mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-11-24 08:28:12 +00:00
54f1599a5a
This clarifies the intent: the project is licenced under terms of LGPL version 3 only, but the standard headers cover only "3 or later", so we had to rewrite them. In the same step, we removed author information from individual files in favor of "SatoshiLabs and contributors", and include an AUTHORS file that lists the contributors. Apologies to those whose names are missing; please contact us if you wish to add your info to the AUTHORS file.
207 lines
7.5 KiB
Python
207 lines
7.5 KiB
Python
# This file is part of the Trezor project.
|
|
#
|
|
# Copyright (C) 2012-2018 SatoshiLabs and contributors
|
|
#
|
|
# This library is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Lesser General Public License version 3
|
|
# as published by the Free Software Foundation.
|
|
#
|
|
# This library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the License along with this library.
|
|
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
|
|
|
|
import pytest
|
|
|
|
from .common import TrezorTest, generate_entropy
|
|
|
|
from trezorlib import messages as proto
|
|
from mnemonic import Mnemonic
|
|
|
|
|
|
@pytest.mark.skip_t2
|
|
class TestMsgResetDevice(TrezorTest):
|
|
|
|
def test_reset_device(self):
|
|
|
|
# No PIN, no passphrase
|
|
external_entropy = b'zlutoucky kun upel divoke ody' * 2
|
|
strength = 128
|
|
|
|
ret = self.client.call_raw(proto.ResetDevice(
|
|
display_random=False,
|
|
strength=strength,
|
|
passphrase_protection=False,
|
|
pin_protection=False,
|
|
language='english',
|
|
label='test'
|
|
))
|
|
|
|
# Provide entropy
|
|
assert isinstance(ret, proto.EntropyRequest)
|
|
internal_entropy = self.client.debug.read_reset_entropy()
|
|
ret = self.client.call_raw(proto.EntropyAck(entropy=external_entropy))
|
|
|
|
# Generate mnemonic locally
|
|
entropy = generate_entropy(strength, internal_entropy, external_entropy)
|
|
expected_mnemonic = Mnemonic('english').to_mnemonic(entropy)
|
|
|
|
mnemonic = []
|
|
for _ in range(strength // 32 * 3):
|
|
assert isinstance(ret, proto.ButtonRequest)
|
|
mnemonic.append(self.client.debug.read_reset_word())
|
|
self.client.debug.press_yes()
|
|
self.client.call_raw(proto.ButtonAck())
|
|
|
|
mnemonic = ' '.join(mnemonic)
|
|
|
|
# Compare that device generated proper mnemonic for given entropies
|
|
assert mnemonic == expected_mnemonic
|
|
|
|
mnemonic = []
|
|
for _ in range(strength // 32 * 3):
|
|
assert isinstance(ret, proto.ButtonRequest)
|
|
mnemonic.append(self.client.debug.read_reset_word())
|
|
self.client.debug.press_yes()
|
|
resp = self.client.call_raw(proto.ButtonAck())
|
|
|
|
assert isinstance(resp, proto.Success)
|
|
|
|
mnemonic = ' '.join(mnemonic)
|
|
|
|
# Compare that second pass printed out the same mnemonic once again
|
|
assert mnemonic == expected_mnemonic
|
|
|
|
# Check if device is properly initialized
|
|
resp = self.client.call_raw(proto.Initialize())
|
|
assert resp.initialized is True
|
|
assert resp.needs_backup is False
|
|
assert resp.pin_protection is False
|
|
assert resp.passphrase_protection is False
|
|
|
|
# Do passphrase-protected action, PassphraseRequest should NOT be raised
|
|
resp = self.client.call_raw(proto.Ping(passphrase_protection=True))
|
|
assert isinstance(resp, proto.Success)
|
|
|
|
# Do PIN-protected action, PinRequest should NOT be raised
|
|
resp = self.client.call_raw(proto.Ping(pin_protection=True))
|
|
assert isinstance(resp, proto.Success)
|
|
|
|
def test_reset_device_pin(self):
|
|
external_entropy = b'zlutoucky kun upel divoke ody' * 2
|
|
strength = 128
|
|
|
|
ret = self.client.call_raw(proto.ResetDevice(
|
|
display_random=True,
|
|
strength=strength,
|
|
