ut_dep.py 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100
  1. #!/usr/bin/env python3
  2. """
  3. test.unit_tests_d.ut_dep: dependency unit tests for the MMGen suite
  4. Test whether dependencies are installed and functional.
  5. No data verification is performed.
  6. """
  7. from mmgen.common import *
  8. class unit_tests:
  9. altcoin_deps = ('pysha3','py_ecc')
  10. win_skip = ('aiohttp','pysha3','led')
  11. def led(self,name,ut):
  12. from mmgen.led import LEDControl
  13. try:
  14. LEDControl(enabled=True)
  15. except NoLEDSupport:
  16. ymsg('Warning: no LED support on this platform')
  17. else:
  18. gmsg('LED support found!')
  19. return True
  20. def pysha3(self,name,ut): # ETH,XMR
  21. from sha3 import keccak_256
  22. return True
  23. def py_ecc(self,name,ut): # ETH
  24. from py_ecc.secp256k1 import privtopub
  25. return True
  26. def pysocks(self,name,ut):
  27. import requests,urllib3
  28. urllib3.disable_warnings()
  29. session = requests.Session()
  30. session.proxies.update({'https':'socks5h://127.243.172.8:20677'})
  31. try:
  32. session.get('https://127.188.29.17')
  33. except Exception as e:
  34. if type(e).__name__ == 'ConnectionError':
  35. return True
  36. else:
  37. print(e)
  38. return False
  39. def secp256k1(self,name,ut):
  40. from mmgen.secp256k1 import priv2pub
  41. priv2pub(bytes.fromhex('deadbeef'*8),1)
  42. return True
  43. def cryptography(self,name,ut):
  44. from cryptography.hazmat.primitives.ciphers import Cipher,algorithms,modes
  45. from cryptography.hazmat.backends import default_backend
  46. c = Cipher(algorithms.AES(b'deadbeef'*4),modes.CTR(b'deadbeef'*2),backend=default_backend())
  47. encryptor = c.encryptor()
  48. enc_data = encryptor.update(b'foo') + encryptor.finalize()
  49. return True
  50. def ecdsa(self,name,ut):
  51. import ecdsa
  52. pko = ecdsa.SigningKey.from_secret_exponent(12345678901234,curve=ecdsa.SECP256k1)
  53. pubkey = pko.get_verifying_key().to_string().hex()
  54. return True
  55. def gmpy(self,name,ut):
  56. from gmpy2 import context,set_context,sqrt,cbrt
  57. # context() parameters are platform-dependent!
  58. set_context(context(precision=75,round=1)) # OK for gmp 6.1.2 / gmpy 2.1.0
  59. return True
  60. def aiohttp(self,name,ut):
  61. import asyncio,aiohttp
  62. async def do():
  63. async with aiohttp.ClientSession(
  64. headers = { 'Content-Type': 'application/json' },
  65. connector = aiohttp.TCPConnector(),
  66. ) as session:
  67. pass
  68. asyncio.run(do())
  69. return True
  70. def pexpect(self,name,ut):
  71. import pexpect
  72. from pexpect.popen_spawn import PopenSpawn
  73. return True
  74. def scrypt(self,name,ut):
  75. passwd,salt = b'foo',b'bar'
  76. N,r,p = 4,8,16
  77. buflen = 64
  78. import scrypt
  79. scrypt.hash(passwd, salt, N=2**N, r=r, p=p, buflen=buflen)
  80. from hashlib import scrypt # max N == 14!!
  81. scrypt(password=passwd,salt=salt,n=2**N,r=r,p=p,maxmem=0,dklen=buflen)
  82. return True