1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-22 15:38:11 +00:00
trezor-firmware/tests/click_tests/test_reset_slip39_advanced.py

174 lines
5.6 KiB
Python
Raw Normal View History

# This file is part of the Trezor project.
#
# Copyright (C) 2012-2019 SatoshiLabs and contributors
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License version 3
# as published by the Free Software Foundation.
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the License along with this library.
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
from typing import TYPE_CHECKING
import pytest
from trezorlib import device, messages
from .. import buttons
2023-11-21 15:55:46 +00:00
from .. import translations as TR
from ..common import EXTERNAL_ENTROPY, WITH_MOCK_URANDOM, generate_entropy
from . import reset
if TYPE_CHECKING:
from ..device_handler import BackgroundDeviceHandler
pytestmark = pytest.mark.models("core")
2019-11-15 14:54:16 +00:00
@pytest.mark.setup_client(uninitialized=True)
@pytest.mark.parametrize(
"group_count, group_threshold, share_count, share_threshold",
[
pytest.param(2, 2, 2, 2, id="2of2"),
pytest.param(16, 16, 16, 16, id="16of16", marks=pytest.mark.slow),
],
)
@WITH_MOCK_URANDOM
def test_reset_slip39_advanced(
device_handler: "BackgroundDeviceHandler",
group_count: int,
group_threshold: int,
share_count: int,
share_threshold: int,
):
features = device_handler.features()
debug = device_handler.debuglink()
assert features.initialized is False
2019-11-15 14:54:16 +00:00
device_handler.run(
device.reset,
backup_type=messages.BackupType.Slip39_Advanced,
pin_protection=False,
)
2019-11-15 14:54:16 +00:00
# confirm new wallet
reset.confirm_new_wallet(debug)
2019-11-15 14:54:16 +00:00
# confirm back up
2023-11-21 15:55:46 +00:00
TR.assert_in_multiple(
debug.read_layout().text_content(),
["backup__it_should_be_backed_up", "backup__it_should_be_backed_up_now"],
)
reset.confirm_read(debug)
# confirm backup intro
2023-11-21 15:55:46 +00:00
TR.assert_in(debug.read_layout().text_content(), "backup__info_multi_share_backup")
reset.confirm_read(debug)
2019-11-15 14:54:16 +00:00
# confirm checklist
2023-11-21 15:55:46 +00:00
TR.assert_in(
debug.read_layout().text_content(), "reset__slip39_checklist_num_groups"
)
reset.confirm_read(debug)
# set num of groups - default is 5
assert debug.model is not None
model_name: str = debug.model.internal_name
if group_count < 5:
reset.set_selection(debug, buttons.reset_minus(model_name), 5 - group_count)
else:
reset.set_selection(debug, buttons.reset_plus(model_name), group_count - 5)
2019-11-15 14:54:16 +00:00
# confirm checklist
TR.assert_in_multiple(
debug.read_layout().text_content(),
[
"reset__slip39_checklist_set_threshold", # basic
"reset__slip39_checklist_set_num_shares", # advanced (model_tt, mercury)
"reset__slip39_checklist_num_shares", # advanced (model_tr)
],
2023-11-21 15:55:46 +00:00
)
reset.confirm_read(debug)
2019-11-15 14:54:16 +00:00
# set group threshold
# TODO: could make it general as well
if group_count == 2 and group_threshold == 2:
reset.set_selection(debug, buttons.reset_plus(model_name), 0)
elif group_count == 16 and group_threshold == 16:
reset.set_selection(debug, buttons.reset_plus(model_name), 11)
else:
raise RuntimeError("not a supported combination")
2019-11-15 14:54:16 +00:00
# confirm checklist
2023-11-21 15:55:46 +00:00
TR.assert_in_multiple(
debug.read_layout().text_content(),
[
"reset__slip39_checklist_set_sizes",
"reset__slip39_checklist_set_sizes_longer",
],
)
reset.confirm_read(debug)
2019-11-15 14:54:16 +00:00
# set share num and threshold for groups
for _ in range(group_count):
# set num of shares - default is 5
if share_count < 5:
reset.set_selection(debug, buttons.reset_minus(model_name), 5 - share_count)
else:
reset.set_selection(debug, buttons.reset_plus(model_name), share_count - 5)
2019-11-15 14:54:16 +00:00
# set share threshold
# TODO: could make it general as well
if share_count == 2 and share_threshold == 2:
reset.set_selection(debug, buttons.reset_plus(model_name), 0)
elif share_count == 16 and share_threshold == 16:
reset.set_selection(debug, buttons.reset_plus(model_name), 11)
else:
raise RuntimeError("not a supported combination")
# confirm backup warning
2023-11-21 15:55:46 +00:00
TR.assert_in(debug.read_layout().text_content(), "reset__never_make_digital_copy")
reset.confirm_read(debug, middle_r=True)
all_words: list[str] = []
for _ in range(group_count):
for _ in range(share_count):
2019-11-15 14:54:16 +00:00
# read words
2024-04-23 10:26:46 +00:00
words = reset.read_words(debug, do_htc=False)
2019-11-15 14:54:16 +00:00
# confirm words
reset.confirm_words(debug, words)
2019-11-15 14:54:16 +00:00
# confirm share checked
reset.confirm_read(debug)
2019-11-15 14:54:16 +00:00
all_words.append(" ".join(words))
2019-11-15 14:54:16 +00:00
# confirm backup done
reset.confirm_read(debug)
2019-11-15 14:54:16 +00:00
# generate secret locally
internal_entropy = debug.state().reset_entropy
assert internal_entropy is not None
2019-11-15 14:54:16 +00:00
secret = generate_entropy(128, internal_entropy, EXTERNAL_ENTROPY)
2019-11-15 14:54:16 +00:00
# validate that all combinations will result in the correct master secret
reset.validate_mnemonics(all_words, secret)
2019-11-15 14:54:16 +00:00
assert device_handler.result() == "Initialized"
2019-11-15 14:54:16 +00:00
features = device_handler.features()
assert features.initialized is True
assert features.backup_availability == messages.BackupAvailability.NotAvailable
2019-11-15 14:54:16 +00:00
assert features.pin_protection is False
assert features.passphrase_protection is False
assert features.backup_type is messages.BackupType.Slip39_Advanced_Extendable