1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-18 21:48:13 +00:00
trezor-firmware/trezorlib/tests/device_tests/test_protect_call.py

139 lines
5.3 KiB
Python
Raw Normal View History

# This file is part of the Trezor project.
2017-01-03 18:40:05 +00:00
#
# Copyright (C) 2012-2018 SatoshiLabs and contributors
2017-01-03 18:40:05 +00:00
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License version 3
# as published by the Free Software Foundation.
2017-01-03 18:40:05 +00:00
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the License along with this library.
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
2017-01-03 18:40:05 +00:00
import time
import pytest
from .common import TrezorTest
from trezorlib import messages as proto
from trezorlib.client import PinException, CallException
2014-02-03 23:32:10 +00:00
# FIXME TODO Add passphrase tests
2013-01-14 13:44:11 +00:00
2017-06-23 19:31:42 +00:00
@pytest.mark.skip_t2
class TestProtectCall(TrezorTest):
2014-06-04 15:59:16 +00:00
def _some_protected_call(self, button, pin, passphrase):
2013-01-14 16:05:38 +00:00
# This method perform any call which have protection in the device
2017-06-23 19:31:42 +00:00
res = self.client.ping(
'random data',
button_protection=button,
pin_protection=pin,
passphrase_protection=passphrase
)
assert res == 'random data'
2014-06-04 15:59:16 +00:00
"""
2014-02-15 19:31:34 +00:00
def test_expected_responses(self):
2014-02-17 00:54:54 +00:00
self.setup_mnemonic_pin_passphrase()
2014-02-15 19:31:34 +00:00
# This is low-level test of set_expected_responses()
# feature of debugging client
with self.client:
# Scenario 1 - Received unexpected message
self.client.set_expected_responses([])
with pytest.raises(CallException):
self._some_protected_call(True, True, True)
with self.client:
# Scenario 2 - Received other than expected message
self.client.set_expected_responses([proto.Success()])
with pytest.raises(CallException):
self._some_protected_call(True, True, True)
def scenario3():
with self.client:
# Scenario 3 - Not received expected message
self.client.set_expected_responses([proto.ButtonRequest(),
proto.Success(),
proto.Success()]) # This is expected, but not received
self._some_protected_call(True, False, False)
with pytest.raises(Exception):
scenario3()
with self.client:
# Scenario 4 - Received what expected
self.client.set_expected_responses([proto.ButtonRequest(),
proto.PinMatrixRequest(),
proto.PassphraseRequest(),
proto.Success(message='random data')])
self._some_protected_call(True, True, True)
def scenario5():
with self.client:
# Scenario 5 - Failed message by field filter
self.client.set_expected_responses([proto.ButtonRequest(),
proto.Success(message='wrong data')])
self._some_protected_call(True, True, True)
with pytest.raises(CallException):
scenario5()
2014-06-04 15:59:16 +00:00
"""
2014-02-15 19:31:34 +00:00
2013-01-14 16:05:38 +00:00
def test_no_protection(self):
2014-02-17 00:54:54 +00:00
self.setup_mnemonic_nopin_nopassphrase()
with self.client:
assert self.client.debug.read_pin()[0] is None
self.client.set_expected_responses([proto.Success()])
self._some_protected_call(False, True, True)
2013-01-14 16:05:38 +00:00
2013-09-01 01:35:31 +00:00
def test_pin(self):
2014-02-17 00:54:54 +00:00
self.setup_mnemonic_pin_passphrase()
with self.client:
assert self.client.debug.read_pin()[0] == self.pin4
self.client.setup_debuglink(button=True, pin_correct=True)
self.client.set_expected_responses([proto.ButtonRequest(),
proto.PinMatrixRequest(),
proto.Success()])
self._some_protected_call(True, True, False)
2013-01-14 16:05:38 +00:00
def test_incorrect_pin(self):
2014-02-17 00:54:54 +00:00
self.setup_mnemonic_pin_passphrase()
2013-09-13 03:28:29 +00:00
self.client.setup_debuglink(button=True, pin_correct=False)
with pytest.raises(PinException):
self._some_protected_call(False, True, False)
2013-10-10 15:18:02 +00:00
def test_cancelled_pin(self):
2014-02-17 00:54:54 +00:00
self.setup_mnemonic_pin_passphrase()
self.client.setup_debuglink(button=True, pin_correct=False) # PIN cancel
with pytest.raises(PinException):
self._some_protected_call(False, True, False)
def test_exponential_backoff_with_reboot(self):
2014-02-17 00:54:54 +00:00
self.setup_mnemonic_pin_passphrase()
self.client.setup_debuglink(button=True, pin_correct=False)
2014-02-17 00:54:54 +00:00
def test_backoff(attempts, start):
2016-05-20 15:20:11 +00:00
if attempts <= 1:
expected = 0
2016-05-20 15:20:11 +00:00
else:
2017-12-16 21:37:21 +00:00
expected = (2 ** (attempts - 1)) - 1
got = round(time.time() - start, 2)
msg = "Pin delay expected to be at least %s seconds, got %s" % (expected, got)
2016-05-05 01:16:17 +00:00
print(msg)
assert got >= expected
2014-06-04 15:59:16 +00:00
for attempt in range(1, 6):
start = time.time()
with pytest.raises(PinException):
self._some_protected_call(False, True, False)
test_backoff(attempt, start)