1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-30 03:18:20 +00:00
trezor-firmware/tests/device_tests/bitcoin/test_signtx.py

1670 lines
60 KiB
Python
Raw Normal View History

# This file is part of the Trezor project.
2017-01-03 18:40:05 +00:00
#
2019-05-29 16:44:09 +00:00
# Copyright (C) 2012-2019 SatoshiLabs and contributors
2017-01-03 18:40:05 +00:00
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License version 3
# as published by the Free Software Foundation.
2017-01-03 18:40:05 +00:00
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the License along with this library.
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
2017-01-03 18:40:05 +00:00
from datetime import datetime, timezone
import pytest
2018-04-18 13:53:40 +00:00
from trezorlib import btc, device, messages
2024-11-15 16:31:22 +00:00
from trezorlib.debuglink import SessionDebugWrapper as Session
from trezorlib.exceptions import Cancelled, TrezorFailure
from trezorlib.tools import H_, parse_path
2018-08-13 16:21:24 +00:00
from ...common import is_core
2023-05-04 12:18:55 +00:00
from ...input_flows import (
InputFlowLockTimeBlockHeight,
InputFlowLockTimeDatetime,
InputFlowSignTxHighFee,
InputFlowSignTxInformation,
InputFlowSignTxInformationCancel,
InputFlowSignTxInformationMixed,
InputFlowSignTxInformationReplacement,
2023-05-04 12:18:55 +00:00
)
from ...tx_cache import TxCache
from .signtx import (
assert_tx_matches,
request_finished,
request_input,
request_meta,
request_output,
)
2020-08-03 11:37:12 +00:00
B = messages.ButtonRequestType
TX_CACHE_TESTNET = TxCache("Testnet")
TX_CACHE_MAINNET = TxCache("Bitcoin")
2014-04-10 13:22:01 +00:00
2018-09-12 18:34:26 +00:00
TXHASH_157041 = bytes.fromhex(
"1570416eb4302cf52979afd5e6909e37d8fdd874301f7cc87e547e509cb1caa6"
)
TXHASH_d5f65e = bytes.fromhex(
"d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882"
)
FAKE_TXHASH_005f6f = bytes.fromhex( # FAKE transaction (coinbase)
"005f6f7ff4b70aa09a15b3bc36607d378fad104c4efa4f0a1c8e970538622b3e"
2018-09-12 18:34:26 +00:00
)
TXHASH_d2dcda = bytes.fromhex(
"d2dcdaf547ea7f57a713c607f15e883ddc4a98167ee2c43ed953c53cb5153e24"
)
TXHASH_e5040e = bytes.fromhex(
"e5040e1bc1ae7667ffb9e5248e90b2fb93cd9150234151ce90e14ab2f5933bcd"
)
TXHASH_ec5194 = bytes.fromhex(
"ec519494bea3746bd5fbdd7a15dac5049a873fa674c67e596d46505b9b835425"
)
2018-09-12 18:34:26 +00:00
TXHASH_50f6f1 = bytes.fromhex(
"50f6f1209ca92d7359564be803cb2c932cde7d370f7cee50fd1fad6790f6206d"
)
TXHASH_2bac7a = bytes.fromhex(
"2bac7ad1dec654579a71ea9555463f63ac7b7df9d8ba67b4682bba4e514d0f0c"
)
TXHASH_bb5169 = bytes.fromhex(
"bb5169091f09e833e155b291b662019df56870effe388c626221c5ea84274bc4"
)
TXHASH_0dac36 = bytes.fromhex(
"0dac366fd8a67b2a89fbb0d31086e7acded7a5bbf9ef9daa935bc873229ef5b5"
)
TXHASH_ac4ca0 = bytes.fromhex(
"ac4ca0e7827a1228f44449cb57b4b9a809a667ca044dc43bb124627fed4bc10a"
)
TXHASH_58d56a = bytes.fromhex(
"58d56a5d1325cf83543ee4c87fd73a784e4ba1499ced574be359fa2bdcb9ac8e"
)
TXHASH_301948 = bytes.fromhex(
"3019487f064329247daad245aed7a75349d09c14b1d24f170947690e030f5b20"
)
TXHASH_892d06 = bytes.fromhex(
"892d06cb3394b8e6006eec9a2aa90692b718a29be6844b6c6a9e89ec3aa6aac4"
)
TXHASH_074b00 = bytes.fromhex(
"074b0070939db4c2635c1bef0c8e68412ccc8d3c8782137547c7a2bbde073fc0"
)
TXHASH_25fee5 = bytes.fromhex(
"25fee583181847cbe9d9fd9a483a8b8626c99854a72d01de848ef40508d0f3bc"
)
TXHASH_1f326f = bytes.fromhex(
"1f326f65768d55ef146efbb345bd87abe84ac7185726d0457a026fc347a26ef3"
)
TXHASH_334cd7 = bytes.fromhex(
"334cd7ad982b3b15d07dd1c84e939e95efb0803071648048a7f289492e7b4c8a"
)
TXHASH_5e7667 = bytes.fromhex(
"5e7667690076ae4737e2f872005de6f6b57592f32108ed9b301eeece6de24ad6"
)
TXHASH_efaa41 = bytes.fromhex(
"efaa41ff3e67edf508846c1a1ed56894cfd32725c590300108f40c9edc1aac35"
)
2017-05-15 12:14:45 +00:00
CORNER_BUTTON = (215, 25)
2024-11-15 16:31:22 +00:00
def test_one_one_fee(session: Session):
# input tx: 0dac366fd8a67b2a89fbb0d31086e7acded7a5bbf9ef9daa935bc873229ef5b5
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/5h/0/9"), # 1H2CRJBrDMhkvCGZMW7T4oQwYbL8eVuh7p
amount=63_988,
prev_hash=TXHASH_0dac36,
prev_index=0,
)
out1 = messages.TxOutputType(
address="13Hbso8zgV5Wmqn3uA7h3QVtmPzs47wcJ7",
amount=50_248,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2014-04-17 14:37:09 +00:00
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_0dac36),
request_input(0, TXHASH_0dac36),
request_output(0, TXHASH_0dac36),
request_output(1, TXHASH_0dac36),
request_input(0),
request_output(0),
request_output(0),
request_finished(),
]
2018-08-13 16:21:24 +00:00
)
2014-04-17 14:37:09 +00:00
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Bitcoin", [inp1], [out1], prev_txes=TX_CACHE_MAINNET
2017-06-23 19:31:42 +00:00
)
assert_tx_matches(
serialized_tx,
hash_link="https://btc1.trezor.io/api/tx/b893aeed4b12227b6f5348d7f6cb84ba2cda2ba70a41933a25f363b9d2fc2cf9",
tx_hex="0100000001b5f59e2273c85b93aa9deff9bba5d7deace78610d3b0fb892a7ba6d86f36ac0d000000006b483045022100dd4dd136a70371bc9884c3c51fd52f4aed9ab8ee98f3ac7367bb19e6538096e702200c56be09c4359fc7eb494b4bdf8f2b72706b0575c4021373345b593e9661c7b6012103d7f3a07085bee09697cf03125d5c8760dfed65403dba787f1d1d8b1251af2cbeffffffff0148c40000000000001976a91419140511436e947448be994ab7fda9f98623e68e88ac00000000",
)
2017-06-23 19:31:42 +00:00
2014-04-17 14:37:09 +00:00
2024-11-15 16:31:22 +00:00
def test_testnet_one_two_fee(session: Session):
# input tx: e5040e1bc1ae7667ffb9e5248e90b2fb93cd9150234151ce90e14ab2f5933bcd
2018-08-13 16:21:24 +00:00
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/0"), # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
amount=31_000_000,
prev_hash=TXHASH_e5040e,
prev_index=0,
)
2014-04-17 14:37:09 +00:00
out1 = messages.TxOutputType(
address="msj42CCGruhRsFrGATiUuh25dtxYtnpbTx", # looks like an old faucet
amount=30_090_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2017-06-23 19:31:42 +00:00
out2 = messages.TxOutputType(
address_n=parse_path("m/44h/1h/0h/1/0"), # mm6kLYbGEL1tGe4ZA8xacfgRPdW1NLjCbZ
