# This file is part of the Trezor project. # # Copyright (C) 2012-2021 SatoshiLabs and contributors # # This library is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License version 3 # as published by the Free Software Foundation. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the License along with this library. # If not, see . import pytest from trezorlib import btc, messages from trezorlib.debuglink import TrezorClientDebugLink as Client from trezorlib.exceptions import TrezorFailure from trezorlib.tools import H_, parse_path from ...tx_cache import TxCache from ..signtx import request_finished, request_input, request_meta, request_output B = messages.ButtonRequestType TX_API = TxCache("Testnet") TXHASH_7956f1 = bytes.fromhex( "7956f1de3e7362b04115b64a31f0b6822c50dd6c08d78398f392a0ac3f0e357b" ) TXHASH_3ac32e = bytes.fromhex( "3ac32e90831d79385eee49d6030a2123cd9d009fe8ffc3d470af9a6a777a119b" ) TXHASH_df862e = bytes.fromhex( "df862e31da31ff84addd392f6aa89af18978a398ea258e4901ae72894b66679f" ) TXHASH_8c3ea7 = bytes.fromhex( "8c3ea7a10ab6d289119b722ec8c27b70c17c722334ced31a0370d782e4b6775d" ) TXHASH_901593 = bytes.fromhex( "901593bed347678d9762fdee728c35dc4ec3cfdc3728a4d72dcaab3751122e85" ) TXHASH_091446 = bytes.fromhex( "09144602765ce3dd8f4329445b20e3684e948709c5cdcaf12da3bb079c99448a" ) TXHASH_65b811 = bytes.fromhex( "65b811d3eca0fe6915d9f2d77c86c5a7f19bf66b1b1253c2c51cb4ae5f0c017b" ) def test_send_p2tr(client: Client): inp1 = messages.TxInputType( # tb1pn2d0yjeedavnkd8z8lhm566p0f2utm3lgvxrsdehnl94y34txmts5s7t4c address_n=parse_path("m/86h/1h/0h/1/0"), amount=4_600, prev_hash=TXHASH_7956f1, prev_index=1, script_type=messages.InputScriptType.SPENDTAPROOT, ) out1 = messages.TxOutputType( # 86'/1'/1'/0/0 address="tb1paxhjl357yzctuf3fe58fcdx6nul026hhh6kyldpfsf3tckj9a3wslqd7zd", amount=4_450, script_type=messages.OutputScriptType.PAYTOADDRESS, ) with client: client.set_expected_responses( [ request_input(0), request_output(0), messages.ButtonRequest(code=B.ConfirmOutput), messages.ButtonRequest(code=B.SignTx), request_input(0), request_output(0), request_input(0), request_finished(), ] ) _, serialized_tx = btc.sign_tx( client, "Testnet", [inp1], [out1], prev_txes=TX_API ) assert ( serialized_tx.hex() == "010000000001017b350e3faca092f39883d7086cdd502c82b6f0314ab61541b062733edef156790100000000ffffffff016211000000000000225120e9af2fc69e20b0be2629cd0e9c34da9f3ef56af7beac4fb4298262bc5a45ec5d0140493145b992dacbd7ea579a415efc2cba20c3bf0f7827d1bcf999109c0d11783fe96f91ddb04a889faa17ad21ecc5c81a578009744e95c7e721aff2a5c442916600000000" ) def test_send_two_with_change(client: Client): inp1 = messages.TxInputType( # tb1pswrqtykue8r89t9u4rprjs0gt4qzkdfuursfnvqaa3f2yql07zmq8s8a5u address_n=parse_path("m/86h/1h/0h/0/0"), amount=6_800, prev_hash=TXHASH_df862e, prev_index=0, script_type=messages.InputScriptType.SPENDTAPROOT, ) inp2 = messages.TxInputType( # tb1p8tvmvsvhsee73rhym86wt435qrqm92psfsyhy6a3n5gw455znnpqm8wald address_n=parse_path("m/86h/1h/0h/0/1"), amount=13_000, prev_hash=TXHASH_3ac32e, prev_index=1, script_type=messages.InputScriptType.SPENDTAPROOT, ) out1 = messages.TxOutputType( # 84'/1'/1'/0/0 address="tb1q7r9yvcdgcl6wmtta58yxf29a8kc96jkyxl7y88", amount=15_000, script_type=messages.OutputScriptType.PAYTOADDRESS, ) out2 = messages.TxOutputType( # tb1pn2d0yjeedavnkd8z8lhm566p0f2utm3lgvxrsdehnl94y34txmts5s7t4c