# This file is part of the Trezor project. # # Copyright (C) 2012-2019 SatoshiLabs and contributors # # This library is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License version 3 # as published by the Free Software Foundation. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the License along with this library. # If not, see . from trezorlib import debuglink, device from trezorlib.messages.PassphraseSourceType import HOST as PASSPHRASE_ON_HOST from . import conftest class TrezorTest: # fmt: off # 1 2 3 4 5 6 7 8 9 10 11 12 mnemonic12 = "alcohol woman abuse must during monitor noble actual mixed trade anger aisle" mnemonic18 = "owner little vague addict embark decide pink prosper true fork panda embody mixture exchange choose canoe electric jewel" mnemonic24 = "dignity pass list indicate nasty swamp pool script soccer toe leaf photo multiply desk host tomato cradle drill spread actor shine dismiss champion exotic" mnemonic_all = " ".join(["all"] * 12) # fmt: on pin4 = "1234" pin6 = "789456" pin8 = "45678978" def setup_method(self, method): self.client = conftest.get_device() # self.client.set_buttonwait(3) device.wipe(self.client) self.client.open() def teardown_method(self, method): self.client.close() def _setup_mnemonic(self, mnemonic=None, pin="", passphrase=False, lock=True): if mnemonic is None: mnemonic = TrezorTest.mnemonic12 debuglink.load_device_by_mnemonic( self.client, mnemonic=mnemonic, pin=pin, passphrase_protection=passphrase, label="test", language="english", ) if conftest.TREZOR_VERSION == 1 and lock: # remove cached PIN (introduced via load_device) self.client.clear_session() if conftest.TREZOR_VERSION > 1 and passphrase: device.apply_settings(self.client, passphrase_source=PASSPHRASE_ON_HOST) def setup_mnemonic_allallall(self, lock=True): self._setup_mnemonic(mnemonic=TrezorTest.mnemonic_all, lock=lock) def setup_mnemonic_nopin_nopassphrase(self, lock=True): self._setup_mnemonic(lock=lock) def setup_mnemonic_nopin_passphrase(self, lock=True): self._setup_mnemonic(passphrase=True, lock=lock) def setup_mnemonic_pin_nopassphrase(self, lock=True): self._setup_mnemonic(pin=TrezorTest.pin4, lock=lock) def setup_mnemonic_pin_passphrase(self, lock=True): self._setup_mnemonic(pin=TrezorTest.pin4, passphrase=True, lock=lock) def generate_entropy(strength, internal_entropy, external_entropy): """ strength - length of produced seed. One of 128, 192, 256 random - binary stream of random data from external HRNG """ import hashlib if strength not in (128, 192, 256): raise ValueError("Invalid strength") if not internal_entropy: raise ValueError("Internal entropy is not provided") if len(internal_entropy) < 32: raise ValueError("Internal entropy too short") if not external_entropy: raise ValueError("External entropy is not provided") if len(external_entropy) < 32: raise ValueError("External entropy too short") entropy = hashlib.sha256(internal_entropy + external_entropy).digest() entropy_stripped = entropy[: strength // 8] if len(entropy_stripped) * 8 != strength: raise ValueError("Entropy length mismatch") return entropy_stripped