amount=900_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2017-06-23 19:31:42 +00:00
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
request_output(1),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_e5040e),
request_input(0, TXHASH_e5040e),
request_output(0, TXHASH_e5040e),
request_output(1, TXHASH_e5040e),
request_input(0),
request_output(0),
request_output(1),
request_output(0),
request_output(1),
request_finished(),
]
2017-06-23 19:31:42 +00:00
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", [inp1], [out1, out2], prev_txes=TX_CACHE_TESTNET
2018-08-13 16:21:24 +00:00
)
2014-04-17 14:37:09 +00:00
assert_tx_matches(
serialized_tx,
hash_link="https://tbtc1.trezor.io/api/tx/87be0736f202f7c2bff0781b42bad3e0cdcb54761939da69ea793a3735552c56",
tx_hex="0100000001cd3b93f5b24ae190ce5141235091cd93fbb2908e24e5b9ff6776aec11b0e04e5000000006b483045022100eba3bbcbb82ab1ebac88a394e8fb53b0263dadbb3e8072f0a21ee62818c911060220686a9b7f306d028b54a228b5c47cc6c27b1d01a3b0770440bcc64d55d8bace2c0121030e669acac1f280d1ddf441cd2ba5e97417bf2689e4bbec86df4f831bf9f7ffd0ffffffff021023cb01000000001976a91485eb47fe98f349065d6f044e27a4ac541af79ee288aca0bb0d00000000001976a9143d3cca567e00a04819742b21a696a67da796498b88ac00000000",
)
2014-04-17 14:37:09 +00:00
2017-06-23 19:31:42 +00:00
2024-11-15 16:31:22 +00:00
def test_testnet_fee_high_warning(session: Session):
# input tx: 25fee583181847cbe9d9fd9a483a8b8626c99854a72d01de848ef40508d0f3bc
# (The "25fee" tx hash is very suitable for testing high fees)
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/7"), # mgV9Z3YuSbxGb2b2Y1T6VCqtU2osui7vhG
amount=129_999_808,
prev_hash=TXHASH_25fee5,
prev_index=0,
)
2017-06-23 19:31:42 +00:00
out1 = messages.TxOutputType(
address="mnY26FLTzfC94mDoUcyDJh1GVE3LuAUMbs", # "m/44h/1h/0h/0/6"
amount=129_999_808 - 2_500_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2018-08-13 16:21:24 +00:00
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.FeeOverThreshold),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_25fee5),
request_input(0, TXHASH_25fee5),
request_output(0, TXHASH_25fee5),
request_input(0),
request_output(0),
request_output(0),
request_finished(),
]
2018-08-13 16:21:24 +00:00
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", [inp1], [out1], prev_txes=TX_CACHE_TESTNET
2017-06-23 19:31:42 +00:00
)
# Transaction does not exist on the blockchain, not using assert_tx_matches()
assert (
serialized_tx.hex()
== "0100000001bcf3d00805f48e84de012da75498c926868b3a489afdd9e9cb47181883e5fe25000000006a47304402201602fd17c6e1d8c785ce150d6c0ec97f8a93fb71f6294f3a1de7dd52a52e27fe022079c05bc14f7b94771d195cb330a4dd7c0765290c6e183ae6aa169e4d5ccf2a3a0121035169c4d6a36b6c4f3e210f46d329efa1cb7a67ffce7d62062d4a8a17c23756e1ffffffff01207e9907000000001976a9144cfc772f24b600762f905a1ee799ce0e9c26831f88ac00000000"
)
2017-06-23 19:31:42 +00:00
2024-11-15 16:31:22 +00:00
def test_one_two_fee(session: Session):
# input tx: 50f6f1209ca92d7359564be803cb2c932cde7d370f7cee50fd1fad6790f6206d
2014-04-17 14:37:09 +00:00
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/0/5"), # 1GA9u9TfCG7SWmKCveBumdA1TZpfom6ZdJ
amount=50_000,
prev_hash=TXHASH_50f6f1,
prev_index=1,
)
2018-08-13 16:21:24 +00:00
out1 = messages.TxOutputType(
address_n=parse_path("m/44h/0h/0h/1/3"), # 1EcL6AyfQTyWKGvXwNSfsWoYnD3whzVFdu
amount=30_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2014-04-17 14:37:09 +00:00
out2 = messages.TxOutputType(
address="1Up15Msx4sbvUCGm8Xgo2Zp5FQim3wE59",
amount=10_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2017-06-23 19:31:42 +00:00
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
request_output(1),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_50f6f1),
request_input(0, TXHASH_50f6f1),
request_output(0, TXHASH_50f6f1),
request_output(1, TXHASH_50f6f1),
request_input(0),
request_output(0),
request_output(1),
request_output(0),
request_output(1),
request_finished(),
]
2017-06-23 19:31:42 +00:00
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Bitcoin", [inp1], [out1, out2], prev_txes=TX_CACHE_MAINNET
2017-06-23 19:31:42 +00:00
)
assert_tx_matches(
serialized_tx,
hash_link="https://btc1.trezor.io/api/tx/c275c333fd1b36bef4af316226c66a8b3693fbfcc081a5e16a2ae5fcb09e92bf",
tx_hex="01000000016d20f69067ad1ffd50ee7c0f377dde2c932ccb03e84b5659732da99c20f1f650010000006a47304402203429bd3ce7b38c5c1e8a15340edd79ced41a2939aae62e259d2e3d18e0c5ee7602201b83b10ebc4d6dcee3f9eb42ba8f1ef8a059a05397e0c1b9223d1565a3e6ec01012102a7a079c1ef9916b289c2ff21a992c808d0de3dfcf8a9f163205c5c9e21f55d5cffffffff0230750000000000001976a914954820f1de627a703596ac0396f986d958e3de4c88ac10270000000000001976a91405427736705cfbfaff76b1cff48283707fb1037088ac00000000",
)
2014-04-10 13:22:01 +00:00
@pytest.mark.parametrize("chunkify", (True, False))
2024-11-15 16:31:22 +00:00
def test_one_three_fee(session: Session, chunkify: bool):
# input tx: bb5169091f09e833e155b291b662019df56870effe388c626221c5ea84274bc4
2014-04-10 13:22:01 +00:00
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/1h/0/21"), # mvukVu96xM1QJ971w4Z5cdX4tsJwDyQy2L
amount=1_183_825,
prev_hash=TXHASH_bb5169,
prev_index=0,
)
out1 = messages.TxOutputType(
address="mgCyjvJaTgVwKoxEaFaDLeFQpZc7qdKXpZ", # m/44h/1h/1h/0/20
amount=100_100,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2014-04-17 14:37:09 +00:00
out2 = messages.TxOutputType(
address="n4qJziM7S8ydGbXKKRJADHuSeAjbx5c1Dp", # m/44h/1h/1h/0/22
amount=100_100,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2014-04-17 14:37:09 +00:00
out3 = messages.TxOutputType(
address_n=parse_path("m/44h/1h/1h/1/21"), # n1CFre3Ai975UiWJrjZnFxTVrPkxCVkm8U
amount=1_183_825 - 100_100 - 100_100 - 10_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2014-04-17 14:37:09 +00:00
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
request_output(1),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
request_output(2),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_bb5169),
request_input(0, TXHASH_bb5169),