address_n=parse_path("m/86h/1h/0h/1/0"), script_type=messages.OutputScriptType.PAYTOTAPROOT, amount=6_800 + 13_000 - 200 - 15_000, ) with client: client.set_expected_responses( [ request_input(0), request_input(1), request_output(0), messages.ButtonRequest(code=B.ConfirmOutput), request_output(1), messages.ButtonRequest(code=B.SignTx), request_input(0), request_input(1), request_output(0), request_output(1), request_input(0), request_input(1), request_finished(), ] ) _, serialized_tx = btc.sign_tx( client, "Testnet", [inp1, inp2], [out1, out2], prev_txes=TX_API ) assert ( serialized_tx.hex() == "010000000001029f67664b8972ae01498e25ea98a37889f19aa86a2f39ddad84ff31da312e86df0000000000ffffffff9b117a776a9aaf70d4c3ffe89f009dcd23210a03d649ee5e38791d83902ec33a0100000000ffffffff02983a000000000000160014f0ca4661a8c7f4edad7da1c864a8bd3db05d4ac4f8110000000000002251209a9af24b396f593b34e23fefba6b417a55c5ee3f430c3837379fcb5246ab36d70140b51992353d2f99b7b620c0882cb06694996f1b6c7e62a3c1d3036e0f896fbf0b92f3d9aeab94f2454809a501715667345f702c8214693f469225de5f6636b86b01409956e47403278bf76eecbbbc3af0c2731d8347763825248a2e0f39aca5a684a7d5054e7222a1033fb5864a886180f1a8c64adab12433c78298d1f83e4c8f46e100000000" ) def test_send_mixed(client: Client): inp1 = messages.TxInputType( # 2MutHjgAXkqo3jxX2DZWorLAckAnwTxSM9V address_n=parse_path("m/49h/1h/1h/0/0"), amount=20_000, prev_hash=TXHASH_8c3ea7, prev_index=0, script_type=messages.InputScriptType.SPENDP2SHWITNESS, ) inp2 = messages.TxInputType( # tb1q7r9yvcdgcl6wmtta58yxf29a8kc96jkyxl7y88 address_n=parse_path("m/84h/1h/1h/0/0"), amount=15_000, prev_hash=TXHASH_7956f1, prev_index=0, script_type=messages.InputScriptType.SPENDWITNESS, ) inp3 = messages.TxInputType( # tb1paxhjl357yzctuf3fe58fcdx6nul026hhh6kyldpfsf3tckj9a3wslqd7zd address_n=parse_path("m/86h/1h/1h/0/0"), amount=4_450, prev_hash=TXHASH_901593, prev_index=0, script_type=messages.InputScriptType.SPENDTAPROOT, ) inp4 = messages.TxInputType( # msUqRgCWS7ryuFcF34EaKTrsTe3xHra128 address_n=parse_path("m/44h/1h/1h/0/0"), amount=10_000, prev_hash=TXHASH_3ac32e, prev_index=2, script_type=messages.InputScriptType.SPENDADDRESS, ) out1 = messages.TxOutputType( address="tb1q6xnnna3g7lk22h5tn8nlx2ezmndlvuk556w4w3", amount=25_000, script_type=messages.OutputScriptType.PAYTOWITNESS, ) out2 = messages.TxOutputType( address="mfnMbVFC1rH4p9GNbjkMfrAjyKRLycFAzA", script_type=messages.OutputScriptType.PAYTOADDRESS, amount=7_000, ) out3 = messages.TxOutputType( address="2MvAG8m2xSf83FgeR4ZpUtaubpLNjAMMoka", amount=6_900, script_type=messages.OutputScriptType.PAYTOP2SHWITNESS, ) out4 = messages.TxOutputType( op_return_data=b"test of op_return data", amount=0, script_type=messages.OutputScriptType.PAYTOOPRETURN, ) out5 = messages.TxOutputType( address="tb1ptgp9w0mm89ms43flw0gkrhyx75gyc6qjhtpf0jmt5sv0dufpnsrsyv9nsz", amount=10_000, script_type=messages.OutputScriptType.PAYTOTAPROOT, ) with client: client.set_expected_responses( [ # process inputs request_input(0), request_input(1), request_input(2), request_input(3), # approve outputs request_output(0), messages.ButtonRequest(code=B.ConfirmOutput), request_output(1), messages.ButtonRequest(code=B.ConfirmOutput), request_output(2), messages.ButtonRequest(code=B.ConfirmOutput), request_output(3), messages.ButtonRequest(code=B.ConfirmOutput), request_output(4), messages.ButtonRequest(code=B.ConfirmOutput), messages.ButtonRequest(code=B.SignTx), # verify