1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-12-29 09:38:08 +00:00
trezor-firmware/tests/device_tests/test_msg_cipherkeyvalue.py

193 lines
5.6 KiB
Python
Raw Normal View History

# This file is part of the Trezor project.
2017-01-03 18:40:05 +00:00
#
2019-05-29 16:44:09 +00:00
# Copyright (C) 2012-2019 SatoshiLabs and contributors
2017-01-03 18:40:05 +00:00
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License version 3
# as published by the Free Software Foundation.
2017-01-03 18:40:05 +00:00
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the License along with this library.
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
import pytest
2017-01-03 18:40:05 +00:00
2018-08-10 12:04:58 +00:00
from trezorlib import misc
2014-06-07 17:48:52 +00:00
2018-08-13 16:21:24 +00:00
from .common import TrezorTest
2014-06-07 17:48:52 +00:00
class TestMsgCipherkeyvalue(TrezorTest):
2014-06-07 17:48:52 +00:00
def test_encrypt(self):
self.setup_mnemonic_nopin_nopassphrase()
# different ask values
2018-08-13 16:21:24 +00:00
res = misc.encrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
b"testing message!",
ask_on_encrypt=True,
ask_on_decrypt=True,
)
2018-09-12 18:34:26 +00:00
assert res.hex() == "676faf8f13272af601776bc31bc14e8f"
2018-08-13 16:21:24 +00:00
res = misc.encrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
b"testing message!",
ask_on_encrypt=True,
ask_on_decrypt=False,
)
2018-09-12 18:34:26 +00:00
assert res.hex() == "5aa0fbcb9d7fa669880745479d80c622"
2018-08-13 16:21:24 +00:00
res = misc.encrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
b"testing message!",
ask_on_encrypt=False,
ask_on_decrypt=True,
)
2018-09-12 18:34:26 +00:00
assert res.hex() == "958d4f63269b61044aaedc900c8d6208"
2018-08-13 16:21:24 +00:00
res = misc.encrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
b"testing message!",
ask_on_encrypt=False,
ask_on_decrypt=False,
)
2018-09-12 18:34:26 +00:00
assert res.hex() == "e0cf0eb0425947000eb546cc3994bc6c"
2014-06-07 17:48:52 +00:00
# different key
2018-08-13 16:21:24 +00:00
res = misc.encrypt_keyvalue(
self.client,
[0, 1, 2],
b"test2",
b"testing message!",
ask_on_encrypt=True,
ask_on_decrypt=True,
)
2018-09-12 18:34:26 +00:00
assert res.hex() == "de247a6aa6be77a134bb3f3f925f13af"
2014-06-07 17:48:52 +00:00
# different message
2018-08-13 16:21:24 +00:00
res = misc.encrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
b"testing message! it is different",
ask_on_encrypt=True,
ask_on_decrypt=True,
)
assert (
2018-09-12 18:34:26 +00:00
res.hex()
== "676faf8f13272af601776bc31bc14e8f3ae1c88536bf18f1b44f1e4c2c4a613d"
2018-08-13 16:21:24 +00:00
)
2014-06-07 17:48:52 +00:00
# different path
2018-08-13 16:21:24 +00:00
res = misc.encrypt_keyvalue(
self.client,
[0, 1, 3],
b"test",
b"testing message!",
ask_on_encrypt=True,
ask_on_decrypt=True,
)
2018-09-12 18:34:26 +00:00
assert res.hex() == "b4811a9d492f5355a5186ddbfccaae7b"
2014-06-07 17:48:52 +00:00
def test_decrypt(self):
self.setup_mnemonic_nopin_nopassphrase()
# different ask values
2018-08-13 16:21:24 +00:00
res = misc.decrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
2018-09-12 18:34:26 +00:00
bytes.fromhex("676faf8f13272af601776bc31bc14e8f"),
2018-08-13 16:21:24 +00:00
ask_on_encrypt=True,
ask_on_decrypt=True,
)
assert res == b"testing message!"
res = misc.decrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
2018-09-12 18:34:26 +00:00
bytes.fromhex("5aa0fbcb9d7fa669880745479d80c622"),
2018-08-13 16:21:24 +00:00
ask_on_encrypt=True,
ask_on_decrypt=False,
)
assert res == b"testing message!"
res = misc.decrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
2018-09-12 18:34:26 +00:00
bytes.fromhex("958d4f63269b61044aaedc900c8d6208"),
2018-08-13 16:21:24 +00:00
ask_on_encrypt=False,
ask_on_decrypt=True,
)
assert res == b"testing message!"
res = misc.decrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
2018-09-12 18:34:26 +00:00
bytes.fromhex("e0cf0eb0425947000eb546cc3994bc6c"),
2018-08-13 16:21:24 +00:00
ask_on_encrypt=False,
ask_on_decrypt=False,
)
assert res == b"testing message!"
2014-06-07 17:48:52 +00:00
# different key
2018-08-13 16:21:24 +00:00
res = misc.decrypt_keyvalue(
self.client,
[0, 1, 2],
b"test2",
2018-09-12 18:34:26 +00:00
bytes.fromhex("de247a6aa6be77a134bb3f3f925f13af"),
2018-08-13 16:21:24 +00:00
ask_on_encrypt=True,
ask_on_decrypt=True,
)
assert res == b"testing message!"
2014-06-07 17:48:52 +00:00
# different message
2018-08-13 16:21:24 +00:00
res = misc.decrypt_keyvalue(
self.client,
[0, 1, 2],
b"test",
2018-09-12 18:34:26 +00:00
bytes.fromhex(
2018-08-13 16:21:24 +00:00
"676faf8f13272af601776bc31bc14e8f3ae1c88536bf18f1b44f1e4c2c4a613d"
),
ask_on_encrypt=True,
ask_on_decrypt=True,
)
assert res == b"testing message! it is different"
2014-06-07 17:48:52 +00:00
# different path
2018-08-13 16:21:24 +00:00
res = misc.decrypt_keyvalue(
self.client,
[0, 1, 3],
b"test",
2018-09-12 18:34:26 +00:00
bytes.fromhex("b4811a9d492f5355a5186ddbfccaae7b"),
2018-08-13 16:21:24 +00:00
ask_on_encrypt=True,
ask_on_decrypt=True,
)
assert res == b"testing message!"
2014-06-07 17:48:52 +00:00
def test_encrypt_badlen(self):
self.setup_mnemonic_nopin_nopassphrase()
with pytest.raises(Exception):
2018-08-10 12:04:58 +00:00
misc.encrypt_keyvalue(self.client, [0, 1, 2], b"test", b"testing")
2014-06-07 17:48:52 +00:00
def test_decrypt_badlen(self):
self.setup_mnemonic_nopin_nopassphrase()
with pytest.raises(Exception):
2018-08-10 12:04:58 +00:00
misc.decrypt_keyvalue(self.client, [0, 1, 2], b"test", b"testing")