request_output(0, TXHASH_bb5169),
request_input(0),
request_output(0),
request_output(1),
request_output(2),
request_output(0),
request_output(1),
request_output(2),
request_finished(),
]
2017-06-23 19:31:42 +00:00
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Testnet",
[inp1],
[out1, out2, out3],
prev_txes=TX_CACHE_TESTNET,
chunkify=chunkify,
)
2014-04-17 14:37:09 +00:00
assert_tx_matches(
serialized_tx,
hash_link="https://tbtc1.trezor.io/tx/29f83be103368bb2302953f5bf57e7eb44f79e46a38c8cd9e862e81ed0fbf0c7",
tx_hex="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",
)
2014-04-17 14:37:09 +00:00
2024-11-15 16:31:22 +00:00
def test_two_two(session: Session):
# input tx: ac4ca0e7827a1228f44449cb57b4b9a809a667ca044dc43bb124627fed4bc10a
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/0/55"), # 14nw9rFTWGUncHZjSqpPSJQaptWW7iRRB8
amount=10_000,
prev_hash=TXHASH_ac4ca0,
prev_index=1,
)
inp2 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/1/7"), # 16hgR6bjr99X6NhrsWuDR6NLpCLEacUNk
amount=83_130,
prev_hash=TXHASH_ac4ca0,
prev_index=0,
)
out1 = messages.TxOutputType(
address_n=parse_path("m/44h/0h/0h/1/8"), # 1CJzc38F82zBUnMKWxeUqMepkPRmo2BGHt
amount=71_790,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
out2 = messages.TxOutputType(
address="1ByqmhXkC6U5GuUNnAhJsuEVjHt5GhEuJL", # m/44h/0h/1h/0/17
amount=10_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_input(1),
request_output(0),
request_output(1),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_ac4ca0),
request_input(0, TXHASH_ac4ca0),
request_output(0, TXHASH_ac4ca0),
request_output(1, TXHASH_ac4ca0),
request_input(1),
request_meta(TXHASH_ac4ca0),
request_input(0, TXHASH_ac4ca0),
request_output(0, TXHASH_ac4ca0),
request_output(1, TXHASH_ac4ca0),
request_input(0),
request_input(1),
request_output(0),
request_output(1),
request_input(0),
request_input(1),
request_output(0),
request_output(1),
request_output(0),
request_output(1),
request_finished(),
]
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Bitcoin",
[inp1, inp2],
[out1, out2],
prev_txes=TX_CACHE_MAINNET,
)
assert_tx_matches(
serialized_tx,
hash_link="https://btc1.trezor.io/api/tx/b928870bf5cd1915ded2cfdc562bf777476860030b8b0bc7beeffa3585457ea9",
tx_hex="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",
)
2014-04-17 14:37:09 +00:00
@pytest.mark.slow
2024-11-15 16:31:22 +00:00
def test_lots_of_inputs(session: Session):
# Tests if device implements serialization of len(inputs) correctly
# input tx: 3019487f064329247daad245aed7a75349d09c14b1d24f170947690e030f5b20
inputs = []
for i in range(100):
inputs.append(
messages.TxInputType(
address_n=parse_path(f"m/44h/1h/1h/0/{i}"),
amount=14_598,
prev_hash=TXHASH_301948,
prev_index=i,
)
2017-06-23 19:31:42 +00:00
)
out = messages.TxOutputType(
address="mnY26FLTzfC94mDoUcyDJh1GVE3LuAUMbs", # "m/44h/1h/0h/0/6"
amount=100 * 14_598 - 60_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", inputs, [out], prev_txes=TX_CACHE_TESTNET
)
assert_tx_matches(
serialized_tx,
hash_link="https://tbtc1.trezor.io/api/tx/3df8a9d28adb1653fdd98f5a71c82c52fea9389d71b73f3ef7a36a53591cbeda",
)
2014-04-17 14:37:09 +00:00
@pytest.mark.slow
2024-11-15 16:31:22 +00:00
def test_lots_of_outputs(session: Session):
# Tests if device implements serialization of len(outputs) correctly
2018-08-13 16:21:24 +00:00
# input tx: 58d56a5d1325cf83543ee4c87fd73a784e4ba1499ced574be359fa2bdcb9ac8e
2014-04-17 14:37:09 +00:00
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/0"), # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
amount=1_827_955,
prev_hash=TXHASH_58d56a,
prev_index=1,
)
outputs = []
cnt = 255
for _ in range(cnt):
out = messages.TxOutputType(
address="momtnzR3XqXgDSsFmd8gkGxUiHZLde3RmA", # "m/44h/1h/0h/0/3"
amount=(1_827_955 - 10_000) // cnt,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
outputs.append(out)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", [inp1], outputs, prev_txes=TX_CACHE_TESTNET
)
assert_tx_matches(
serialized_tx,
hash_link="https://tbtc1.trezor.io/api/tx/f9509e192651732a1a144aa44edd709fd6f1812ffa3dfa72d737cbd8477230c1",
)
@pytest.mark.slow
2024-11-15 16:31:22 +00:00
def test_lots_of_change(session: Session):
# Tests if device implements prompting for multiple change addresses correctly
# input tx: 892d06cb3394b8e6006eec9a2aa90692b718a29be6844b6c6a9e89ec3aa6aac4
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/6"), # mnY26FLTzfC94mDoUcyDJh1GVE3LuAUMbs
amount=1_553_800,
prev_hash=TXHASH_892d06,
prev_index=0,
)
2014-04-17 14:37:09 +00:00
outputs = [
messages.TxOutputType(
address="mgV9Z3YuSbxGb2b2Y1T6VCqtU2osui7vhG", # "m/44h/1h/0h/0/7"
amount=500_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
2017-06-23 19:31:42 +00:00
)
]
2014-04-17 14:37:09 +00:00
cnt = 20
for i in range(cnt):
out = messages.TxOutputType(
address_n=parse_path(f"m/44h/1h/0h/1/{i}"),
amount=(1_553_800 - 500_000 - 29_000) // cnt,
2020-08-03 11:37:12 +00:00
script_type=messages.OutputScriptType.PAYTOADDRESS,
2017-06-23 19:31:42 +00:00
)
outputs.append(out)
request_change_outputs = [request_output(i + 1) for i in range(cnt)]
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
]
+ request_change_outputs
+ [
messages.ButtonRequest(code=B.SignTx),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_892d06),
request_input(0, TXHASH_892d06),
request_output(0, TXHASH_892d06),
request_input(0),
request_output(0),
]
+ request_change_outputs
+ [request_output(0)]
+ request_change_outputs
+ [request_finished()]
2017-06-23 19:31:42 +00:00
)
2014-04-17 14:37:09 +00:00
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", [inp1], outputs, prev_txes=TX_CACHE_TESTNET
2017-06-23 19:31:42 +00:00
)
2014-04-17 14:37:09 +00:00
assert_tx_matches(
serialized_tx,
hash_link="https://tbtc1.trezor.io/api/tx/15508224d220a4d5dfc202d8722a662b8a3b77b7265d7bea973e10e95b20cead",
)
2014-04-17 14:37:09 +00:00
2014-04-10 13:22:01 +00:00
2024-11-15 16:31:22 +00:00
def test_fee_high_warning(session: Session):
