1
0
mirror of https://github.com/trezor/trezor-firmware.git synced 2024-11-29 19:08:12 +00:00
trezor-firmware/tests/device_tests/test_protection_levels.py

259 lines
9.1 KiB
Python
Raw Normal View History

# This file is part of the Trezor project.
2017-01-03 18:40:05 +00:00
#
2019-05-29 16:44:09 +00:00
# Copyright (C) 2012-2019 SatoshiLabs and contributors
2017-01-03 18:40:05 +00:00
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License version 3
# as published by the Free Software Foundation.
2017-01-03 18:40:05 +00:00
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the License along with this library.
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
import pytest
2017-01-03 18:40:05 +00:00
from trezorlib import btc, device, messages as proto, misc
from trezorlib.exceptions import TrezorFailure
2019-09-11 12:43:32 +00:00
from ..common import MNEMONIC12
2020-03-03 16:29:02 +00:00
from ..tx_cache import TxCache
from .signtx import request_finished, request_input, request_meta, request_output
B = proto.ButtonRequestType
2017-05-15 12:14:45 +00:00
2018-09-12 18:34:26 +00:00
TXHASH_d5f65e = bytes.fromhex(
2018-08-13 16:21:24 +00:00
"d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882"
)
2017-05-15 12:14:45 +00:00
PIN4 = "1234"
2017-05-15 12:14:45 +00:00
@pytest.mark.skip_t2
2019-09-11 12:29:39 +00:00
class TestProtectionLevels:
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_initialize(self, client):
with client:
client.set_expected_responses([proto.Features()])
client.init_device()
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_apply_settings(self, client):
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
2018-08-13 16:21:24 +00:00
[
proto.PinMatrixRequest(),
proto.ButtonRequest(),
proto.Success(),
proto.Features(),
]
) # TrezorClient reinitializes device
device.apply_settings(client, label="nazdar")
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_change_pin(self, client):
with client:
client.use_pin_sequence([PIN4, PIN4, PIN4])
client.set_expected_responses(
2018-08-13 16:21:24 +00:00
[
proto.ButtonRequest(),
proto.PinMatrixRequest(),
proto.PinMatrixRequest(),
proto.PinMatrixRequest(),
proto.Success(),
proto.Features(),
]
)
device.change_pin(client)
def test_ping(self, client):
with client:
2020-01-21 09:05:48 +00:00
client.set_expected_responses([proto.ButtonRequest(), proto.Success()])
client.ping("msg", True)
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_get_entropy(self, client):
with client:
client.set_expected_responses([proto.ButtonRequest(), proto.Entropy()])
misc.get_entropy(client, 10)
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_get_public_key(self, client):
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
2018-08-13 16:21:24 +00:00
[proto.PinMatrixRequest(), proto.PassphraseRequest(), proto.PublicKey()]
)
btc.get_public_node(client, [])
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_get_address(self, client):
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
2018-08-13 16:21:24 +00:00
[proto.PinMatrixRequest(), proto.PassphraseRequest(), proto.Address()]
)
btc.get_address(client, "Bitcoin", [])
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_wipe_device(self, client):
with client:
client.set_expected_responses(
2018-08-13 16:21:24 +00:00
[proto.ButtonRequest(), proto.Success(), proto.Features()]
)
device.wipe(client)
@pytest.mark.setup_client(uninitialized=True)
def test_reset_device(self, client):
with client:
client.set_expected_responses(
[proto.ButtonRequest()]
+ [proto.EntropyRequest()]
2018-08-13 16:21:24 +00:00
+ [proto.ButtonRequest()] * 24
+ [proto.Success(), proto.Features()]
)
device.reset(client, False, 128, True, False, "label", "en-US")
with pytest.raises(TrezorFailure):
