Files
trezor-firmware/tests/device_tests/test_protection_levels.py
matejcik 6e3018509b refactor(python): rework session-based API
Co-authored-by: M1nd3r <petrsedlacek.km@seznam.cz>
Co-authored-by: Roman Zeyde <roman.zeyde@satoshilabs.com>

[no changelog]
2026-02-03 14:47:31 +01:00

496 lines
16 KiB
Python

# This file is part of the Trezor project.
#
# Copyright (C) 2012-2019 SatoshiLabs and contributors
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License version 3
# as published by the Free Software Foundation.
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the License along with this library.
# If not, see <https://www.gnu.org/licenses/lgpl-3.0.html>.
from __future__ import annotations
import typing as t
import pytest
from trezorlib import btc, device, exceptions, messages, misc, models
from trezorlib.debuglink import DebugSession as Session
from trezorlib.debuglink import LayoutType
from trezorlib.debuglink import TrezorTestContext as Client
from trezorlib.exceptions import TrezorFailure
from trezorlib.tools import parse_path
if t.TYPE_CHECKING:
from trezorlib.debuglink import ExpectedResponse
from ..common import MNEMONIC12, MOCK_GET_ENTROPY, TEST_ADDRESS_N, is_core
from ..tx_cache import TxCache
from .bitcoin.signtx import (
request_finished,
request_input,
request_meta,
request_output,
)
B = messages.ButtonRequestType
TXHASH_50f6f1 = bytes.fromhex(
"50f6f1209ca92d7359564be803cb2c932cde7d370f7cee50fd1fad6790f6206d"
)
PIN4 = "1234"
pytestmark = pytest.mark.setup_client(pin=PIN4, passphrase=True)
def _pin_request(session: Client):
"""Get appropriate PIN request for each model"""
if session.model is models.T1B1:
return messages.PinMatrixRequest
else:
return messages.ButtonRequest(code=B.PinEntry)
def _expected_responses_unlock(
client: Client, pin: bool = True, passphrase: bool = True, seed: bool = True
) -> list[ExpectedResponse]:
if client.is_protocol_v1():
if not seed:
# => Initialize (from activating a session)
return [messages.Features]
# sequence from derive():
return [
# => Initialize
messages.Features,
# => GetPublicKey
(pin, _pin_request(client)),
(passphrase, messages.PassphraseRequest),
messages.PublicKey,
# => GetFeatures (from refresh_features())
messages.Features,
]
if client.is_thp():
if not seed:
return []
else:
return [
# => ThpCreateNewSession
(pin, _pin_request(client)),
messages.Success,
]
raise NotImplementedError(f"Unknown protocol: {client.protocol_version}")
def _get_test_address(session: Session) -> None:
session.call(
messages.GetAddress(address_n=TEST_ADDRESS_N, coin_name="Testnet"),
expect=messages.Address,
)
def _assert_protection(client: Client, pin: bool = True, passphrase: bool = True):
"""Make sure PIN and passphrase protection have expected values"""
with client:
client.use_pin_sequence([PIN4])
session = client.get_session()
try:
session.ensure_unlocked()
except exceptions.InvalidSessionError:
session.cancel()
session.read()
client.refresh_features()
assert client.features.pin_protection is pin
assert client.features.passphrase_protection is passphrase
session.lock()
session.close()
def test_initialize(client: Client):
_assert_protection(client)
with client:
client.set_expected_responses(
_expected_responses_unlock(client, pin=False, seed=False)
+ [messages.Success]
)
session = client.get_seedless_session()
session.call(messages.Ping(message="hello"))
@pytest.mark.models("core")
@pytest.mark.setup_client(pin=PIN4)
@pytest.mark.parametrize("passphrase", (True, False))
def test_passphrase_reporting(session: Session, passphrase):
"""On TT, passphrase_protection is a private setting, so a locked device should
report passphrase_protection=None.
