mirror of
https://github.com/trezor/trezor-firmware.git
synced 2025-02-04 20:01:18 +00:00
06927e003e
This also moves DebugLinkMixin to debuglink.py and converts the mixin to a subclass of TrezorClient (which is finally becoming a reasonable-looking class). This takes advantage of the new UI protocol and is ready for further improvements, namely, queuing input for tests that require swipes. The ui.py module contains a Click-based implementation of the UI protocol. Use of callback_* methods has been limited and will probably be cleaned up further (The contract has changed so we'll try to make third party code fail noisily. It is unclear whether a backwards compatible approach will be possible). Furthermore, device.recovery() now takes a callback as an argument. This way we can get rid of WordRequest callbacks, which are only used in the recovery flow.
114 lines
3.9 KiB
Python
114 lines
3.9 KiB
Python
# This file is part of the Trezor project.
|
|
#
|
|
# Copyright (C) 2012-2018 SatoshiLabs and contributors
|
|
#
|
|
# This library is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Lesser General Public License version 3
|
|
# as published by the Free Software Foundation.
|
|
#
|
|
# This library is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Lesser General Public License for more details.
|
|
#
|
|
# You should have received a copy of the License along with this library.
|
|
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
|
|
|
|
import os
|
|
|
|
from trezorlib import coins, debuglink, device, tx_api
|
|
from trezorlib.messages.PassphraseSourceType import HOST as PASSPHRASE_ON_HOST
|
|
from trezorlib.debuglink import TrezorClientDebugLink
|
|
|
|
from . import conftest
|
|
|
|
tests_dir = os.path.dirname(os.path.abspath(__file__))
|
|
tx_api.cache_dir = os.path.join(tests_dir, "../txcache")
|
|
|
|
|
|
class TrezorTest:
|
|
# fmt: off
|
|
# 1 2 3 4 5 6 7 8 9 10 11 12
|
|
mnemonic12 = "alcohol woman abuse must during monitor noble actual mixed trade anger aisle"
|
|
mnemonic18 = "owner little vague addict embark decide pink prosper true fork panda embody mixture exchange choose canoe electric jewel"
|
|
mnemonic24 = "dignity pass list indicate nasty swamp pool script soccer toe leaf photo multiply desk host tomato cradle drill spread actor shine dismiss champion exotic"
|
|
mnemonic_all = " ".join(["all"] * 12)
|
|
# fmt: on
|
|
|
|
pin4 = "1234"
|
|
pin6 = "789456"
|
|
pin8 = "45678978"
|
|
|
|
def setup_method(self, method):
|
|
wirelink = conftest.get_device()
|
|
self.client = TrezorClientDebugLink(wirelink)
|
|
self.client.set_tx_api(coins.tx_api["Bitcoin"])
|
|
# self.client.set_buttonwait(3)
|
|
|
|
device.wipe(self.client)
|
|
self.client.transport.session_begin()
|
|
|
|
def teardown_method(self, method):
|
|
self.client.transport.session_end()
|
|
self.client.close()
|
|
|
|
def _setup_mnemonic(self, mnemonic=None, pin="", passphrase=False):
|
|
if mnemonic is None:
|
|
mnemonic = TrezorTest.mnemonic12
|
|
debuglink.load_device_by_mnemonic(
|
|
self.client,
|
|
mnemonic=mnemonic,
|
|
pin=pin,
|
|
passphrase_protection=passphrase,
|
|
label="test",
|
|
language="english",
|
|
)
|
|
if passphrase:
|
|
device.apply_settings(self.client, passphrase_source=PASSPHRASE_ON_HOST)
|
|
|
|
def setup_mnemonic_allallall(self):
|
|
self._setup_mnemonic(mnemonic=TrezorTest.mnemonic_all)
|
|
|
|
def setup_mnemonic_nopin_nopassphrase(self):
|
|
self._setup_mnemonic()
|
|
|
|
def setup_mnemonic_nopin_passphrase(self):
|
|
self._setup_mnemonic(passphrase=True)
|
|
|
|
def setup_mnemonic_pin_nopassphrase(self):
|
|
self._setup_mnemonic(pin=TrezorTest.pin4)
|
|
|
|
def setup_mnemonic_pin_passphrase(self):
|
|
self._setup_mnemonic(pin=TrezorTest.pin4, passphrase=True)
|
|
|
|
|
|
def generate_entropy(strength, internal_entropy, external_entropy):
|
|
"""
|
|
strength - length of produced seed. One of 128, 192, 256
|
|
random - binary stream of random data from external HRNG
|
|
"""
|
|
import hashlib
|
|
|
|
if strength not in (128, 192, 256):
|
|
raise ValueError("Invalid strength")
|
|
|
|
if not internal_entropy:
|
|
raise ValueError("Internal entropy is not provided")
|
|
|
|
if len(internal_entropy) < 32:
|
|
raise ValueError("Internal entropy too short")
|
|
|
|
if not external_entropy:
|
|
raise ValueError("External entropy is not provided")
|
|
|
|
if len(external_entropy) < 32:
|
|
raise ValueError("External entropy too short")
|
|
|
|
entropy = hashlib.sha256(internal_entropy + external_entropy).digest()
|
|
entropy_stripped = entropy[: strength // 8]
|
|
|
|
if len(entropy_stripped) * 8 != strength:
|
|
raise ValueError("Entropy length mismatch")
|
|
|
|
return entropy_stripped
|