from armoryengine.PyBtcAddress import PyBtcAddress sys.argv.append('--nologging') INIT_VECTOR = '77'*16 TEST_ADDR1_PRIV_KEY_ENCR1 = '500c41607d79c766859e6d9726ef1ea0fdf095922f3324454f6c4c34abcb23a5' TEST_ADDR1_PRIV_KEY_ENCR2 = '7966cf5886494246cc5aaf7f1a4a2777cd6126612e7029d79ef9df47f6d6927d' TEST_ADDR1_PRIV_KEY_ENCR3 = '0db5c1e9a8d1ebc0525bdb534626033b948804a9a34871d67bf58a3df11d6888' TEST_ADDR1_PRIV_KEY_ENCR4 = '5db1314a20ae9fc978477ab3fe16ab17b246d813a541ecdd4143fcf082b19407' TEST_PUB_KEY1 = '046c35e36776e997883ad4269dcc0696b10d68f6864ae73b8ad6ad03e879e43062a0139095ece3bd653b809fa7e8c7d78ffe6fac75a84c8283d8a000890bfc879d' # Create an address to use for all subsequent tests PRIVATE_KEY = SecureBinaryData(hex_to_binary('aa'*32)) PRIVATE_CHECKSUM = PRIVATE_KEY.getHash256()[:4] PUBLIC_KEY = CryptoECDSA().ComputePublicKey(PRIVATE_KEY) ADDRESS_20 = PUBLIC_KEY.getHash160() TEST_BLOCK_NUM = 100 # We pretend that we plugged some passphrases through a KDF FAKE_KDF_OUTPUT1 = SecureBinaryData( hex_to_binary('11'*32) ) FAKE_KDF_OUTPUT2 = SecureBinaryData( hex_to_binary('22'*32) ) class PyBtcAddressTest(TiabTest): # TODO: This test needs more verification of the results. def testEncryptedAddress(self):