"""
with session.test_ctx as client:
client.use_pin_sequence([PIN4])
device.apply_settings(session, use_passphrase=passphrase)
session.lock()
# on a locked device, passphrase_protection should be None
assert session.features.unlocked is False
assert session.features.passphrase_protection is None
# on an unlocked device, protection should be reported accurately
_assert_protection(client, pin=True, passphrase=passphrase)
# after re-locking, the setting should be hidden again
session.lock()
assert session.features.unlocked is False
assert session.features.passphrase_protection is None
def test_apply_settings(client: Client):
_assert_protection(client)
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
_expected_responses_unlock(client, seed=False)
+ [
_pin_request(client),
messages.ButtonRequest,
messages.Success,
messages.Features,
]
)
session = client.get_seedless_session()
device.apply_settings(session, label="nazdar")
@pytest.mark.models("legacy")
def test_change_pin_t1(client: Client):
_assert_protection(client)
with client:
client.use_pin_sequence([PIN4, PIN4, PIN4])
session = client.get_seedless_session()
client.set_expected_responses(
_expected_responses_unlock(client, seed=False)
+ [
messages.ButtonRequest,
_pin_request(client),
_pin_request(client),
_pin_request(client),
messages.Success,
messages.Features,
]
)
device.change_pin(session)
@pytest.mark.models("core")
def test_change_pin_t2(client: Client):
_assert_protection(client)
session = client.get_seedless_session()
with client:
client.use_pin_sequence([PIN4, PIN4, PIN4, PIN4])
client.set_expected_responses(
_expected_responses_unlock(client, seed=False)
+ [
_pin_request(client),
messages.ButtonRequest,
_pin_request(client),
_pin_request(client),
(
client.layout_type is LayoutType.Caesar,
messages.ButtonRequest,
),
_pin_request(client),
messages.ButtonRequest,
messages.Success,
messages.Features,
]
)
device.change_pin(session)
@pytest.mark.setup_client(pin=None, passphrase=False)
def test_ping(client: Client):
_assert_protection(client, pin=False, passphrase=False)
session = client.get_session()
with client:
client.set_expected_responses([messages.ButtonRequest, messages.Success])
session.call(messages.Ping(message="msg", button_protection=True))
def test_get_entropy(client: Client):
_assert_protection(client)
with client:
client.use_pin_sequence([PIN4])
session = client.get_seedless_session()
client.set_expected_responses(
_expected_responses_unlock(client, seed=False)
+ [
_pin_request(client),
messages.ButtonRequest(code=B.ProtectCall),
messages.Entropy,
]
)
misc.get_entropy(session, 10)
def test_get_public_key(client: Client):
_assert_protection(client)
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
_expected_responses_unlock(client) + [messages.PublicKey]
)
session = client.get_session()
session.call(messages.GetPublicKey(address_n=[]))
def test_get_address(client: Client):
_assert_protection(client)
with client:
client.use_pin_sequence([PIN4])
expected_responses = _expected_responses_unlock(client) + [messages.Address]
client.set_expected_responses(expected_responses)
session = client.get_session()
_get_test_address(session)
def test_wipe_device(client: Client):
_assert_protection(client)
session = client.get_seedless_session()
with client:
client.set_expected_responses([messages.ButtonRequest, messages.Success])
device.wipe(session)
# After wipe, the features are empty, so we get one stray Features message
# in a random place as `client.features` lazy-loads.
# Triggering it explicitly here:
client.refresh_features()
with client:
client.set_expected_responses(
_expected_responses_unlock(client, seed=False) + [messages.Features]
)
session = client.get_seedless_session()
session.call(messages.GetFeatures())
@pytest.mark.setup_client(uninitialized=True)
@pytest.mark.models("legacy")
def test_reset_device(session: Session):
assert session.features.pin_protection is False
assert session.features.passphrase_protection is False
with session.test_ctx as client:
client.set_expected_responses(
[messages.Features, messages.ButtonRequest]
+ [messages.EntropyRequest]
+ [messages.ButtonRequest] * 24
+ [messages.Success, messages.Features]
)
device.setup(
session,
strength=128,
passphrase_protection=True,
pin_protection=False,
label="label",
entropy_check_count=0,
_get_entropy=MOCK_GET_ENTROPY,
)
with pytest.raises(TrezorFailure):
# This must fail, because device is already initialized
# Using direct call because `device.setup` has its own check
session.call(
