mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-05 14:08:39 +00:00
221 lines
7.1 KiB
Python
221 lines
7.1 KiB
Python
# This file is part of the Trezor project.
|
|
#
|
|
# Copyright (C) 2012-2019 SatoshiLabs and contributors
|
|
#
|
|
# This library is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Lesser General Public License version 3
|
|
# as published by the Free Software Foundation.
|
|
#
|
|
# This library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the License along with this library.
|
|
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
|
|
|
|
import pytest
|
|
|
|
from trezorlib import device, messages
|
|
from trezorlib.client import MAX_PIN_LENGTH
|
|
from trezorlib.debuglink import SessionDebugWrapper as Session
|
|
from trezorlib.exceptions import TrezorFailure
|
|
|
|
from ..common import get_test_address
|
|
|
|
PIN4 = "1234"
|
|
PIN6 = "789456"
|
|
PIN_MAX = "".join(chr((i % 9) + ord("1")) for i in range(MAX_PIN_LENGTH))
|
|
PIN_TOO_LONG = PIN_MAX + "1"
|
|
|
|
pytestmark = pytest.mark.models("legacy")
|
|
|
|
|
|
def _check_pin(session: Session, pin):
|
|
session.lock()
|
|
with session, session.client as client:
|
|
client.use_pin_sequence([pin])
|
|
session.set_expected_responses([messages.PinMatrixRequest, messages.Address])
|
|
get_test_address(session)
|
|
|
|
|
|
def _check_no_pin(session: Session):
|
|
session.lock()
|
|
with session:
|
|
session.set_expected_responses([messages.Address])
|
|
get_test_address(session)
|
|
|
|
|
|
def test_set_pin(session: Session):
|
|
assert session.features.pin_protection is False
|
|
|
|
# Check that there's no PIN protection
|
|
_check_no_pin(session)
|
|
|
|
# Let's set new PIN
|
|
with session, session.client as client:
|
|
client.use_pin_sequence([PIN_MAX, PIN_MAX])
|
|
session.set_expected_responses(
|
|
[
|
|
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
|
|
messages.PinMatrixRequest,
|
|
messages.PinMatrixRequest,
|
|
messages.Success,
|
|
messages.Features,
|
|
]
|
|
)
|
|
device.change_pin(session)
|
|
|
|
# Check that there's PIN protection now
|
|
assert session.features.pin_protection is True
|
|
# Check that the PIN is correct
|
|
_check_pin(session, PIN_MAX)
|
|
|
|
|
|
@pytest.mark.setup_client(pin=PIN4)
|
|
def test_change_pin(session: Session):
|
|
assert session.features.pin_protection is True
|
|
# Check that there's PIN protection
|
|
_check_pin(session, PIN4)
|
|
|
|
# Let's change PIN
|
|
with session, session.client as client:
|
|
client.use_pin_sequence([PIN4, PIN_MAX, PIN_MAX])
|
|
session.set_expected_responses(
|
|
[
|
|
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
|
|
messages.PinMatrixRequest,
|
|
messages.PinMatrixRequest,
|
|
messages.PinMatrixRequest,
|
|
messages.Success,
|
|
messages.Features,
|
|
]
|
|
)
|
|
device.change_pin(session)
|
|
|
|
# Check that there's still PIN protection now
|
|
assert session.features.pin_protection is True
|
|
# Check that the PIN is correct
|
|
_check_pin(session, PIN_MAX)
|
|
|
|
|
|
@pytest.mark.setup_client(pin=PIN4)
|
|
def test_remove_pin(session: Session):
|
|
assert session.features.pin_protection is True
|
|
# Check that there's PIN protection
|
|
_check_pin(session, PIN4)
|
|
|
|
# Let's remove PIN
|
|
with session, session.client as client:
|
|
client.use_pin_sequence([PIN4])
|
|
session.set_expected_responses(
|
|
[
|
|
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
|
|
messages.PinMatrixRequest,
|
|
messages.Success,
|
|
messages.Features,
|
|
]
|
|
)
|
|
device.change_pin(session, remove=True)
|
|
|
|
# Check that there's no PIN protection now
|
|
assert session.features.pin_protection is False
|
|
_check_no_pin(session)
|
|
|
|
|
|
def test_set_mismatch(session: Session):
|
|
assert session.features.pin_protection is False
|
|
# Check that there's no PIN protection
|
|
_check_no_pin(session)
|
|
|
|
# Let's set new PIN
|
|
with session, session.client as client, pytest.raises(
|
|
TrezorFailure, match="PIN mismatch"
|
|
):