# input tx: 1f326f65768d55ef146efbb345bd87abe84ac7185726d0457a026fc347a26ef3
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/0/10"), # 1JL3nCw76rhwK6EguU6uhe7GCa7Mq88kXg
amount=3_801_747,
prev_hash=TXHASH_1f326f,
prev_index=0,
)
out1 = messages.TxOutputType(
address="1DXKPgQU6ACQiww48chz7iPJhoV5L5bjRC", # m/44h/0h/0h/0/11
amount=3_801_747 - 510_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.FeeOverThreshold),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_1f326f),
request_input(0, TXHASH_1f326f),
request_input(1, TXHASH_1f326f),
request_output(0, TXHASH_1f326f),
request_input(0),
request_output(0),
request_output(0),
request_finished(),
]
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Bitcoin", [inp1], [out1], prev_txes=TX_CACHE_MAINNET
)
# Transaction does not exist on the blockchain, not using assert_tx_matches()
assert (
serialized_tx.hex()
== "0100000001f36ea247c36f027a45d0265718c74ae8ab87bd45b3fb6e14ef558d76656f321f000000006a4730440220342860add2f161c74a67462cd209783557ab5affafe12fa53436a924eb2b2bcb022032be926c63df8532464e9e4adf0cf8f4609f959e230c58fdf306302f3b7fa60a0121038bac33bcdaeec5626e2f2c5680a9fdc5e551d4e1167f272825bea98e6158d4c8ffffffff01633a3200000000001976a914895d571ebb79808367bfd2a70742ac08f519cb6088ac00000000"
)
2017-06-23 19:31:42 +00:00
@pytest.mark.models("core")
2024-11-15 16:31:22 +00:00
def test_fee_high_hardfail(session: Session):
# input tx: 25fee583181847cbe9d9fd9a483a8b8626c99854a72d01de848ef40508d0f3bc
# (The "25fee" tx hash is very suitable for testing high fees)
2017-06-23 19:31:42 +00:00
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/7"), # mgV9Z3YuSbxGb2b2Y1T6VCqtU2osui7vhG
amount=129_999_808,
prev_hash=TXHASH_25fee5,
prev_index=0,
)
out1 = messages.TxOutputType(
address="mnY26FLTzfC94mDoUcyDJh1GVE3LuAUMbs", # "m/44h/1h/0h/0/6"
amount=129_999_808 - 25_000_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2018-11-02 15:25:51 +00:00
with pytest.raises(TrezorFailure, match="fee is unexpectedly large"):
2024-11-15 16:31:22 +00:00
btc.sign_tx(session, "Testnet", [inp1], [out1], prev_txes=TX_CACHE_TESTNET)
2018-11-02 15:25:51 +00:00
# set SafetyCheckLevel to PromptTemporarily and try again
device.apply_settings(
2024-11-15 16:31:22 +00:00
session, safety_checks=messages.SafetyCheckLevel.PromptTemporarily
)
2024-11-15 16:31:22 +00:00
with session.client as client:
2023-05-04 12:18:55 +00:00
IF = InputFlowSignTxHighFee(client)
client.set_input_flow(IF.get())
2014-04-10 13:22:01 +00:00
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", [inp1], [out1], prev_txes=TX_CACHE_TESTNET
)
2023-05-04 12:18:55 +00:00
assert IF.finished
# Transaction does not exist on the blockchain, not using assert_tx_matches()
assert (
serialized_tx.hex()
== "0100000001bcf3d00805f48e84de012da75498c926868b3a489afdd9e9cb47181883e5fe25000000006a473044022005935c56d59c78e874c1d0556e1a131677214c75a57e8477b44b24ca35e3d5850220281f5d79c6583b528eaf0611904674d9895a3cea0dffd840bafa9d4f67627b200121035169c4d6a36b6c4f3e210f46d329efa1cb7a67ffce7d62062d4a8a17c23756e1ffffffff01802b4206000000001976a9144cfc772f24b600762f905a1ee799ce0e9c26831f88ac00000000"
)
2024-11-15 16:31:22 +00:00
def test_not_enough_funds(session: Session):
# input tx: d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/0/0"), # 1JAd7XCBzGudGpJQSDSfpmJhiygtLQWaGL
amount=390_000,
prev_hash=TXHASH_d5f65e,
prev_index=0,
)
out1 = messages.TxOutputType(
address="1MJ2tj2ThBE62zXbBYA5ZaN3fdve5CPAz1",
amount=400_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.Failure(code=messages.FailureType.NotEnoughFunds),
]
)
with pytest.raises(TrezorFailure, match="NotEnoughFunds"):
2024-11-15 16:31:22 +00:00
btc.sign_tx(session, "Bitcoin", [inp1], [out1], prev_txes=TX_CACHE_MAINNET)
2024-11-15 16:31:22 +00:00
def test_p2sh(session: Session):
# input tx: 58d56a5d1325cf83543ee4c87fd73a784e4ba1499ced574be359fa2bdcb9ac8e
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/2"), # mgswWyysmViMqYmn5XEj1pVz7rVUftVEBP
amount=50_000,
prev_hash=TXHASH_58d56a,
prev_index=0,
)
out1 = messages.TxOutputType(
address="2N4sUHkkx1GgWtMMgjVD5Ljw2yDs7GumT2S", # p2sh
amount=50_000 - 10_000,
script_type=messages.OutputScriptType.PAYTOSCRIPTHASH,
)
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_58d56a),
request_input(0, TXHASH_58d56a),
request_output(0, TXHASH_58d56a),
request_output(1, TXHASH_58d56a),
request_input(0),
request_output(0),
request_output(0),
request_finished(),
]
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", [inp1], [out1], prev_txes=TX_CACHE_TESTNET
)
assert_tx_matches(
serialized_tx,
hash_link="https://tbtc1.trezor.io/api/tx/525693745ef44161ed32f3def7f13e92d96504e06448910ce2e945bfe5e8cc7b",
tx_hex="01000000018eacb9dc2bfa59e34b57ed9c49a14b4e783ad77fc8e43e5483cf25135d6ad558000000006a473044022029b7d07f068501dc7a5dcf5148167a286a949483cac88b6f85b3ae92baa3346902203488709587453467248d52d0f18fa36d43909854ee1958feef5c9b78c509d15d012103f5008445568548bd745a3dedccc6048969436bf1a49411f60938ff1938941f14ffffffff01409c00000000000017a9147f844bdb0b8fd54b64e3d16c85dc1170f1ff97c18700000000",
)
2018-11-02 15:25:51 +00:00
2024-11-15 16:31:22 +00:00
def test_testnet_big_amount(session: Session):
# This test is testing transaction with amount bigger than fits to uint32
2018-11-02 15:25:51 +00:00
# input tx: 074b0070939db4c2635c1bef0c8e68412ccc8d3c8782137547c7a2bbde073fc0
2018-11-02 15:25:51 +00:00
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/6"), # mnY26FLTzfC94mDoUcyDJh1GVE3LuAUMbs
amount=4_500_000_000,
prev_hash=TXHASH_074b00,
prev_index=1,
)
out1 = messages.TxOutputType(
address="2N5daLhptwpXPBY84TQ2AjeLLkL8ru7n6ai", # top secret address
amount=4_500_000_000 - 10_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", [inp1], [out1], prev_txes=TX_CACHE_TESTNET
)
assert_tx_matches(
serialized_tx,
hash_link="https://tbtc1.trezor.io/api/tx/890155c89905c86fb087eddbe9973fa845c99913836e872f41fbdfa3864b607d",
