIDERS, ids=get_parameter_name) @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name) def test_s2n_client_without_early_data( - managed_process, tmp_path, cipher, certificate, protocol, provider, other_provider # noqa: F811 + managed_process, + tmp_path, + cipher, + certificate, + protocol, + provider, + other_provider, # noqa: F811 ): early_data_file = str(tmp_path / EARLY_DATA_FILE) early_data = get_early_data_bytes(early_data_file, MAX_EARLY_DATA) diff --git a/tests/integrationv2/test_external_psk.py b/tests/integrationv2/test_external_psk.py index cf6c6298ae6..beab6e8df5a 100644 --- a/tests/integrationv2/test_external_psk.py +++ b/tests/integrationv2/test_external_psk.py @@ -509,7 +509,13 @@ def test_s2n_client_multiple_psks( @pytest.mark.parametrize("psk_identity", PSK_IDENTITY_LIST, ids=get_parameter_name) @pytest.mark.parametrize("psk_secret", PSK_SECRET_LIST, ids=get_parameter_name) def test_s2n_client_psk_handshake_failure( - managed_process, cipher, curve, protocol, provider, psk_identity, psk_secret # noqa: F811 + managed_process, + cipher, + curve, + protocol, + provider, + psk_identity, + psk_secret, # noqa: F811 ): port = next(available_ports) random_bytes = data_bytes(10) diff --git a/tests/integrationv2/test_fragmentation.py b/tests/integrationv2/test_fragmentation.py index 6cbf528389d..a8390bc10d9 100644 --- a/tests/integrationv2/test_fragmentation.py +++ b/tests/integrationv2/test_fragmentation.py @@ -31,7 +31,12 @@ @pytest.mark.parametrize("protocol", PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("certificate", CERTIFICATES_TO_TEST, ids=get_parameter_name) def test_s2n_server_low_latency( - managed_process, cipher, provider, other_provider, protocol, certificate # noqa: F811 + managed_process, + cipher, + provider, + other_provider, + protocol, + certificate, # noqa: F811 ): if provider is OpenSSL and "openssl-1.0.2" in provider.get_version(): pytest.skip( @@ -97,7 +102,13 @@ def invalid_test_parameters_frag_len(*args, **kwargs): "frag_len", [512, 2048, 8192, 12345, 16384], ids=get_parameter_name ) def test_s2n_server_framented_data( - managed_process, cipher, provider, other_provider, protocol, certificate, frag_len # noqa: F811 + managed_process, + cipher, + provider, + other_provider, + protocol, + certificate, + frag_len, # noqa: F811 ): if provider is OpenSSL and "openssl-1.0.2" in provider.get_version(): pytest.skip( diff --git a/tests/integrationv2/test_happy_path.py b/tests/integrationv2/test_happy_path.py index 104ec50af23..a6f3c07b59d 100644 --- a/tests/integrationv2/test_happy_path.py +++ b/tests/integrationv2/test_happy_path.py @@ -29,7 +29,12 @@ @pytest.mark.parametrize("protocol", PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) def test_s2n_server_happy_path( - managed_process, cipher, provider, curve, protocol, certificate # noqa: F811 + managed_process, + cipher, + provider, + curve, + protocol, + certificate, # noqa: F811 ): port = next(available_ports) @@ -94,7 +99,12 @@ def test_s2n_server_happy_path( @pytest.mark.parametrize("protocol", PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) def test_s2n_client_happy_path( - managed_process, cipher, provider, curve, protocol, certificate # noqa: F811 + managed_process, + cipher, + provider, + curve, + protocol, + certificate, # noqa: F811 ): port = next(available_ports) diff --git a/tests/integrationv2/test_hello_retry_requests.py b/tests/integrationv2/test_hello_retry_requests.py index 6a3b9e7efa2..5885e4a6846 100644 --- a/tests/integrationv2/test_hello_retry_requests.py +++ b/tests/integrationv2/test_hello_retry_requests.py @@ -44,7 +44,13 @@ def test_nothing(): @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name) @pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) def test_hrr_with_s2n_as_client( - managed_process, cipher, provider, other_provider, curve, protocol, certificate # noqa: F811 + managed_process, + cipher, + provider, + other_provider, + curve, + protocol, + certificate, # noqa: F811 ): if curve == S2N_DEFAULT_CURVE: pytest.skip("No retry if server curve matches client curve") @@ -109,7 +115,13 @@ def test_hrr_with_s2n_as_client( @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name) @pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) def test_hrr_with_s2n_as_server( - managed_process, cipher, provider, other_provider, curve, protocol, certificate # noqa: F811 + managed_process, + cipher, + provider, + other_provider, + curve, + protocol, + certificate, # noqa: F811 ): port = next(available_ports) @@ -175,7 +187,13 @@ def test_hrr_with_s2n_as_server( @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name) @pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name) def test_hrr_with_default_keyshare( - managed_process, cipher, provider, other_provider, curve, protocol, certificate # noqa: F811 + managed_process, + cipher, + provider, + other_provider, + curve, + protocol, + certificate, # noqa: F811 ): port = next(available_ports) diff --git a/tests/integrationv2/test_key_update.py b/tests/integrationv2/test_key_update.py index 643219a9110..d00a3617424 100644 --- a/tests/integrationv2/test_key_update.py +++ b/tests/integrationv2/test_key_update.py @@ -29,7 +29,11 @@ def test_nothing(): @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name) @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name) def test_s2n_server_key_update( - managed_process, cipher, provider, other_provider, protocol # noqa: F811 + managed_process, + cipher, + provider, + other_provider, + protocol, # noqa: F811 ): host = "localhost" port = next(available_ports) @@ -83,7 +87,11 @@ def test_s2n_server_key_update( @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name) @pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name) def test_s2n_client_key_update( - managed_process, cipher, provider, other_provider, protocol # noqa: F811 + managed_process, + cipher, + provider, + other_provider, + protocol, # noqa: F811 ): host = "localhost" port = next(available_ports) diff --git a/tests/integrationv2/test_npn.py b/tests/integrationv2/test_npn.py index 47189cde307..851045f6103 100644 --- a/tests/integrationv2/test_npn.py +++ b/tests/integrationv2/test_npn.py @@ -36,7 +36,13 @@ def s2n_client_npn_handshake( - managed_process, cipher, curve, certificate, protocol, provider, server_list # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, + server_list, # noqa: F811 ): options = ProviderOptions( port=next(available_ports), @@ -76,7 +82,12 @@ def s2n_client_npn_handshake( @pytest.mark.parametrize("protocol", TLS_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_client_npn( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): s2n_client, server = s2n_client_npn_handshake( managed_process, @@ -112,7 +123,12 @@ def test_s2n_client_npn( @pytest.mark.parametrize("protocol", TLS_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_client_npn_server_preference( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): s2n_client, server = s2n_client_npn_handshake( managed_process, @@ -148,7 +164,12 @@ def test_s2n_client_npn_server_preference( @pytest.mark.parametrize("protocol", TLS_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_client_npn_no_overlap( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): s2n_client, server = s2n_client_npn_handshake( managed_process, @@ -173,7 +194,13 @@ def test_s2n_client_npn_no_overlap( def s2n_server_npn_handshake( - managed_process, cipher, curve, certificate, protocol, provider, server_list # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, + server_list, # noqa: F811 ): options = ProviderOptions( port=next(available_ports), @@ -213,7 +240,12 @@ def s2n_server_npn_handshake( @pytest.mark.parametrize("protocol", TLS_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_server_npn( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): # We only send one protocol on the s2n server # due to the fact that it re-purposes the alpn list(which only sends one protocol) @@ -253,7 +285,12 @@ def test_s2n_server_npn( @pytest.mark.parametrize("protocol", TLS_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_server_npn_no_overlap( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): client, s2n_server = s2n_server_npn_handshake( managed_process, diff --git a/tests/integrationv2/test_ocsp.py b/tests/integrationv2/test_ocsp.py index 6b9b18ea649..7dc4e4e0b07 100644 --- a/tests/integrationv2/test_ocsp.py +++ b/tests/integrationv2/test_ocsp.py @@ -22,7 +22,13 @@ @pytest.mark.parametrize("protocol", PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("certificate", OCSP_CERTS, ids=get_parameter_name) def