1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-21 23:18:13 +00:00
trezor-firmware/tests/device_tests/test_msg_changepin_t1.py

214 lines
6.7 KiB
Python
Raw Permalink Normal View History

# This file is part of the Trezor project.
2017-01-03 18:40:05 +00:00
#
2019-05-29 16:44:09 +00:00
# Copyright (C) 2012-2019 SatoshiLabs and contributors
2017-01-03 18:40:05 +00:00
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License version 3
# as published by the Free Software Foundation.
2017-01-03 18:40:05 +00:00
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the License along with this library.
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
import pytest
2017-01-03 18:40:05 +00:00
2020-04-27 14:37:16 +00:00
from trezorlib import device, messages
from trezorlib.client import MAX_PIN_LENGTH
from trezorlib.debuglink import TrezorClientDebugLink as Client
2020-04-27 14:37:16 +00:00
from trezorlib.exceptions import TrezorFailure
2017-06-23 19:31:42 +00:00
from ..common import get_test_address
2019-09-11 12:29:39 +00:00
PIN4 = "1234"
PIN6 = "789456"
PIN_MAX = "".join(chr((i % 9) + ord("1")) for i in range(MAX_PIN_LENGTH))
PIN_TOO_LONG = PIN_MAX + "1"
2014-02-21 03:46:33 +00:00
pytestmark = pytest.mark.models("legacy")
2020-04-27 14:37:16 +00:00
def _check_pin(client: Client, pin):
client.lock()
2020-04-27 14:37:16 +00:00
with client:
client.use_pin_sequence([pin])
client.set_expected_responses([messages.PinMatrixRequest, messages.Address])
get_test_address(client)
2020-04-27 14:37:16 +00:00
def _check_no_pin(client: Client):
client.lock()
2020-04-27 14:37:16 +00:00
with client:
client.set_expected_responses([messages.Address])
get_test_address(client)
2020-04-27 14:37:16 +00:00
def test_set_pin(client: Client):
2020-04-27 14:37:16 +00:00
assert client.features.pin_protection is False
# Check that there's no PIN protection
_check_no_pin(client)
# Let's set new PIN
with client:
client.use_pin_sequence([PIN_MAX, PIN_MAX])
2020-04-27 14:37:16 +00:00
client.set_expected_responses(
[
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
messages.PinMatrixRequest,
messages.PinMatrixRequest,
messages.Success,
messages.Features,
2020-04-27 14:37:16 +00:00
]
)
device.change_pin(client)
# Check that there's PIN protection now
assert client.features.pin_protection is True
# Check that the PIN is correct
_check_pin(client, PIN_MAX)
2020-04-27 14:37:16 +00:00
@pytest.mark.setup_client(pin=PIN4)
def test_change_pin(client: Client):
2020-04-27 14:37:16 +00:00
assert client.features.pin_protection is True
# Check that there's PIN protection
_check_pin(client, PIN4)
# Let's change PIN
with client:
client.use_pin_sequence([PIN4, PIN_MAX, PIN_MAX])
2020-04-27 14:37:16 +00:00
client.set_expected_responses(
[
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
messages.PinMatrixRequest,
messages.PinMatrixRequest,
messages.PinMatrixRequest,
messages.Success,
messages.Features,
2020-04-27 14:37:16 +00:00
]
)
device.change_pin(client)
# Check that there's still PIN protection now
assert client.features.pin_protection is True
# Check that the PIN is correct
_check_pin(client, PIN_MAX)
2020-04-27 14:37:16 +00:00
@pytest.mark.setup_client(pin=PIN4)
def test_remove_pin(client: Client):
2020-04-27 14:37:16 +00:00
assert client.features.pin_protection is True
# Check that there's PIN protection
_check_pin(client, PIN4)
# Let's remove PIN
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
[
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
messages.PinMatrixRequest,
messages.Success,
messages.Features,
2020-04-27 14:37:16 +00:00
]
)
device.change_pin(client, remove=True)
# Check that there's no PIN protection now
assert client.features.pin_protection is False
_check_no_pin(client)
def test_set_mismatch(client: Client):
2020-04-27 14:37:16 +00:00
assert client.features.pin_protection is False
# Check that there's no PIN protection
_check_no_pin(client)
# Let's set new PIN
with pytest.raises(TrezorFailure, match="PIN mismatch"), client:
# use different PINs for first and second attempt. This will fail.
client.use_pin_sequence([PIN4, PIN_MAX])
2020-04-27 14:37:16 +00:00
client.set_expected_responses(
[
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
messages.PinMatrixRequest,
messages.PinMatrixRequest,
messages.Failure,
2020-04-27 14:37:16 +00:00
]
)
device.change_pin(client)
# Check that there's still no PIN protection now
client.init_device()
assert client.features.pin_protection is False
_check_no_pin(client)
@pytest.mark.setup_client(pin=PIN4)
def test_change_mismatch(client: Client):
2020-04-27 14:37:16 +00:00
assert client.features.pin_protection is True
# Let's set new PIN
with pytest.raises(TrezorFailure, match="PIN mismatch"), client:
client.use_pin_sequence([PIN4, PIN6, PIN6 + "3"])
client.set_expected_responses(
[
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
messages.PinMatrixRequest,
messages.PinMatrixRequest,
messages.PinMatrixRequest,
messages.Failure,
2020-04-27 14:37:16 +00:00
]
)
device.change_pin(client)
# Check that there's still old PIN protection
client.init_device()
assert client.features.pin_protection is True
_check_pin(client, PIN4)
@pytest.mark.parametrize("invalid_pin", ("1204", "", PIN_TOO_LONG))
def test_set_invalid(client: Client, invalid_pin):
2020-04-27 14:37:16 +00:00
assert client.features.pin_protection is False
# Let's set an invalid PIN
ret = client.call_raw(messages.ChangePin())
assert isinstance(ret, messages.ButtonRequest)
# Press button
client.debug.press_yes()
ret = client.call_raw(messages.ButtonAck())
# Send a PIN containing an invalid digit
assert isinstance(ret, messages.PinMatrixRequest)
ret = client.call_raw(messages.PinMatrixAck(pin=invalid_pin))
# Ensure the invalid PIN is detected
assert isinstance(ret, messages.Failure)
# Check that there's still no PIN protection now
client.init_device()
assert client.features.pin_protection is False
_check_no_pin(client)
@pytest.mark.parametrize("invalid_pin", ("1204", "", PIN_TOO_LONG))
2020-04-27 14:37:16 +00:00
@pytest.mark.setup_client(pin=PIN4)
def test_enter_invalid(client: Client, invalid_pin):
2020-04-27 14:37:16 +00:00
assert client.features.pin_protection is True
# use an invalid PIN
ret = client.call_raw(messages.GetAddress())
# Send a PIN containing an invalid digit
assert isinstance(ret, messages.PinMatrixRequest)
ret = client.call_raw(messages.PinMatrixAck(pin=invalid_pin))
# Ensure the invalid PIN is detected
assert isinstance(ret, messages.Failure)