tx_hex="0100000001c03f07debba2c747751382873c8dcc2c41688e0cef1b5c63c2b49d9370004b07010000006b483045022100a2c79eaed632746fd514aa09eae51c0294bdf66c74619306e0273cd1a470c9e7022050c78dec6acd65b42150dba70e2b546dfd737d77f46975a97427999cb2b8280401210344e14b3da8f5fe77a5465d0f8fe089d64ed5517d1f1f989edd00f530938a2c22ffffffff01f065380c0100000017a91487dba64df7e9386d0b0f3ef557269833e12d1b7a8700000000",
)
2014-05-28 12:39:09 +00:00
2024-11-15 16:31:22 +00:00
def test_attack_change_outputs(session: Session):
# input tx: ac4ca0e7827a1228f44449cb57b4b9a809a667ca044dc43bb124627fed4bc10a
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/0/55"), # 14nw9rFTWGUncHZjSqpPSJQaptWW7iRRB8
amount=10_000,
prev_hash=TXHASH_ac4ca0,
prev_index=1,
)
2014-05-28 12:39:09 +00:00
inp2 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/1/7"), # 16hgR6bjr99X6NhrsWuDR6NLpCLEacUNk
amount=83_130,
prev_hash=TXHASH_ac4ca0,
prev_index=0,
)
out1 = messages.TxOutputType(
address_n=parse_path("m/44h/0h/0h/1/8"), # 1CJzc38F82zBUnMKWxeUqMepkPRmo2BGHt
amount=71_790,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
out2 = messages.TxOutputType(
address="1ByqmhXkC6U5GuUNnAhJsuEVjHt5GhEuJL", # m/44h/0h/1h/0/17
amount=10_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
# Test if the transaction can be signed normally
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_input(1),
request_output(0),
request_output(1),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_ac4ca0),
request_input(0, TXHASH_ac4ca0),
request_output(0, TXHASH_ac4ca0),
request_output(1, TXHASH_ac4ca0),
request_input(1),
request_meta(TXHASH_ac4ca0),
request_input(0, TXHASH_ac4ca0),
request_output(0, TXHASH_ac4ca0),
request_output(1, TXHASH_ac4ca0),
request_input(0),
request_input(1),
request_output(0),
request_output(1),
request_input(0),
request_input(1),
request_output(0),
request_output(1),
request_output(0),
request_output(1),
request_finished(),
]
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Bitcoin", [inp1, inp2], [out1, out2], prev_txes=TX_CACHE_MAINNET
)
assert_tx_matches(
serialized_tx,
hash_link="https://btc1.trezor.io/api/tx/b928870bf5cd1915ded2cfdc562bf777476860030b8b0bc7beeffa3585457ea9",
tx_hex="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",
)
run_attack = False
def attack_processor(msg):
nonlocal run_attack
if msg.tx.outputs and msg.tx.outputs[0] == out2:
if not run_attack:
run_attack = True
else:
# Sign output with another amount
msg.tx.outputs[0].amount = 9_999_999
return msg
2024-11-15 16:31:22 +00:00
with session, pytest.raises(
TrezorFailure, match="Transaction has changed during signing"
):
# Set up attack processors
2024-11-15 16:31:22 +00:00
session.set_filter(messages.TxAck, attack_processor)
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Bitcoin",
[inp1, inp2],
[out1, out2],
prev_txes=TX_CACHE_MAINNET,
)
2024-11-15 16:31:22 +00:00
def test_attack_modify_change_address(session: Session):
# Ensure that if the change output is modified after the user confirms the
# transaction, then signing fails.
# input tx: e5040e1bc1ae7667ffb9e5248e90b2fb93cd9150234151ce90e14ab2f5933bcd
# output tx 87be0736f202f7c2bff0781b42bad3e0cdcb54761939da69ea793a3735552c56
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/0"), # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
amount=31_000_000,
prev_hash=TXHASH_e5040e,
prev_index=0,
)
out1 = messages.TxOutputType(
address="msj42CCGruhRsFrGATiUuh25dtxYtnpbTx", # looks like an old faucet
amount=30_090_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2018-08-13 16:21:24 +00:00
out2 = messages.TxOutputType(
address_n=parse_path("m/44h/1h/0h/1/0"), # mm6kLYbGEL1tGe4ZA8xacfgRPdW1NLjCbZ
amount=900_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
run_attack = False
def attack_processor(msg):
nonlocal run_attack
if msg.tx.outputs and msg.tx.outputs[0] == out2:
if not run_attack:
run_attack = True
else:
msg.tx.outputs[0].address_n = []
# 44h/1h/4h/0/2
msg.tx.outputs[0].address = "mwue7mokpBRAsJtHqEMcRPanYBmsSmYKvY"
return msg
2024-11-15 16:31:22 +00:00
with session, pytest.raises(
TrezorFailure, match="Transaction has changed during signing"
):
# Set up attack processors
2024-11-15 16:31:22 +00:00
session.set_filter(messages.TxAck, attack_processor)
2024-11-15 16:31:22 +00:00
btc.sign_tx(
session, "Testnet", [inp1], [out1, out2], prev_txes=TX_CACHE_TESTNET
)
2024-11-15 16:31:22 +00:00
def test_attack_change_input_address(session: Session):
# input tx: d2dcdaf547ea7f57a713c607f15e883ddc4a98167ee2c43ed953c53cb5153e24
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/4h/0/0"), # moUJnmge8SRXuediK7bW6t4YfrPqbE6hD7
prev_hash=TXHASH_d2dcda,
amount=123_400_000,
prev_index=1,
script_type=messages.InputScriptType.SPENDADDRESS,
)
out1 = messages.TxOutputType(
address="mwue7mokpBRAsJtHqEMcRPanYBmsSmYKvY", # m/44h/1h/4h/0/2
amount=100_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
out2 = messages.TxOutputType(
address_n=parse_path("m/44h/1h/4h/1/0"), # n48agDCKBPbMLu1FYSKEpFJLradG3wgdY9
amount=123_400_000 - 5_000 - 100_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
# Test if the transaction can be signed normally
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", [inp1], [out1, out2], prev_txes=TX_CACHE_TESTNET
)
# Transaction does not exist on the blockchain, not using assert_tx_matches()
assert (
serialized_tx.hex()
== "0100000001243e15b53cc553d93ec4e27e16984adc3d885ef107c613a7577fea47f5dadcd2010000006b483045022100eedaadde3a771967beee39f1daa9e9450f72fccdec63488a96d71eeae4224b4002203a22be3c1677d3451c93a49550b69e8f8fc06328823c7e0f633dde13d67ef96b01210364430c9122948e525e2f1c6d88f00f47679274f0810fd8c63754954f310995c1ffffffff02a0860100000000001976a914b3cc67f3349974d0f1b50e9bb5dfdf226f888fa088ac18555907000000001976a914f80fb232a1e54b1fa732bc120cae72eabd7fcf6888ac00000000"
)
attack_count = 2
def attack_processor(msg):
nonlocal attack_count
if msg.tx.inputs and msg.tx.inputs[0] == inp1:
if attack_count > 0:
attack_count -= 1
else:
msg.tx.inputs[0].address_n[2] = H_(12)
return msg
# Now run the attack, must trigger the exception
2024-11-15 16:31:22 +00:00
