mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-23 23:08:14 +00:00
118 lines
7.1 KiB
Python
118 lines
7.1 KiB
Python
from common import *
|
|
|
|
from trezor.utils import chunks
|
|
from trezor.crypto import bip32, bip39
|
|
from trezor.messages.SignTx import SignTx
|
|
from trezor.messages.TxInputType import TxInputType
|
|
from trezor.messages.TxOutputType import TxOutputType
|
|
from trezor.messages.TxOutputBinType import TxOutputBinType
|
|
from trezor.messages.TxRequest import TxRequest
|
|
from trezor.messages.TxAck import TxAck
|
|
from trezor.messages.TransactionType import TransactionType
|
|
from trezor.messages.RequestType import TXINPUT, TXOUTPUT, TXMETA, TXFINISHED
|
|
from trezor.messages.TxRequestDetailsType import TxRequestDetailsType
|
|
from trezor.messages.TxRequestSerializedType import TxRequestSerializedType
|
|
from trezor.messages import OutputScriptType
|
|
|
|
from apps.common import coins
|
|
from apps.wallet.sign_tx import signing
|
|
|
|
|
|
class TestSignTx(unittest.TestCase):
|
|
# pylint: disable=C0301
|
|
|
|
def test_one_one_fee(self):
|
|
# tx: d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882
|
|
# input 0: 0.0039 BTC
|
|
|
|
coin_bitcoin = coins.by_name('Bitcoin')
|
|
|
|
ptx1 = TransactionType(version=1, lock_time=0, inputs_cnt=2, outputs_cnt=1, extra_data_len=0)
|
|
pinp1 = TxInputType(script_sig=unhexlify('483045022072ba61305fe7cb542d142b8f3299a7b10f9ea61f6ffaab5dca8142601869d53c0221009a8027ed79eb3b9bc13577ac2853269323434558528c6b6a7e542be46e7e9a820141047a2d177c0f3626fc68c53610b0270fa6156181f46586c679ba6a88b34c6f4874686390b4d92e5769fbb89c8050b984f4ec0b257a0e5c4ff8bd3b035a51709503'),
|
|
prev_hash=unhexlify('c16a03f1cf8f99f6b5297ab614586cacec784c2d259af245909dedb0e39eddcf'),
|
|
prev_index=1,
|
|
script_type=None,
|
|
sequence=None)
|
|
pinp2 = TxInputType(script_sig=unhexlify('48304502200fd63adc8f6cb34359dc6cca9e5458d7ea50376cbd0a74514880735e6d1b8a4c0221008b6ead7fe5fbdab7319d6dfede3a0bc8e2a7c5b5a9301636d1de4aa31a3ee9b101410486ad608470d796236b003635718dfc07c0cac0cfc3bfc3079e4f491b0426f0676e6643a39198e8e7bdaffb94f4b49ea21baa107ec2e237368872836073668214'),
|
|
prev_hash=unhexlify('1ae39a2f8d59670c8fc61179148a8e61e039d0d9e8ab08610cb69b4a19453eaf'),
|
|
prev_index=1,
|
|
script_type=None,
|
|
sequence=None)
|
|
pout1 = TxOutputBinType(script_pubkey=unhexlify('76a91424a56db43cf6f2b02e838ea493f95d8d6047423188ac'),
|
|
amount=390000)
|
|
|
|
inp1 = TxInputType(address_n=[0], # 14LmW5k4ssUrtbAB4255zdqv3b4w1TuX9e
|
|
# amount=390000,
|
|
prev_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882'),
|
|
prev_index=0,
|
|
amount=None,
|
|
script_type=None,
|
|
multisig=None,
|
|
sequence=None)
|
|
out1 = TxOutputType(address='1MJ2tj2ThBE62zXbBYA5ZaN3fdve5CPAz1',
|
|
amount=390000 - 10000,
|
|
script_type=OutputScriptType.PAYTOADDRESS,
|
|
address_n=[],
|
|
multisig=None)
|
|
tx = SignTx(coin_name=None, version=None, lock_time=None, inputs_count=1, outputs_count=1)
|
|
|
|
messages = [
|
|
None,
|
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None)),