messages.ResetDevice(
strength=128,
passphrase_protection=True,
pin_protection=False,
label="label",
)
)
@pytest.mark.setup_client(uninitialized=True)
@pytest.mark.models("legacy")
def test_recovery_device(session: Session):
assert session.features.pin_protection is False
assert session.features.passphrase_protection is False
session.test_ctx.use_mnemonic(MNEMONIC12)
with session.test_ctx as client:
client.set_expected_responses(
[messages.Features, messages.ButtonRequest]
+ [messages.WordRequest] * 24
+ [messages.Success, messages.Features]
)
device.recover(
session,
12,
False,
False,
"label",
input_callback=client.mnemonic_callback,
)
with pytest.raises(TrezorFailure):
# This must fail, because device is already initialized
# Using direct call because `device.recover` has its own check
session.call(
messages.RecoveryDevice(
word_count=12,
passphrase_protection=False,
pin_protection=False,
label="label",
)
)
def test_sign_message(client: Client):
_assert_protection(client)
with client:
client.use_pin_sequence([PIN4])
expected_responses = _expected_responses_unlock(client) + [
messages.ButtonRequest,
messages.ButtonRequest,
messages.MessageSignature,
]
client.set_expected_responses(expected_responses)
session = client.get_session()
btc.sign_message(
session, "Bitcoin", parse_path("m/44h/0h/0h/0/0"), "testing message"
)
def test_sign_message_seedless(client: Client):
_assert_protection(client)
with client:
client.use_pin_sequence([PIN4])
session = client.get_seedless_session()
with pytest.raises(exceptions.InvalidSessionError):
btc.sign_message(
session, "Bitcoin", parse_path("m/44h/0h/0h/0/0"), "testing message"
)
@pytest.mark.models("legacy")
def test_verify_message_t1(client: Client):
_assert_protection(client)
with client:
client.use_pin_sequence([PIN4])
session = client.get_session()
client.set_expected_responses(
[
messages.ButtonRequest,
messages.ButtonRequest,
messages.ButtonRequest,
messages.Success,
]
)
btc.verify_message(
session,
"Bitcoin",
"14LmW5k4ssUrtbAB4255zdqv3b4w1TuX9e",
bytes.fromhex(
"209e23edf0e4e47ff1dec27f32cd78c50e74ef018ee8a6adf35ae17c7a9b0dd96f48b493fd7dbab03efb6f439c6383c9523b3bbc5f1a7d158a6af90ab154e9be80"
),
"This is an example of a signed message.",
)
@pytest.mark.models("core")
def test_verify_message_t2(client: Client):
_assert_protection(client)
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
_expected_responses_unlock(client)
+ [
messages.ButtonRequest,
messages.ButtonRequest,
messages.ButtonRequest,
messages.Success,
]
)
session = client.get_session()
btc.verify_message(
session,
"Bitcoin",
"14LmW5k4ssUrtbAB4255zdqv3b4w1TuX9e",
bytes.fromhex(
"209e23edf0e4e47ff1dec27f32cd78c50e74ef018ee8a6adf35ae17c7a9b0dd96f48b493fd7dbab03efb6f439c6383c9523b3bbc5f1a7d158a6af90ab154e9be80"
),
"This is an example of a signed message.",
)
def test_signtx(client: Client):
# input tx: 50f6f1209ca92d7359564be803cb2c932cde7d370f7cee50fd1fad6790f6206d
inp1 = messages.TxInputType(
address_n=parse_path("m/44h/0h/0h/0/5"), # 1GA9u9TfCG7SWmKCveBumdA1TZpfom6ZdJ
amount=50_000,
prev_hash=TXHASH_50f6f1,
prev_index=1,
)
out1 = messages.TxOutputType(
address="1MJ2tj2ThBE62zXbBYA5ZaN3fdve5CPAz1",
amount=50_000 - 10_000,
script_type=messages.OutputScriptType.PAYTOADDRESS,
)
_assert_protection(client)
with client:
session = client.get_seedless_session()
client.use_pin_sequence([PIN4])
expected_responses = _expected_responses_unlock(client) + [
request_input(0),
request_output(0),
messages.ButtonRequest(code=B.ConfirmOutput),
(is_core(session), messages.ButtonRequest(code=B.ConfirmOutput)),
messages.ButtonRequest(code=B.SignTx),
request_input(0),
request_meta(TXHASH_50f6f1),
request_input(0, TXHASH_50f6f1),
request_output(0, TXHASH_50f6f1),
request_output(1, TXHASH_50f6f1),
request_input(0),
request_output(0),
request_output(0),
request_finished(),
]
client.set_expected_responses(expected_responses)
session = client.get_session()
btc.sign_tx(session, "Bitcoin", [inp1], [out1], prev_txes=TxCache("Bitcoin"))
@pytest.mark.setup_client(pin=PIN4, passphrase=False)
def test_unlocked(client: Client):
assert client.features.unlocked is False
_assert_protection(client, passphrase=False)
with client:
client.use_pin_sequence([PIN4])
client.set_expected_responses(
_expected_responses_unlock(client, passphrase=False) + [messages.Address]
)
session = client.get_session()
_get_test_address(session)
session.refresh_features()
assert session.features.unlocked is True
with client:
client.set_expected_responses([messages.Address])
_get_test_address(session)