with session:
session.set_filter(messages.TxAck, attack_processor)
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
request_output(1),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_d2dcda),
request_input(0, TXHASH_d2dcda),
request_output(0, TXHASH_d2dcda),
request_output(1, TXHASH_d2dcda),
request_input(0),
messages.Failure(code=messages.FailureType.ProcessError),
]
)
# Now run the attack, must trigger the exception
with pytest.raises(TrezorFailure) as exc:
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Testnet",
[inp1],
[out1, out2],
prev_txes=TX_CACHE_TESTNET,
)
assert exc.value.code == messages.FailureType.ProcessError
assert exc.value.message.endswith("Transaction has changed during signing")
2024-11-15 16:31:22 +00:00
def test_spend_coinbase(session: Session):
# NOTE: the input transaction is not real
# We did not have any coinbase transaction at connected with `all all` seed,
# so it was artificially created for the test purpose
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/0"), # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
amount=2_500_278_230,
prev_hash=FAKE_TXHASH_005f6f,
prev_index=0,
)
out1 = messages.TxOutputType(
address="mm6FM31rM5Vc3sw5D7kztiBg3jHUzyqF1g",
amount=2_500_278_230 - 10_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(FAKE_TXHASH_005f6f),
request_input(0, FAKE_TXHASH_005f6f),
request_output(0, FAKE_TXHASH_005f6f),
request_input(0),
request_output(0),
request_output(0),
request_finished(),
]
)
_, serialized_tx = btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Testnet", [inp1], [out1], prev_txes=TX_CACHE_TESTNET
)
# Transaction does not exist on the blockchain, not using assert_tx_matches()
assert (
serialized_tx.hex()
== "01000000013e2b623805978e1c0a4ffa4e4c10ad8f377d6036bcb3159aa00ab7f47f6f5f00000000006b483045022100a9a3e743017256fa7da39f73e7fd477edd9ba173055b32c99c99da59c23f2cde022023e4d28392f8a11967eaf8548883f9ffbb08dc7722937eb91db732fa1bef4b5b0121030e669acac1f280d1ddf441cd2ba5e97417bf2689e4bbec86df4f831bf9f7ffd0ffffffff01c6100795000000001976a9143d2496e67f5f57a924353da42d4725b318e7a8ea88ac00000000"
)
2024-11-15 16:31:22 +00:00
def test_two_changes(session: Session):
# input tx: e5040e1bc1ae7667ffb9e5248e90b2fb93cd9150234151ce90e14ab2f5933bcd
# see 87be0736f202f7c2bff0781b42bad3e0cdcb54761939da69ea793a3735552c56
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/0"), # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
amount=31_000_000,
prev_hash=TXHASH_e5040e,
prev_index=0,
)
out1 = messages.TxOutputType(
address="msj42CCGruhRsFrGATiUuh25dtxYtnpbTx", # looks like an old faucet
amount=30_090_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
out_change1 = messages.TxOutputType(
address_n=parse_path("m/44h/1h/0h/1/0"), # mm6kLYbGEL1tGe4ZA8xacfgRPdW1NLjCbZ
amount=900_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2020-03-18 18:06:24 +00:00
out_change2 = messages.TxOutputType(
address_n=parse_path("m/44h/1h/0h/1/1"), # mjXZwmEi1z1MzveZrKUAo4DBgbdq4sBYT6
amount=10_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2020-03-18 18:06:24 +00:00
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
request_output(1),
request_output(2),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_e5040e),
request_input(0, TXHASH_e5040e),
request_output(0, TXHASH_e5040e),
request_output(1, TXHASH_e5040e),
request_input(0),
request_output(0),
request_output(1),
request_output(2),
request_output(0),
request_output(1),
request_output(2),
request_finished(),
]
)
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Testnet",
[inp1],
[out1, out_change1, out_change2],
prev_txes=TX_CACHE_TESTNET,
)
2024-11-15 16:31:22 +00:00
def test_change_on_main_chain_allowed(session: Session):
# input tx: e5040e1bc1ae7667ffb9e5248e90b2fb93cd9150234151ce90e14ab2f5933bcd
# see 87be0736f202f7c2bff0781b42bad3e0cdcb54761939da69ea793a3735552c56
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/0"), # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
amount=31_000_000,
prev_hash=TXHASH_e5040e,
prev_index=0,
)
2020-03-18 18:06:24 +00:00
out1 = messages.TxOutputType(
address="msj42CCGruhRsFrGATiUuh25dtxYtnpbTx", # looks like an old faucet
amount=30_090_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
# change on main chain is allowed => treated as a change
out_change = messages.TxOutputType(
address_n=parse_path("m/44h/1h/0h/0/0"), # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
amount=900_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
request_output(1),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_e5040e),
request_input(0, TXHASH_e5040e),
request_output(0, TXHASH_e5040e),
request_output(1, TXHASH_e5040e),
request_input(0),
request_output(0),
request_output(1),
request_output(0),
request_output(1),
request_finished(),
]
)
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Testnet",
[inp1],
[out1, out_change],
prev_txes=TX_CACHE_TESTNET,
)
2024-11-15 16:31:22 +00:00
def test_not_enough_vouts(session: Session):
# input tx: ac4ca0e7827a1228f44449cb57b4b9a809a667ca044dc43bb124627fed4bc10a
prev_tx = TX_CACHE_MAINNET[TXHASH_ac4ca0]
# tx has two vouts
assert len(prev_tx.bin_outputs) == 2
# vout[0] and vout[1] exist
inp0 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/0/55"), # 14nw9rFTWGUncHZjSqpPSJQaptWW7iRRB8
amount=10_000,
prev_hash=TXHASH_ac4ca0,
prev_index=1,
)
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/1/7"), # 16hgR6bjr99X6NhrsWuDR6NLpCLEacUNk
amount=83_130,
prev_hash=TXHASH_ac4ca0,
prev_index=0,
)
# vout[2] does not exist
inp2 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/1/0"), # 1DyHzbQUoQEsLxJn6M7fMD8Xdt1XvNiwNE
prev_hash=TXHASH_ac4ca0,
amount=100_000_000,
prev_index=2,
)
# try to spend the sum of existing vouts
out1 = messages.TxOutputType(
address="1MJ2tj2ThBE62zXbBYA5ZaN3fdve5CPAz1",
amount=10_000 + 83_130 + 100_000_000 - 10_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
with pytest.raises(
TrezorFailure, match="Not enough outputs in previous transaction."