|
|
TxAck(tx=TransactionType(inputs=[inp1])),
|
|
TxRequest(request_type=TXMETA, details=TxRequestDetailsType(request_index=None, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
|
TxAck(tx=ptx1),
|
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
|
TxAck(tx=TransactionType(inputs=[pinp1])),
|
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=1, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
|
TxAck(tx=TransactionType(inputs=[pinp2])),
|
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=unhexlify('d5f65ee80147b4bcc70b75e4bbf2d7382021b871bd8867ef8fa525ef50864882')), serialized=None),
|
|
TxAck(tx=TransactionType(bin_outputs=[pout1])),
|
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
|
TxAck(tx=TransactionType(outputs=[out1])),
|
|
signing.UiConfirmOutput(out1, coin_bitcoin),
|
|
True,
|
|
signing.UiConfirmTotal(380000, 10000, coin_bitcoin),
|
|
True,
|
|
# ButtonRequest(code=ButtonRequest_ConfirmOutput),
|
|
# ButtonRequest(code=ButtonRequest_SignTx),
|
|
TxRequest(request_type=TXINPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
|
TxAck(tx=TransactionType(inputs=[inp1])),
|
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=None),
|
|
TxAck(tx=TransactionType(outputs=[out1])),
|
|
TxRequest(request_type=TXOUTPUT, details=TxRequestDetailsType(request_index=0, tx_hash=None), serialized=TxRequestSerializedType(
|
|
signature_index=0,
|
|
signature=unhexlify('30450221009a0b7be0d4ed3146ee262b42202841834698bb3ee39c24e7437df208b8b7077102202b79ab1e7736219387dffe8d615bbdba87e11477104b867ef47afed1a5ede781'),
|
|
serialized_tx=unhexlify('010000000182488650ef25a58fef6788bd71b8212038d7f2bbe4750bc7bcb44701e85ef6d5000000006b4830450221009a0b7be0d4ed3146ee262b42202841834698bb3ee39c24e7437df208b8b7077102202b79ab1e7736219387dffe8d615bbdba87e11477104b867ef47afed1a5ede7810121023230848585885f63803a0a8aecdd6538792d5c539215c91698e315bf0253b43dffffffff'))),
|
|
TxAck(tx=TransactionType(outputs=[out1])),
|
|
TxRequest(request_type=TXFINISHED, details=None, serialized=TxRequestSerializedType(
|
|
signature_index=None,
|
|
signature=None,
|
|
serialized_tx=unhexlify('0160cc0500000000001976a914de9b2a8da088824e8fe51debea566617d851537888ac00000000'),
|
|
)),
|
|
]
|
|
|
|
seed = bip39.seed('alcohol woman abuse must during monitor noble actual mixed trade anger aisle', '')
|
|
root = bip32.from_seed(seed, 'secp256k1')
|
|
|
|
signer = signing.sign_tx(tx, root)
|
|
|
|
for request, response in chunks(messages, 2):
|
|
res = signer.send(request)
|
|
self.assertEqualEx(res, response)
|
|
|
|
with self.assertRaises(StopIteration):
|
|
signer.send(None)
|
|
|
|
def assertEqualEx(self, a, b):
|
|
# hack to avoid adding __eq__ to signing.Ui* classes
|
|
if ((isinstance(a, signing.UiConfirmOutput) and isinstance(b, signing.UiConfirmOutput)) or
|
|
(isinstance(a, signing.UiConfirmTotal) and isinstance(b, signing.UiConfirmTotal))):
|
|
return self.assertEqual(a.__dict__, b.__dict__)
|
|
else:
|
|
return self.assertEqual(a, b)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
unittest.main()
|