ut_dep.py 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126
  1. #!/usr/bin/env python3
  2. """
  3. test.unit_tests_d.ut_dep: dependency unit tests for the MMGen suite
  4. Test whether dependencies are installed and functional.
  5. No data verification is performed.
  6. """
  7. from subprocess import run,PIPE
  8. from mmgen.common import *
  9. from mmgen.exception import NoLEDSupport
  10. from ..include.common import check_solc_ver
  11. class unit_tests:
  12. altcoin_deps = ('pysha3','py_ecc','solc')
  13. win_skip = ('aiohttp','pysha3','led')
  14. def led(self,name,ut):
  15. from mmgen.led import LEDControl
  16. try:
  17. LEDControl(enabled=True)
  18. except NoLEDSupport:
  19. ymsg('Warning: no LED support on this platform')
  20. else:
  21. gmsg('LED support found!')
  22. return True
  23. def pysha3(self,name,ut): # ETH,XMR
  24. from sha3 import keccak_256
  25. return True
  26. def py_ecc(self,name,ut): # ETH
  27. from py_ecc.secp256k1 import privtopub
  28. return True
  29. def pysocks(self,name,ut):
  30. import requests,urllib3
  31. urllib3.disable_warnings()
  32. session = requests.Session()
  33. session.proxies.update({'https':'socks5h://127.243.172.8:20677'})
  34. try:
  35. session.get('https://127.188.29.17')
  36. except Exception as e:
  37. if type(e).__name__ == 'ConnectionError':
  38. return True
  39. else:
  40. print(e)
  41. return False
  42. def secp256k1(self,name,ut):
  43. from mmgen.secp256k1 import priv2pub
  44. priv2pub(bytes.fromhex('deadbeef'*8),1)
  45. return True
  46. def cryptography(self,name,ut):
  47. from cryptography.hazmat.primitives.ciphers import Cipher,algorithms,modes
  48. from cryptography.hazmat.backends import default_backend
  49. c = Cipher(algorithms.AES(b'deadbeef'*4),modes.CTR(b'deadbeef'*2),backend=default_backend())
  50. encryptor = c.encryptor()
  51. enc_data = encryptor.update(b'foo') + encryptor.finalize()
  52. return True
  53. def ecdsa(self,name,ut):
  54. import ecdsa
  55. pko = ecdsa.SigningKey.from_secret_exponent(12345678901234,curve=ecdsa.SECP256k1)
  56. pubkey = pko.get_verifying_key().to_string().hex()
  57. return True
  58. def gmpy(self,name,ut):
  59. from gmpy2 import context,set_context,sqrt,cbrt
  60. # context() parameters are platform-dependent!
  61. set_context(context(precision=75,round=1)) # OK for gmp 6.1.2 / gmpy 2.1.0
  62. return True
  63. def aiohttp(self,name,ut):
  64. import asyncio,aiohttp
  65. async def do():
  66. async with aiohttp.ClientSession(
  67. headers = { 'Content-Type': 'application/json' },
  68. connector = aiohttp.TCPConnector(),
  69. ) as session:
  70. pass
  71. asyncio.run(do())
  72. return True
  73. def pexpect(self,name,ut):
  74. import pexpect
  75. from pexpect.popen_spawn import PopenSpawn
  76. return True
  77. def scrypt(self,name,ut):
  78. passwd,salt = b'foo',b'bar'
  79. N,r,p = 4,8,16
  80. buflen = 64
  81. import scrypt
  82. scrypt.hash(passwd, salt, N=2**N, r=r, p=p, buflen=buflen)
  83. from hashlib import scrypt # max N == 14!!
  84. scrypt(password=passwd,salt=salt,n=2**N,r=r,p=p,maxmem=0,dklen=buflen)
  85. return True
  86. def solc(self,name,ut):
  87. from mmgen.protocol import init_proto
  88. solc_ok = check_solc_ver()
  89. if solc_ok:
  90. cmd = [
  91. 'python3',
  92. 'scripts/create-token.py',
  93. '--coin=ETH',
  94. '--name=My Fake Token',
  95. '--symbol=FAKE',
  96. '--supply=100000000000000000000000000',
  97. '--decimals=18',
  98. '--stdout',
  99. init_proto('eth').checksummed_addr('deadbeef'*5),
  100. ]
  101. cp = run(cmd,stdout=PIPE,stderr=PIPE)
  102. vmsg(cp.stderr.decode())
  103. if cp.returncode:
  104. msg(cp.stderr.decode())
  105. return False
  106. return True