):
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Bitcoin",
[inp0, inp1, inp2],
[out1],
prev_txes=TX_CACHE_MAINNET,
)
@pytest.mark.parametrize(
"field, value",
(
("extra_data", b"hello world"),
("expiry", 9),
("timestamp", 42),
("version_group_id", 69),
("branch_id", 13),
),
)
2024-11-15 16:31:22 +00:00
def test_prevtx_forbidden_fields(session: Session, field, value):
inp0 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/0/0"), # 1JAd7XCBzGudGpJQSDSfpmJhiygtLQWaGL
prev_hash=TXHASH_157041,
amount=100_000_000,
prev_index=0,
)
out1 = messages.TxOutputType(
address="1MJ2tj2ThBE62zXbBYA5ZaN3fdve5CPAz1",
amount=100_000_000 - 1_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
prev_tx = TX_CACHE_MAINNET[TXHASH_157041]
setattr(prev_tx, field, value)
name = field.replace("_", " ")
with pytest.raises(TrezorFailure, match=rf"(?i){name} not enabled on this coin"):
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Bitcoin", [inp0], [out1], prev_txes={TXHASH_157041: prev_tx}
)
@pytest.mark.parametrize(
"field, value",
(("expiry", 9), ("timestamp", 42), ("version_group_id", 69), ("branch_id", 13)),
)
2024-11-15 16:31:22 +00:00
def test_signtx_forbidden_fields(session: Session, field: str, value: int):
inp0 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/0/0"), # 1JAd7XCBzGudGpJQSDSfpmJhiygtLQWaGL
prev_hash=TXHASH_157041,
amount=100_000_000,
prev_index=0,
)
out1 = messages.TxOutputType(
address="1MJ2tj2ThBE62zXbBYA5ZaN3fdve5CPAz1",
amount=1_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
kwargs = {field: value}
name = field.replace("_", " ")
with pytest.raises(TrezorFailure, match=rf"(?i){name} not enabled on this coin"):
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session, "Bitcoin", [inp0], [out1], prev_txes=TX_CACHE_MAINNET, **kwargs
)
@pytest.mark.parametrize(
"script_type",
(messages.InputScriptType.SPENDADDRESS, messages.InputScriptType.EXTERNAL),
)
2024-11-15 16:31:22 +00:00
def test_incorrect_input_script_type(session: Session, script_type):
address_n = parse_path("m/44h/1h/0h/0/0") # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
attacker_multisig_public_key = bytes.fromhex(
"030e669acac1f280d1ddf441cd2ba5e97417bf2689e4bbec86df4f831bf9f7ffd0"
)
multisig = messages.MultisigRedeemScriptType(
m=1,
nodes=[
2024-11-15 16:31:22 +00:00
btc.get_public_node(session, address_n, coin_name="Testnet").node,
messages.HDNodeType(
depth=0,
fingerprint=0,
child_num=0,
chain_code=bytes(32),
public_key=attacker_multisig_public_key,
),
],
address_n=[],
)
inp1 = messages.TxInputType(
address_n=address_n,
amount=142_920_000,
prev_index=1,
sequence=0xFFFFFFFF,
script_type=script_type, # incorrect script type
multisig=multisig,
prev_hash=TXHASH_e5040e,
)
out1 = messages.TxOutputType(
address_n=address_n,
amount=1_000_000 - 50_000 - 10_000,
script_type=messages.OutputScriptType.PAYTOMULTISIG,
multisig=multisig,
)
out2 = messages.TxOutputType(
address="mtkyndbpgv1G7nwggwKDVagRpxEJrwwyh6",
amount=50_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
with pytest.raises(
TrezorFailure, match="Multisig field provided but not expected."
):
2024-11-15 16:31:22 +00:00
btc.sign_tx(
session, "Testnet", [inp1], [out1, out2], prev_txes=TX_CACHE_TESTNET
)
@pytest.mark.parametrize(
"script_type",
(
messages.OutputScriptType.PAYTOADDRESS,
messages.OutputScriptType.PAYTOSCRIPTHASH,
),
)
def test_incorrect_output_script_type(
2024-11-15 16:31:22 +00:00
session: Session, script_type: messages.OutputScriptType
):
address_n = parse_path("m/44h/1h/0h/0/0") # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
attacker_multisig_public_key = bytes.fromhex(
"030e669acac1f280d1ddf441cd2ba5e97417bf2689e4bbec86df4f831bf9f7ffd0"
)
multisig = messages.MultisigRedeemScriptType(
m=1,
nodes=[
2024-11-15 16:31:22 +00:00
btc.get_public_node(session, address_n, coin_name="Testnet").node,
messages.HDNodeType(
depth=0,
fingerprint=0,
child_num=0,
chain_code=bytes(32),
public_key=attacker_multisig_public_key,
),
],
address_n=[],
)
inp1 = messages.TxInputType(
address_n=address_n,
amount=142_920_000,
prev_index=1,
sequence=0xFFFFFFFF,
script_type=messages.InputScriptType.SPENDADDRESS,
prev_hash=TXHASH_e5040e,
)
out1 = messages.TxOutputType(
address_n=address_n,
amount=1_000_000 - 50_000 - 10_000,
script_type=script_type, # incorrect script type
multisig=multisig,
)
out2 = messages.TxOutputType(
address="mtkyndbpgv1G7nwggwKDVagRpxEJrwwyh6",
amount=50_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
with pytest.raises(
TrezorFailure, match="Multisig field provided but not expected."
