mirror of
https://github.com/trezor/trezor-firmware.git
synced 2024-12-27 00:28:10 +00:00
54f1599a5a
This clarifies the intent: the project is licenced under terms of LGPL version 3 only, but the standard headers cover only "3 or later", so we had to rewrite them. In the same step, we removed author information from individual files in favor of "SatoshiLabs and contributors", and include an AUTHORS file that lists the contributors. Apologies to those whose names are missing; please contact us if you wish to add your info to the AUTHORS file.
90 lines
4.3 KiB
Python
90 lines
4.3 KiB
Python
# This file is part of the Trezor project.
|
|
#
|
|
# Copyright (C) 2012-2018 SatoshiLabs and contributors
|
|
#
|
|
# This library is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Lesser General Public License version 3
|
|
# as published by the Free Software Foundation.
|
|
#
|
|
# This library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the License along with this library.
|
|
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
|
|
|
|
from binascii import hexlify, unhexlify
|
|
import pytest
|
|
|
|
from .common import TrezorTest
|
|
|
|
|
|
class TestMsgCipherkeyvalue(TrezorTest):
|
|
|
|
def test_encrypt(self):
|
|
self.setup_mnemonic_nopin_nopassphrase()
|
|
|
|
# different ask values
|
|
res = self.client.encrypt_keyvalue([0, 1, 2], b"test", b"testing message!", ask_on_encrypt=True, ask_on_decrypt=True)
|
|
assert hexlify(res) == b'676faf8f13272af601776bc31bc14e8f'
|
|
|
|
res = self.client.encrypt_keyvalue([0, 1, 2], b"test", b"testing message!", ask_on_encrypt=True, ask_on_decrypt=False)
|
|
assert hexlify(res) == b'5aa0fbcb9d7fa669880745479d80c622'
|
|
|
|
res = self.client.encrypt_keyvalue([0, 1, 2], b"test", b"testing message!", ask_on_encrypt=False, ask_on_decrypt=True)
|
|
assert hexlify(res) == b'958d4f63269b61044aaedc900c8d6208'
|
|
|
|
res = self.client.encrypt_keyvalue([0, 1, 2], b"test", b"testing message!", ask_on_encrypt=False, ask_on_decrypt=False)
|
|
assert hexlify(res) == b'e0cf0eb0425947000eb546cc3994bc6c'
|
|
|
|
# different key
|
|
res = self.client.encrypt_keyvalue([0, 1, 2], b"test2", b"testing message!", ask_on_encrypt=True, ask_on_decrypt=True)
|
|
assert hexlify(res) == b'de247a6aa6be77a134bb3f3f925f13af'
|
|
|
|
# different message
|
|
res = self.client.encrypt_keyvalue([0, 1, 2], b"test", b"testing message! it is different", ask_on_encrypt=True, ask_on_decrypt=True)
|
|
assert hexlify(res) == b'676faf8f13272af601776bc31bc14e8f3ae1c88536bf18f1b44f1e4c2c4a613d'
|
|
|
|
# different path
|
|
res = self.client.encrypt_keyvalue([0, 1, 3], b"test", b"testing message!", ask_on_encrypt=True, ask_on_decrypt=True)
|
|
assert hexlify(res) == b'b4811a9d492f5355a5186ddbfccaae7b'
|
|
|
|
def test_decrypt(self):
|
|
self.setup_mnemonic_nopin_nopassphrase()
|
|
|
|
# different ask values
|
|
res = self.client.decrypt_keyvalue([0, 1, 2], b"test", unhexlify("676faf8f13272af601776bc31bc14e8f"), ask_on_encrypt=True, ask_on_decrypt=True)
|
|
assert res == b'testing message!'
|
|
|
|
res = self.client.decrypt_keyvalue([0, 1, 2], b"test", unhexlify("5aa0fbcb9d7fa669880745479d80c622"), ask_on_encrypt=True, ask_on_decrypt=False)
|
|
assert res == b'testing message!'
|
|
|
|
res = self.client.decrypt_keyvalue([0, 1, 2], b"test", unhexlify("958d4f63269b61044aaedc900c8d6208"), ask_on_encrypt=False, ask_on_decrypt=True)
|
|
assert res == b'testing message!'
|
|
|
|
res = self.client.decrypt_keyvalue([0, 1, 2], b"test", unhexlify("e0cf0eb0425947000eb546cc3994bc6c"), ask_on_encrypt=False, ask_on_decrypt=False)
|
|
assert res == b'testing message!'
|
|
|
|
# different key
|
|
res = self.client.decrypt_keyvalue([0, 1, 2], b"test2", unhexlify("de247a6aa6be77a134bb3f3f925f13af"), ask_on_encrypt=True, ask_on_decrypt=True)
|
|
assert res == b'testing message!'
|
|
|
|
# different message
|
|
res = self.client.decrypt_keyvalue([0, 1, 2], b"test", unhexlify("676faf8f13272af601776bc31bc14e8f3ae1c88536bf18f1b44f1e4c2c4a613d"), ask_on_encrypt=True, ask_on_decrypt=True)
|
|
assert res == b'testing message! it is different'
|
|
|
|
# different path
|
|
res = self.client.decrypt_keyvalue([0, 1, 3], b"test", unhexlify("b4811a9d492f5355a5186ddbfccaae7b"), ask_on_encrypt=True, ask_on_decrypt=True)
|
|
assert res == b'testing message!'
|
|
|
|
def test_encrypt_badlen(self):
|
|
self.setup_mnemonic_nopin_nopassphrase()
|
|
with pytest.raises(Exception):
|
|
self.client.encrypt_keyvalue([0, 1, 2], b"test", b"testing")
|
|
|
|
def test_decrypt_badlen(self):
|
|
self.setup_mnemonic_nopin_nopassphrase()
|
|
with pytest.raises(Exception):
|
|
self.client.decrypt_keyvalue([0, 1, 2], b"test", b"testing")
|