Files
trezor-firmware/tests/device_tests/test_msg_wipedevice.py
matejcik 6e3018509b refactor(python): rework session-based API
Co-authored-by: M1nd3r <petrsedlacek.km@seznam.cz>
Co-authored-by: Roman Zeyde <roman.zeyde@satoshilabs.com>

[no changelog]
2026-02-03 14:47:31 +01:00

84 lines
2.7 KiB
Python

# This file is part of the Trezor project.
#
# Copyright (C) 2012-2019 SatoshiLabs and contributors
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License version 3
# as published by the Free Software Foundation.
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the License along with this library.
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
import time
import pytest
from trezorlib import device, messages
from trezorlib.debuglink import DebugSession as Session
from trezorlib.debuglink import TrezorTestContext as Client
from trezorlib.debuglink import load_device
from ..common import MNEMONIC12, get_test_address
PIN4 = "1234"
def test_wipe_device(client: Client):
# explicitly wipe and configure up the client, in order to get
# correct reseeding behavior. see also `test_basic.py::test_device_id_different`
client.wipe_device()
load_device(
client.get_seedless_session(),
mnemonic=MNEMONIC12,
pin=None,
passphrase_protection=True,
label="test",
)
assert client.features.initialized is True
assert client.features.label == "test"
assert client.features.passphrase_protection is True
device_id = client.features.device_id
device.wipe(client.get_session())
assert client.features.initialized is False
assert client.features.label is None
assert client.features.passphrase_protection is False
assert client.features.device_id != device_id
@pytest.mark.setup_client(pin=PIN4)
def test_autolock_not_retained(session: Session):
session.test_ctx.use_pin_sequence([PIN4])
device.apply_settings(session, auto_lock_delay_ms=10_000)
assert session.features.auto_lock_delay_ms == 10_000
device.wipe(session)
session = session.test_ctx.get_seedless_session()
assert session.features.auto_lock_delay_ms > 10_000
session.test_ctx.use_pin_sequence([PIN4, PIN4])
device.setup(
session,
skip_backup=True,
pin_protection=True,
passphrase_protection=False,
entropy_check_count=0,
backup_type=messages.BackupType.Bip39,
)
time.sleep(10.5)
session = session.test_ctx.get_session()
with session.test_ctx as client:
# after sleeping for the pre-wipe autolock amount, Trezor must still be unlocked
client.set_expected_responses([messages.Address])
get_test_address(session)