# This must fail, because device is already initialized
# Using direct call because `device.reset` has its own check
client.call(
proto.ResetDevice(
display_random=False,
strength=128,
passphrase_protection=True,
pin_protection=False,
label="label",
language="en-US",
)
)
@pytest.mark.setup_client(uninitialized=True)
def test_recovery_device(self, client):
client.use_mnemonic(MNEMONIC12)
with client:
client.set_expected_responses(
2018-08-13 16:21:24 +00:00
[proto.ButtonRequest()]
+ [proto.WordRequest()] * 24
+ [proto.Success(), proto.Features()]
)
device.recover(
client, 12, False, False, "label", "en-US", client.mnemonic_callback
)
with pytest.raises(TrezorFailure):
# This must fail, because device is already initialized
# Using direct call because `device.reset` has its own check
client.call(
proto.RecoveryDevice(
word_count=12,
passphrase_protection=False,
pin_protection=False,
label="label",
language="en-US",
)
)
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_sign_message(self, client):
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
2018-08-13 16:21:24 +00:00
[
proto.ButtonRequest(),
proto.PinMatrixRequest(),
proto.PassphraseRequest(),
proto.MessageSignature(),
]
)
btc.sign_message(client, "Bitcoin", [], "testing message")
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_verify_message(self, client):
with client:
client.set_expected_responses(
2018-08-13 16:21:24 +00:00
[proto.ButtonRequest(), proto.ButtonRequest(), proto.Success()]
)
2018-08-10 12:04:58 +00:00
btc.verify_message(
client,
2018-08-13 16:21:24 +00:00
"Bitcoin",
"14LmW5k4ssUrtbAB4255zdqv3b4w1TuX9e",
2018-09-12 18:34:26 +00:00
bytes.fromhex(
2018-08-13 16:21:24 +00:00
"209e23edf0e4e47ff1dec27f32cd78c50e74ef018ee8a6adf35ae17c7a9b0dd96f48b493fd7dbab03efb6f439c6383c9523b3bbc5f1a7d158a6af90ab154e9be80"
),
"This is an example of a signed message.",
)
@pytest.mark.setup_client(pin=PIN4, passphrase=True)
def test_signtx(self, client):
inp1 = proto.TxInputType(
2017-06-23 19:31:42 +00:00
address_n=[0], # 14LmW5k4ssUrtbAB4255zdqv3b4w1TuX9e
prev_hash=TXHASH_d5f65e,
prev_index=0,
)
out1 = proto.TxOutputType(
2018-08-13 16:21:24 +00:00
address="1MJ2tj2ThBE62zXbBYA5ZaN3fdve5CPAz1",
2017-06-23 19:31:42 +00:00
amount=390000 - 10000,
script_type=proto.OutputScriptType.PAYTOADDRESS,
2017-06-23 19:31:42 +00:00
)
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
2018-08-13 16:21:24 +00:00
[
proto.PinMatrixRequest(),
proto.PassphraseRequest(),
request_input(0),
request_meta(TXHASH_d5f65e),
request_input(0, TXHASH_d5f65e),
request_input(1, TXHASH_d5f65e),
request_output(0, TXHASH_d5f65e),
request_output(0),
proto.ButtonRequest(code=B.ConfirmOutput),
proto.ButtonRequest(code=B.SignTx),
request_input(0),
request_output(0),
request_output(0),
request_finished(),
2018-08-13 16:21:24 +00:00
]
)
2020-03-03 16:29:02 +00:00
btc.sign_tx(client, "Bitcoin", [inp1], [out1], prev_txes=TxCache("Bitcoin"))
# def test_firmware_erase(self):
# pass
# def test_firmware_upload(self):
# pass
@pytest.mark.setup_client(pin=PIN4)
def test_unlocked(self, client):
assert client.features.unlocked is False
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses([proto.PinMatrixRequest(), proto.Address()])
btc.get_address(client, "Testnet", [0])
client.init_device()
assert client.features.unlocked is True
with client:
client.set_expected_responses([proto.Address()])
btc.get_address(client, "Testnet", [0])
@pytest.mark.setup_client(passphrase=True)
def test_passphrase_cached(self, client):
with client:
2020-01-21 09:05:48 +00:00
client.set_expected_responses([proto.PassphraseRequest(), proto.Address()])
btc.get_address(client, "Testnet", [0])
with client:
2020-01-21 09:05:48 +00:00
client.set_expected_responses([proto.Address()])
btc.get_address(client, "Testnet", [0])