test_s2n_client_ocsp_response( - managed_process, cipher, provider, other_provider, curve, protocol, certificate # noqa: F811 + managed_process, + cipher, + provider, + other_provider, + curve, + protocol, + certificate, # noqa: F811 ): if "boringssl" in get_flag(S2N_PROVIDER_VERSION): pytest.skip("s2n-tls client with boringssl does not support ocsp") @@ -86,7 +92,13 @@ def test_s2n_client_ocsp_response( @pytest.mark.parametrize("protocol", PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("certificate", OCSP_CERTS, ids=get_parameter_name) def test_s2n_server_ocsp_response( - managed_process, cipher, provider, other_provider, curve, protocol, certificate # noqa: F811 + managed_process, + cipher, + provider, + other_provider, + curve, + protocol, + certificate, # noqa: F811 ): port = next(available_ports) diff --git a/tests/integrationv2/test_pq_handshake.py b/tests/integrationv2/test_pq_handshake.py index 03d74b997f2..71389262d77 100644 --- a/tests/integrationv2/test_pq_handshake.py +++ b/tests/integrationv2/test_pq_handshake.py @@ -206,7 +206,9 @@ def test_s2nc_to_s2nd_pq_handshake( ids=get_parameter_name, ) def test_s2nc_to_awslc_pq_handshake( - managed_process, s2n_client_policy, awslc_server_group # noqa: F811 + managed_process, + s2n_client_policy, + awslc_server_group, # noqa: F811 ): if not pq_enabled(): pytest.skip("PQ not enabled") @@ -260,7 +262,9 @@ def test_s2nc_to_awslc_pq_handshake( ids=get_parameter_name, ) def test_s2nd_to_awslc_pq_handshake( - managed_process, s2n_server_policy, awslc_client_group # noqa: F811 + managed_process, + s2n_server_policy, + awslc_client_group, # noqa: F811 ): if not pq_enabled(): pytest.skip("PQ not enabled") diff --git a/tests/integrationv2/test_record_padding.py b/tests/integrationv2/test_record_padding.py index d1c001f15a3..96da3db604a 100644 --- a/tests/integrationv2/test_record_padding.py +++ b/tests/integrationv2/test_record_padding.py @@ -86,7 +86,13 @@ def test_nothing(): @pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name) @pytest.mark.parametrize("padding_size", PADDING_SIZES, ids=get_parameter_name) def test_s2n_server_handles_padded_records( - managed_process, cipher, provider, curve, protocol, certificate, padding_size # noqa: F811 + managed_process, + cipher, + provider, + curve, + protocol, + certificate, + padding_size, # noqa: F811 ): port = next(available_ports) @@ -148,7 +154,13 @@ def test_s2n_server_handles_padded_records( @pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name) @pytest.mark.parametrize("padding_size", PADDING_SIZES, ids=get_parameter_name) def test_s2n_client_handles_padded_records( - managed_process, cipher, provider, curve, protocol, certificate, padding_size # noqa: F811 + managed_process, + cipher, + provider, + curve, + protocol, + certificate, + padding_size, # noqa: F811 ): port = next(available_ports) diff --git a/tests/integrationv2/test_renegotiate.py b/tests/integrationv2/test_renegotiate.py index 5865e55bdb0..ebf3aefc215 100644 --- a/tests/integrationv2/test_renegotiate.py +++ b/tests/integrationv2/test_renegotiate.py @@ -245,7 +245,12 @@ def basic_reneg_test( @pytest.mark.parametrize("protocol", TEST_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_client_ignores_openssl_hello_request( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): (s2n_client, server) = basic_reneg_test( managed_process, cipher, curve, certificate, protocol, provider @@ -277,7 +282,12 @@ def test_s2n_client_ignores_openssl_hello_request( @pytest.mark.parametrize("protocol", TEST_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_client_rejects_openssl_hello_request( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): (s2n_client, server) = basic_reneg_test( managed_process, @@ -311,7 +321,12 @@ def test_s2n_client_rejects_openssl_hello_request( @pytest.mark.parametrize("protocol", TEST_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_client_renegotiate_with_openssl( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): (s2n_client, server) = basic_reneg_test( managed_process, @@ -353,7 +368,12 @@ def test_s2n_client_renegotiate_with_openssl( @pytest.mark.parametrize("protocol", TEST_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_client_renegotiate_with_client_auth_with_openssl( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): # We