# This file is part of the Trezor project. # # Copyright (C) 2012-2019 SatoshiLabs and contributors # # This library is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License version 3 # as published by the Free Software Foundation. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the License along with this library. # If not, see . import time import pytest from trezorlib import messages, models from trezorlib.debuglink import SessionDebugWrapper as Session from trezorlib.exceptions import PinException from ..common import check_pin_backoff_time, get_test_address from ..input_flows import InputFlowPINBackoff PIN4 = "1234" BAD_PIN = "5678" pytestmark = pytest.mark.setup_client(pin=PIN4) @pytest.mark.setup_client(pin=None) def test_no_protection(session: Session): with session: session.set_expected_responses([messages.Address]) get_test_address(session) def test_correct_pin(session: Session): with session, session.client as client: client.use_pin_sequence([PIN4]) session.lock() # TODO is the lock here necessary/correctly? # Expected responses differ between T1 and TT is_t1 = session.model is models.T1B1 session.set_expected_responses( [ (is_t1, messages.PinMatrixRequest), ( not is_t1, messages.ButtonRequest(code=messages.ButtonRequestType.PinEntry), ), messages.Address, ] ) get_test_address(session) @pytest.mark.models("legacy") def test_incorrect_pin_t1(session: Session): with pytest.raises(PinException): session.client.use_pin_sequence([BAD_PIN]) get_test_address(session) @pytest.mark.models("core") def test_incorrect_pin_t2(session: Session): session.lock() # TODO is the lock here necessary/correctly? with session, session.client as client: # After first incorrect attempt, TT will not raise an error, but instead ask for another attempt client.use_pin_sequence([BAD_PIN, PIN4]) session.set_expected_responses( [ messages.ButtonRequest(code=messages.ButtonRequestType.PinEntry), messages.ButtonRequest(code=messages.ButtonRequestType.PinEntry), messages.Address, ] ) get_test_address(session) @pytest.mark.models("legacy") def test_exponential_backoff_t1(session: Session): for attempt in range(3): start = time.time() with session, session.client as client, pytest.raises(PinException): client.use_pin_sequence([BAD_PIN]) get_test_address(session) check_pin_backoff_time(attempt, start) @pytest.mark.models("core") def test_exponential_backoff_t2(session: Session): with session.client as client: IF = InputFlowPINBackoff(client, BAD_PIN, PIN4) client.set_input_flow(IF.get()) session.lock() get_test_address(session)