mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-11-22 15:38:11 +00:00
8912686a22
- some non-english texts do not fit on the screen and are paginated, these tests cannot handle it - commented out not to block GFL PR, to be resolved later
147 lines
4.6 KiB
Python
147 lines
4.6 KiB
Python
# This file is part of the Trezor project.
|
|
#
|
|
# Copyright (C) 2012-2019 SatoshiLabs and contributors
|
|
#
|
|
# This library is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Lesser General Public License version 3
|
|
# as published by the Free Software Foundation.
|
|
#
|
|
# This library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the License along with this library.
|
|
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
|
|
|
|
from typing import TYPE_CHECKING
|
|
|
|
import pytest
|
|
|
|
from trezorlib import device, messages
|
|
|
|
from .. import buttons
|
|
from ..common import EXTERNAL_ENTROPY, WITH_MOCK_URANDOM, generate_entropy
|
|
from . import reset
|
|
|
|
if TYPE_CHECKING:
|
|
from ..device_handler import BackgroundDeviceHandler
|
|
|
|
|
|
pytestmark = pytest.mark.models("core")
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
"num_of_shares, threshold",
|
|
[
|
|
pytest.param(1, 1, id="1of1"),
|
|
pytest.param(16, 16, id="16of16"),
|
|
],
|
|
)
|
|
@pytest.mark.setup_client(uninitialized=True)
|
|
@WITH_MOCK_URANDOM
|
|
def test_reset_slip39_basic(
|
|
device_handler: "BackgroundDeviceHandler", num_of_shares: int, threshold: int
|
|
):
|
|
features = device_handler.features()
|
|
debug = device_handler.debuglink()
|
|
|
|
assert features.initialized is False
|
|
|
|
device_handler.run(
|
|
device.reset,
|
|
strength=128,
|
|
backup_type=messages.BackupType.Slip39_Basic,
|
|
pin_protection=False,
|
|
)
|
|
|
|
# confirm new wallet
|
|
reset.confirm_new_wallet(debug)
|
|
|
|
# confirm back up
|
|
# TODO: check also for ["backup__it_should_be_backed_up", "backup__it_should_be_backed_up_now"]
|
|
# TR.assert_in_multiple(
|
|
# debug.read_layout().text_content(),
|
|
# ["backup__new_wallet_created", "backup__new_wallet_successfully_created"],
|
|
# )
|
|
reset.confirm_read(debug)
|
|
|
|
# confirm backup intro
|
|
# TR.assert_in(debug.read_layout().text_content(), "backup__info_multi_share_backup")
|
|
reset.confirm_read(debug)
|
|
|
|
# confirm checklist
|
|
# TR.assert_in(
|
|
# debug.read_layout().text_content(), "reset__slip39_checklist_num_shares"
|
|
# )
|
|
reset.confirm_read(debug)
|
|
|
|
# set num of shares - default is 5
|
|
assert debug.model is not None
|
|
model_name: str = debug.model.internal_name
|
|
if num_of_shares < 5:
|
|
reset.set_selection(debug, buttons.reset_minus(model_name), 5 - num_of_shares)
|
|
else:
|
|
reset.set_selection(debug, buttons.reset_plus(model_name), num_of_shares - 5)
|
|
|
|
# confirm checklist
|
|
# TR.assert_in(
|
|
# debug.read_layout().text_content(), "reset__slip39_checklist_set_threshold"
|
|
# )
|
|
reset.confirm_read(debug)
|
|
|
|
# set threshold
|
|
# TODO: could make it general as well
|
|
if num_of_shares == 1 and threshold == 1:
|
|
reset.set_selection(debug, buttons.reset_plus(model_name), 0)
|
|
elif num_of_shares == 16 and threshold == 16:
|
|
reset.set_selection(debug, buttons.reset_plus(model_name), 11)
|
|
else:
|
|
raise RuntimeError("not a supported combination")
|
|
|
|
# confirm checklist
|
|
# TR.assert_in_multiple(
|
|
# debug.read_layout().text_content(),
|
|
# [
|
|
# "reset__slip39_checklist_write_down",
|
|
# "reset__slip39_checklist_write_down_recovery",
|
|
# ],
|
|
# )
|
|
reset.confirm_read(debug)
|
|
|
|
# confirm backup warning
|
|
# TR.assert_in(debug.read_layout().text_content(), "reset__never_make_digital_copy")
|
|
reset.confirm_read(debug, middle_r=True)
|
|
|
|
all_words: list[str] = []
|
|
for _ in range(num_of_shares):
|
|
# read words
|
|
words = reset.read_words(debug)
|
|
|
|
# confirm words
|
|
reset.confirm_words(debug, words)
|
|
|
|
# confirm share checked
|
|
reset.confirm_read(debug)
|
|
|
|
all_words.append(" ".join(words))
|
|
|
|
# confirm backup done
|
|
reset.confirm_read(debug)
|
|
|
|
# generate secret locally
|
|
internal_entropy = debug.state().reset_entropy
|
|
assert internal_entropy is not None
|
|
secret = generate_entropy(128, internal_entropy, EXTERNAL_ENTROPY)
|
|
|
|
# validate that all combinations will result in the correct master secret
|
|
reset.validate_mnemonics(all_words, secret)
|
|
|
|
assert device_handler.result() == "Initialized"
|
|
features = device_handler.features()
|
|
assert features.initialized is True
|
|
assert features.backup_availability == messages.BackupAvailability.NotAvailable
|
|
assert features.pin_protection is False
|
|
assert features.passphrase_protection is False
|
|
assert features.backup_type is messages.BackupType.Slip39_Basic_Extendable
|