want to use the same messages to test renegotiation, # but with 'R' instead of 'r' to trigger the Openssl renegotiate request. @@ -413,7 +433,12 @@ def test_s2n_client_renegotiate_with_client_auth_with_openssl( @pytest.mark.parametrize("protocol", TEST_PROTOCOLS, ids=get_parameter_name) @pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name) def test_s2n_client_renegotiate_with_app_data_with_openssl( - managed_process, cipher, curve, certificate, protocol, provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, # noqa: F811 ): first_server_app_data = Msg.expected_output(RENEG_MESSAGES, Provider.ClientMode)[0] (s2n_client, server) = basic_reneg_test( diff --git a/tests/integrationv2/test_serialization.py b/tests/integrationv2/test_serialization.py index 4ce974a3c9d..9ac48f0a076 100644 --- a/tests/integrationv2/test_serialization.py +++ b/tests/integrationv2/test_serialization.py @@ -53,7 +53,11 @@ class Mode(Enum): "version_change", [Mode.Server, Mode.Client], ids=get_parameter_name ) def test_server_serialization_backwards_compat( - managed_process, tmp_path, protocol, mainline_role, version_change # noqa: F811 + managed_process, + tmp_path, + protocol, + mainline_role, + version_change, # noqa: F811 ): server_state_file = str(tmp_path / SERVER_STATE_FILE) client_state_file = str(tmp_path / CLIENT_STATE_FILE) diff --git a/tests/integrationv2/test_session_resumption.py b/tests/integrationv2/test_session_resumption.py index 26c66c8ea44..20f3d2642f4 100644 --- a/tests/integrationv2/test_session_resumption.py +++ b/tests/integrationv2/test_session_resumption.py @@ -250,7 +250,13 @@ def test_tls13_session_resumption_s2n_server( @pytest.mark.parametrize("provider", [OpenSSL, S2N], ids=get_parameter_name) @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name) def test_tls13_session_resumption_s2n_client( - managed_process, cipher, curve, certificate, protocol, provider, other_provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, + other_provider, # noqa: F811 ): port = str(next(available_ports)) @@ -419,7 +425,13 @@ def test_s2nd_falls_back_to_full_connection( @pytest.mark.parametrize("provider", [OpenSSL, S2N], ids=get_parameter_name) @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name) def test_session_resumption_s2n_client_tls13_server_not_tls13( - managed_process, cipher, curve, protocol, provider, other_provider, certificate # noqa: F811 + managed_process, + cipher, + curve, + protocol, + provider, + other_provider, + certificate, # noqa: F811 ): port = next(available_ports) diff --git a/tests/integrationv2/test_sslyze.py b/tests/integrationv2/test_sslyze.py index 0a635be7aa3..db0475c665c 100644 --- a/tests/integrationv2/test_sslyze.py +++ b/tests/integrationv2/test_sslyze.py @@ -358,7 +358,11 @@ def invalid_certificate_scans_parameters(*args, **kwargs): ids=lambda certificate_scan: certificate_scan.name, ) def test_sslyze_certificate_scans( - managed_process, protocol, certificate, provider, certificate_scan # noqa: F811 + managed_process, + protocol, + certificate, + provider, + certificate_scan, # noqa: F811 ): port = next(available_ports) diff --git a/tests/integrationv2/test_version_negotiation.py b/tests/integrationv2/test_version_negotiation.py index 6aa4c586b08..bd74c103410 100644 --- a/tests/integrationv2/test_version_negotiation.py +++ b/tests/integrationv2/test_version_negotiation.py @@ -51,7 +51,13 @@ def invalid_version_negotiation_test_parameters(*args, **kwargs): @pytest.mark.parametrize("provider", [S2N, OpenSSL, GnuTLS], ids=get_parameter_name) @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name) def test_s2nc_tls13_negotiates_tls12( - managed_process, cipher, curve, certificate, protocol, provider, other_provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, + other_provider, # noqa: F811 ): port = next(available_ports) @@ -126,7 +132,13 @@ def test_s2nc_tls13_negotiates_tls12( @pytest.mark.parametrize("provider", [S2N, OpenSSL, GnuTLS], ids=get_parameter_name) @pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name) def test_s2nd_tls13_negotiates_tls12( - managed_process, cipher, curve, certificate, protocol, provider, other_provider # noqa: F811 + managed_process, + cipher, + curve, + certificate, + protocol, + provider, + other_provider, # noqa: F811 ): port = next(available_ports)