inputs request_input(0), request_meta(TXHASH_8c3ea7), request_input(0, TXHASH_8c3ea7), request_output(0, TXHASH_8c3ea7), request_output(1, TXHASH_8c3ea7), request_input(1), request_meta(TXHASH_7956f1), request_input(0, TXHASH_7956f1), request_input(1, TXHASH_7956f1), request_output(0, TXHASH_7956f1), request_output(1, TXHASH_7956f1), request_input(2), request_meta(TXHASH_901593), request_input(0, TXHASH_901593), request_output(0, TXHASH_901593), request_input(3), request_meta(TXHASH_3ac32e), request_input(0, TXHASH_3ac32e), request_output(0, TXHASH_3ac32e), request_output(1, TXHASH_3ac32e), request_output(2, TXHASH_3ac32e), # serialize (segwit) inputs request_input(0), request_input(1), request_input(2), # serialize and sign legacy input request_input(0), request_input(1), request_input(2), request_input(3), request_output(0), request_output(1), request_output(2), request_output(3), request_output(4), # serialize outputs request_output(0), request_output(1), request_output(2), request_output(3), request_output(4), # sign segwit inputs request_input(0), request_input(1), request_input(2), (client.features.model == "1", request_input(3)), request_finished(), ] ) _, serialized_tx = btc.sign_tx( client, "Testnet", [inp1, inp2, inp3, inp4], [out1, out2, out3, out4, out5], prev_txes=TX_API, ) assert ( serialized_tx.hex() == "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" ) def test_attack_script_type(client: Client): # Scenario: The attacker falsely claims that the transaction is Taproot-only to # avoid prev tx streaming and gives a lower amount for one of the inputs. The # correct input types and amounts are revelaled only in step6_sign_segwit_inputs() # to get a valid signature. This results in a transaction which pays a fee much # larger than what the user confirmed. inp1 = messages.TxInputType( address_n=parse_path("m/84h/1h/0h/1/0"), amount=7_289_000, prev_hash=TXHASH_65b811, prev_index=1, script_type=messages.InputScriptType.SPENDWITNESS, ) inp2 = messages.TxInputType( address_n=parse_path("m/84h/1h/1h/0/0"), amount=12_300_000, prev_hash=TXHASH_091446, prev_index=0, script_type=messages.InputScriptType.SPENDWITNESS, ) out1 = messages.TxOutputType( address="tb1q694ccp5qcc0udmfwgp692u2s2hjpq5h407urtu", script_type=messages.OutputScriptType.PAYTOADDRESS, amount=7_289_000 + 10_000 - 1_000, ) attack_count = 5 def attack_processor(msg): nonlocal attack_count if attack_count > 0 and msg.tx.inputs: attack_count -= 1 if msg.tx.inputs[0] == inp2: msg.tx.inputs[0].amount = 10000 msg.tx.inputs[0].address_n[0] = H_(86) msg.tx.inputs[0].script_type = messages.InputScriptType.SPENDTAPROOT return msg with client: client.set_filter(messages.TxAck, attack_processor) client.set_expected_responses( [ request_input(0), request_input(1), request_output(0), messages.ButtonRequest(code=B.ConfirmOutput), messages.ButtonRequest(code=B.SignTx), request_input(0), request_input(1), request_output(0), request_input(0), request_input(1), messages.Failure(code=messages.FailureType.ProcessError), ] ) with pytest.raises(TrezorFailure) as exc: btc.sign_tx(client, "Testnet", [inp1, inp2], [out1], prev_txes=TX_API) assert exc.value.code == messages.FailureType.ProcessError assert exc.value.message.endswith("Transaction has changed during signing")