):
2024-11-15 16:31:22 +00:00
btc.sign_tx(
session, "Testnet", [inp1], [out1, out2], prev_txes=TX_CACHE_TESTNET
)
@pytest.mark.parametrize(
"lock_time, sequence",
((499_999_999, 0xFFFFFFFE), (500_000_000, 0xFFFFFFFE), (1, 0xFFFFFFFF)),
)
2024-11-15 16:31:22 +00:00
def test_lock_time(session: Session, lock_time: int, sequence: int):
# input tx: 0dac366fd8a67b2a89fbb0d31086e7acded7a5bbf9ef9daa935bc873229ef5b5
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/5h/0/9"), # 1H2CRJBrDMhkvCGZMW7T4oQwYbL8eVuh7p
amount=63_988,
prev_hash=TXHASH_0dac36,
prev_index=0,
sequence=sequence,
)
out1 = messages.TxOutputType(
address="13Hbso8zgV5Wmqn3uA7h3QVtmPzs47wcJ7",
amount=50_248,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session:
session.set_expected_responses(
[
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
2024-11-15 16:31:22 +00:00
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.SignTx),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_0dac36),
request_input(0, TXHASH_0dac36),
request_output(0, TXHASH_0dac36),
request_output(1),
request_input(0),
request_output(0),
request_output(0),
request_finished(),
]
)
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Bitcoin",
[inp1],
[out1],
lock_time=lock_time,
prev_txes=TX_CACHE_MAINNET,
)
@pytest.mark.models("core", reason="Cannot test layouts on T1")
2024-11-15 16:31:22 +00:00
def test_lock_time_blockheight(session: Session):
# input tx: 0dac366fd8a67b2a89fbb0d31086e7acded7a5bbf9ef9daa935bc873229ef5b5
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/5h/0/9"), # 1H2CRJBrDMhkvCGZMW7T4oQwYbL8eVuh7p
amount=63_988,
prev_hash=TXHASH_0dac36,
prev_index=0,
sequence=0xFFFF_FFFE,
)
out1 = messages.TxOutputType(
address="13Hbso8zgV5Wmqn3uA7h3QVtmPzs47wcJ7",
amount=50_248,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session.client as client:
2023-05-04 12:18:55 +00:00
IF = InputFlowLockTimeBlockHeight(client, "499999999")
client.set_input_flow(IF.get())
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Bitcoin",
[inp1],
[out1],
lock_time=499_999_999,
prev_txes=TX_CACHE_MAINNET,
)
@pytest.mark.models("core", reason="Cannot test layouts on T1")
@pytest.mark.parametrize(
"lock_time_str", ("1985-11-05 00:53:20", "2048-08-16 22:14:00")
)
2024-11-15 16:31:22 +00:00
def test_lock_time_datetime(session: Session, lock_time_str: str):
# input tx: 0dac366fd8a67b2a89fbb0d31086e7acded7a5bbf9ef9daa935bc873229ef5b5
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/5h/0/9"), # 1H2CRJBrDMhkvCGZMW7T4oQwYbL8eVuh7p
amount=63_988,
prev_hash=TXHASH_0dac36,
prev_index=0,
sequence=0xFFFF_FFFE,
)
out1 = messages.TxOutputType(
address="13Hbso8zgV5Wmqn3uA7h3QVtmPzs47wcJ7",
amount=50_248,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
lock_time_naive = datetime.strptime(lock_time_str, "%Y-%m-%d %H:%M:%S")
lock_time_utc = lock_time_naive.replace(tzinfo=timezone.utc)
lock_time_timestamp = int(lock_time_utc.timestamp())
2024-11-15 16:31:22 +00:00
with session.client as client:
2023-05-04 12:18:55 +00:00
IF = InputFlowLockTimeDatetime(client, lock_time_str)
client.set_input_flow(IF.get())
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Bitcoin",
[inp1],
[out1],
lock_time=lock_time_timestamp,
prev_txes=TX_CACHE_MAINNET,
)
@pytest.mark.models("core", reason="Cannot test layouts on T1")
2024-11-15 16:31:22 +00:00
def test_information(session: Session):
# input tx: 0dac366fd8a67b2a89fbb0d31086e7acded7a5bbf9ef9daa935bc873229ef5b5
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/5h/0/9"), # 1H2CRJBrDMhkvCGZMW7T4oQwYbL8eVuh7p
amount=63_988,
prev_hash=TXHASH_0dac36,
prev_index=0,
sequence=0xFFFF_FFFE,
)
out1 = messages.TxOutputType(
address="13Hbso8zgV5Wmqn3uA7h3QVtmPzs47wcJ7",
amount=50_248,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session.client as client:
IF = InputFlowSignTxInformation(client)
client.set_input_flow(IF.get())
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Bitcoin",
[inp1],
[out1],
prev_txes=TX_CACHE_MAINNET,
)
@pytest.mark.models("core", reason="Cannot test layouts on T1")
2024-11-15 16:31:22 +00:00
def test_information_mixed(session: Session):
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/1h/0h/0/0"), # mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q
amount=31_000_000,
prev_hash=TXHASH_e5040e,
prev_index=0,
)
inp2 = messages.TxInputType(
# tb1pn2d0yjeedavnkd8z8lhm566p0f2utm3lgvxrsdehnl94y34txmts5s7t4c
address_n=parse_path("m/86h/1h/0h/1/0"),
amount=4_600,
prev_hash=TXHASH_ec5194,
prev_index=0,
script_type=messages.InputScriptType.SPENDTAPROOT,
)
out1 = messages.TxOutputType(
address="msj42CCGruhRsFrGATiUuh25dtxYtnpbTx",
amount=31_000_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session.client as client:
IF = InputFlowSignTxInformationMixed(client)
client.set_input_flow(IF.get())
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Testnet",
[inp1, inp2],
[out1],
prev_txes=TX_CACHE_TESTNET,
)
@pytest.mark.models("core", reason="Cannot test layouts on T1")
2024-11-15 16:31:22 +00:00
def test_information_cancel(session: Session):
# input tx: 0dac366fd8a67b2a89fbb0d31086e7acded7a5bbf9ef9daa935bc873229ef5b5
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/5h/0/9"), # 1H2CRJBrDMhkvCGZMW7T4oQwYbL8eVuh7p
amount=63_988,
prev_hash=TXHASH_0dac36,
prev_index=0,
sequence=0xFFFF_FFFE,
)
out1 = messages.TxOutputType(
address="13Hbso8zgV5Wmqn3uA7h3QVtmPzs47wcJ7",
amount=50_248,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
2024-11-15 16:31:22 +00:00
with session.client as client, pytest.raises(Cancelled):
IF = InputFlowSignTxInformationCancel(client)
client.set_input_flow(IF.get())
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Bitcoin",
[inp1],
[out1],
prev_txes=TX_CACHE_MAINNET,
)
@pytest.mark.models(
"core",
skip="mercury",
reason="Cannot test layouts on T1, not implemented in mercury UI",
)
2024-11-15 16:31:22 +00:00
def test_information_replacement(session: Session):
# Use the change output and an external output to bump the fee.
# Originally fee was 3780, now 108060 (94280 from change and 10000 from external).
inp1 = messages.TxInputType(
address_n=parse_path("m/49h/1h/0h/0/4"),
amount=100_000,
script_type=messages.InputScriptType.SPENDP2SHWITNESS,
prev_hash=TXHASH_5e7667,
prev_index=1,
orig_hash=TXHASH_334cd7,
orig_index=0,
)
inp2 = messages.TxInputType(
address_n=parse_path("m/49h/1h/0h/0/3"),
amount=998_060,
script_type=messages.InputScriptType.SPENDP2SHWITNESS,
prev_hash=TXHASH_efaa41,
prev_index=0,
orig_hash=TXHASH_334cd7,
orig_index=1,
)
out1 = messages.TxOutputType(
# Actually m/49'/1'/0'/0/5.
address="2MvUUSiQZDSqyeSdofKX9KrSCio1nANPDTe",
amount=990_000,
orig_hash=TXHASH_334cd7,
orig_index=0,
)
2024-11-15 16:31:22 +00:00
with session.client as client:
IF = InputFlowSignTxInformationReplacement(client)
client.set_input_flow(IF.get())
btc.sign_tx(
2024-11-15 16:31:22 +00:00
session,
"Testnet",
[inp1, inp2],
[out1],
prev_txes=TX_CACHE_TESTNET,
)