passphrase_protection=True,
|
|
pin_protection=True,
|
|
language='english',
|
|
label='test'
|
|
))
|
|
|
|
assert isinstance(ret, proto.ButtonRequest)
|
|
self.client.debug.press_yes()
|
|
ret = self.client.call_raw(proto.ButtonAck())
|
|
|
|
assert isinstance(ret, proto.PinMatrixRequest)
|
|
|
|
# Enter PIN for first time
|
|
pin_encoded = self.client.debug.encode_pin('654')
|
|
ret = self.client.call_raw(proto.PinMatrixAck(pin=pin_encoded))
|
|
assert isinstance(ret, proto.PinMatrixRequest)
|
|
|
|
# Enter PIN for second time
|
|
pin_encoded = self.client.debug.encode_pin('654')
|
|
ret = self.client.call_raw(proto.PinMatrixAck(pin=pin_encoded))
|
|
|
|
# Provide entropy
|
|
assert isinstance(ret, proto.EntropyRequest)
|
|
internal_entropy = self.client.debug.read_reset_entropy()
|
|
ret = self.client.call_raw(proto.EntropyAck(entropy=external_entropy))
|
|
|
|
# Generate mnemonic locally
|
|
entropy = generate_entropy(strength, internal_entropy, external_entropy)
|
|
expected_mnemonic = Mnemonic('english').to_mnemonic(entropy)
|
|
|
|
mnemonic = []
|
|
for _ in range(strength // 32 * 3):
|
|
assert isinstance(ret, proto.ButtonRequest)
|
|
mnemonic.append(self.client.debug.read_reset_word())
|
|
self.client.debug.press_yes()
|
|
self.client.call_raw(proto.ButtonAck())
|
|
|
|
mnemonic = ' '.join(mnemonic)
|
|
|
|
# Compare that device generated proper mnemonic for given entropies
|
|
assert mnemonic == expected_mnemonic
|
|
|
|
mnemonic = []
|
|
for _ in range(strength // 32 * 3):
|
|
assert isinstance(ret, proto.ButtonRequest)
|
|
mnemonic.append(self.client.debug.read_reset_word())
|
|
self.client.debug.press_yes()
|
|
resp = self.client.call_raw(proto.ButtonAck())
|
|
|
|
assert isinstance(resp, proto.Success)
|
|
|
|
mnemonic = ' '.join(mnemonic)
|
|
|
|
# Compare that second pass printed out the same mnemonic once again
|
|
assert mnemonic == expected_mnemonic
|
|
|
|
# Check if device is properly initialized
|
|
resp = self.client.call_raw(proto.Initialize())
|
|
assert resp.initialized is True
|
|
assert resp.needs_backup is False
|
|
assert resp.pin_protection is True
|
|
assert resp.passphrase_protection is True
|
|
|
|
# Do passphrase-protected action, PassphraseRequest should be raised
|
|
resp = self.client.call_raw(proto.Ping(passphrase_protection=True))
|
|
assert isinstance(resp, proto.PassphraseRequest)
|
|
self.client.call_raw(proto.Cancel())
|
|
|
|
# Do PIN-protected action, PinRequest should be raised
|
|
resp = self.client.call_raw(proto.Ping(pin_protection=True))
|
|
assert isinstance(resp, proto.PinMatrixRequest)
|
|
self.client.call_raw(proto.Cancel())
|
|
|
|
def test_failed_pin(self):
|
|
# external_entropy = b'zlutoucky kun upel divoke ody' * 2
|
|
strength = 128
|
|
|
|
ret = self.client.call_raw(proto.ResetDevice(
|
|
display_random=True,
|
|
strength=strength,
|
|
passphrase_protection=True,
|
|
pin_protection=True,
|
|
language='english',
|
|
label='test'
|
|
))
|
|
|
|
assert isinstance(ret, proto.ButtonRequest)
|
|
self.client.debug.press_yes()
|
|
ret = self.client.call_raw(proto.ButtonAck())
|
|
|
|
assert isinstance(ret, proto.PinMatrixRequest)
|
|
|
|
# Enter PIN for first time
|
|
pin_encoded = self.client.debug.encode_pin(self.pin4)
|
|
ret = self.client.call_raw(proto.PinMatrixAck(pin=pin_encoded))
|
|
assert isinstance(ret, proto.PinMatrixRequest)
|
|
|
|
# Enter PIN for second time
|
|
pin_encoded = self.client.debug.encode_pin(self.pin6)
|
|
ret = self.client.call_raw(proto.PinMatrixAck(pin=pin_encoded))
|
|
|
|
assert isinstance(ret, proto.Failure)
|
|
|
|
def test_already_initialized(self):
|
|
self.setup_mnemonic_nopin_nopassphrase()
|
|
with pytest.raises(Exception):
|
|
self.client.reset_device(False, 128, True, True, 'label', 'english')
|