|
|
# use different PINs for first and second attempt. This will fail.
|
|
client.use_pin_sequence([PIN4, PIN_MAX])
|
|
session.set_expected_responses(
|
|
[
|
|
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
|
|
messages.PinMatrixRequest,
|
|
messages.PinMatrixRequest,
|
|
messages.Failure,
|
|
]
|
|
)
|
|
device.change_pin(session)
|
|
|
|
# Check that there's still no PIN protection now
|
|
# TODO change session.init_device()
|
|
session.refresh_features()
|
|
assert session.features.pin_protection is False
|
|
_check_no_pin(session)
|
|
|
|
|
|
@pytest.mark.setup_client(pin=PIN4)
|
|
def test_change_mismatch(session: Session):
|
|
assert session.features.pin_protection is True
|
|
|
|
# Let's set new PIN
|
|
with session, session.client as client, pytest.raises(
|
|
TrezorFailure, match="PIN mismatch"
|
|
):
|
|
client.use_pin_sequence([PIN4, PIN6, PIN6 + "3"])
|
|
session.set_expected_responses(
|
|
[
|
|
messages.ButtonRequest(code=messages.ButtonRequestType.ProtectCall),
|
|
messages.PinMatrixRequest,
|
|
messages.PinMatrixRequest,
|
|
messages.PinMatrixRequest,
|
|
messages.Failure,
|
|
]
|
|
)
|
|
device.change_pin(session)
|
|
|
|
# Check that there's still old PIN protection
|
|
# TODO change session.init_device()
|
|
session.refresh_features()
|
|
assert session.features.pin_protection is True
|
|
_check_pin(session, PIN4)
|
|
|
|
|
|
@pytest.mark.parametrize("invalid_pin", ("1204", "", PIN_TOO_LONG))
|
|
def test_set_invalid(session: Session, invalid_pin):
|
|
assert session.features.pin_protection is False
|
|
|
|
# Let's set an invalid PIN
|
|
ret = session.call_raw(messages.ChangePin())
|
|
assert isinstance(ret, messages.ButtonRequest)
|
|
|
|
# Press button
|
|
session.client.debug.press_yes()
|
|
ret = session.call_raw(messages.ButtonAck())
|
|
|
|
# Send a PIN containing an invalid digit
|
|
assert isinstance(ret, messages.PinMatrixRequest)
|
|
ret = session.call_raw(messages.PinMatrixAck(pin=invalid_pin))
|
|
|
|
# Ensure the invalid PIN is detected
|
|
assert isinstance(ret, messages.Failure)
|
|
|
|
# Check that there's still no PIN protection now
|
|
# TODO change session.init_device()
|
|
session.refresh_features()
|
|
assert session.features.pin_protection is False
|
|
_check_no_pin(session)
|
|
|
|
|
|
@pytest.mark.parametrize("invalid_pin", ("1204", "", PIN_TOO_LONG))
|
|
@pytest.mark.setup_client(pin=PIN4)
|
|
def test_enter_invalid(session: Session, invalid_pin):
|
|
assert session.features.pin_protection is True
|
|
|
|
# use an invalid PIN
|
|
ret = session.call_raw(messages.GetAddress())
|
|
|
|
# Send a PIN containing an invalid digit
|
|
assert isinstance(ret, messages.PinMatrixRequest)
|
|
ret = session.call_raw(messages.PinMatrixAck(pin=invalid_pin))
|
|
|
|
# Ensure the invalid PIN is detected
|
|
assert isinstance(ret, messages.Failure)
|