ut_dep.py 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. #!/usr/bin/env python3
  2. """
  3. test.unit_tests_d.ut_dep: dependency unit tests for the MMGen suite
  4. Test whether dependencies are installed and functional.
  5. No data verification is performed.
  6. """
  7. from subprocess import run,PIPE
  8. from mmgen.common import *
  9. from mmgen.exception import NoLEDSupport
  10. from ..include.common import check_solc_ver
  11. class unit_tests:
  12. altcoin_deps = ('pysha3','py_ecc','solc')
  13. win_skip = ('aiohttp','pysha3','led')
  14. def led(self,name,ut):
  15. from mmgen.led import LEDControl
  16. try:
  17. LEDControl(enabled=True)
  18. except NoLEDSupport:
  19. ymsg('Warning: no LED support on this platform')
  20. else:
  21. gmsg('LED support found!')
  22. return True
  23. def pysha3(self,name,ut): # ETH,XMR
  24. from sha3 import keccak_256
  25. return True
  26. def py_ecc(self,name,ut): # ETH
  27. from py_ecc.secp256k1 import privtopub
  28. return True
  29. def pysocks(self,name,ut):
  30. import requests,urllib3
  31. urllib3.disable_warnings()
  32. session = requests.Session()
  33. session.proxies.update({'https':'socks5h://127.243.172.8:20677'})
  34. try:
  35. session.get('https://127.188.29.17')
  36. except Exception as e:
  37. if type(e).__name__ == 'ConnectionError':
  38. return True
  39. else:
  40. print(e)
  41. return False
  42. def secp256k1(self,name,ut):
  43. from mmgen.secp256k1 import priv2pub
  44. priv2pub(bytes.fromhex('deadbeef'*8),1)
  45. return True
  46. def cryptography(self,name,ut):
  47. from cryptography.hazmat.primitives.ciphers import Cipher,algorithms,modes
  48. from cryptography.hazmat.backends import default_backend
  49. c = Cipher(algorithms.AES(b'deadbeef'*4),modes.CTR(b'deadbeef'*2),backend=default_backend())
  50. encryptor = c.encryptor()
  51. enc_data = encryptor.update(b'foo') + encryptor.finalize()
  52. return True
  53. def ecdsa(self,name,ut):
  54. import ecdsa
  55. pko = ecdsa.SigningKey.from_secret_exponent(12345678901234,curve=ecdsa.SECP256k1)
  56. pubkey = pko.get_verifying_key().to_string().hex()
  57. return True
  58. def ripemd160(self,name,ut):
  59. import hashlib
  60. if hashlib.new.__name__ == 'hashlib_new_wrapper':
  61. ymsg('Warning: RIPEMD160 missing in hashlib, falling back on pure-Python implementation')
  62. hashlib.new('ripemd160')
  63. return True
  64. def gmpy(self,name,ut):
  65. from gmpy2 import context,set_context,sqrt,cbrt
  66. # context() parameters are platform-dependent!
  67. set_context(context(precision=75,round=1)) # OK for gmp 6.1.2 / gmpy 2.1.0
  68. return True
  69. def aiohttp(self,name,ut):
  70. import asyncio,aiohttp
  71. async def do():
  72. async with aiohttp.ClientSession(
  73. headers = { 'Content-Type': 'application/json' },
  74. connector = aiohttp.TCPConnector(),
  75. ) as session:
  76. pass
  77. asyncio.run(do())
  78. return True
  79. def pexpect(self,name,ut):
  80. import pexpect
  81. from pexpect.popen_spawn import PopenSpawn
  82. return True
  83. def scrypt(self,name,ut):
  84. passwd,salt = b'foo',b'bar'
  85. N,r,p = 4,8,16
  86. buflen = 64
  87. import scrypt
  88. scrypt.hash(passwd, salt, N=2**N, r=r, p=p, buflen=buflen)
  89. from hashlib import scrypt # max N == 14!!
  90. scrypt(password=passwd,salt=salt,n=2**N,r=r,p=p,maxmem=0,dklen=buflen)
  91. return True
  92. def solc(self,name,ut):
  93. from mmgen.protocol import init_proto
  94. solc_ok = check_solc_ver()
  95. if solc_ok:
  96. cmd = [
  97. 'python3',
  98. 'scripts/create-token.py',
  99. '--coin=ETH',
  100. '--name=My Fake Token',
  101. '--symbol=FAKE',
  102. '--supply=100000000000000000000000000',
  103. '--decimals=18',
  104. '--stdout',
  105. init_proto('eth').checksummed_addr('deadbeef'*5),
  106. ]
  107. cp = run(cmd,stdout=PIPE,stderr=PIPE)
  108. vmsg(cp.stderr.decode())
  109. if cp.returncode:
  110. msg(cp.stderr.decode())
  111. return False
  112. return True