def test_softlock_instability(client): def load_device(): debuglink.load_device( client, mnemonic=MNEMONIC12, pin="1234", passphrase_protection=False, label="test", ) # start from a clean slate: resp = client.debug.reseed(0) if isinstance(resp, messages.Failure) and not isinstance( client.transport, udp.UdpTransport ): pytest.xfail("reseed only supported on emulator") device.wipe(client) entropy_after_wipe = misc.get_entropy(client, 16) # configure and wipe the device load_device() client.debug.reseed(0) device.wipe(client) assert misc.get_entropy(client, 16) == entropy_after_wipe load_device() # the device has PIN -> lock it client.call(messages.LockDevice()) client.debug.reseed(0) # wipe_device should succeed with no need to unlock device.wipe(client) # the device is now trying to run the lockscreen, which attempts to unlock. # If the device actually called config.unlock(), it would use additional randomness. # That is undesirable. Assert that the returned entropy is still the same. assert misc.get_entropy(client, 16) == entropy_after_wipe
def test_sign_tx(client): commitment_data = b"www.example.com" + (1).to_bytes(ROUND_ID_LEN, "big") with client: client.use_pin_sequence([PIN]) btc.authorize_coinjoin( client, coordinator="www.example.com", max_total_fee=10010, fee_per_anonymity=5000000, # 0.005 % n=parse_path("m/84'/1'/0'"), coin_name="Testnet", script_type=messages.InputScriptType.SPENDWITNESS, ) client.call(messages.LockDevice()) with client: client.set_expected_responses( [messages.PreauthorizedRequest, messages.OwnershipProof] ) btc.get_ownership_proof( client, "Testnet", parse_path("84'/1'/0'/1/0"), script_type=messages.InputScriptType.SPENDWITNESS, user_confirmation=True, commitment_data=commitment_data, preauthorized=True, ) with client: client.set_expected_responses( [messages.PreauthorizedRequest, messages.OwnershipProof] ) btc.get_ownership_proof( client, "Testnet", parse_path("84'/1'/0'/1/5"), script_type=messages.InputScriptType.SPENDWITNESS, user_confirmation=True, commitment_data=commitment_data, preauthorized=True, ) inp1 = messages.TxInputType( # seed "alcohol woman abuse must during monitor noble actual mixed trade anger aisle" # 84'/1'/0'/0/0 # tb1qnspxpr2xj9s2jt6qlhuvdnxw6q55jvygcf89r2 amount=100000, prev_hash=TXHASH_e5b7e2, prev_index=0, script_type=messages.InputScriptType.EXTERNAL, ownership_proof=bytearray.fromhex( "534c001900016b2055d8190244b2ed2d46513c40658a574d3bc2deb6969c0535bb818b44d2c40002473044022072b4376c1b6c9e9e4d45158e1b6b4edfbe7b2292d8b4a60e8b0d273bcfef6b4a0220786169ab42a7663cb7d5f27ecb468da76dc2d1b7a10d1d18fbe5120e7890b9d2012103505f0d82bbdd251511591b34f36ad5eea37d3220c2b81a1189084431ddb3aa3d" ), commitment_data=commitment_data, ) inp2 = messages.TxInputType( address_n=parse_path("84'/1'/0'/1/0"), amount=7289000, prev_hash=TXHASH_65b811, prev_index=1, script_type=messages.InputScriptType.SPENDWITNESS, ) # Other's coinjoined output. out1 = messages.TxOutputType( address="tb1qk7j3ahs2v6hrv4v282cf0tvxh0vqq7rpt3zcml", amount=50000, script_type=messages.OutputScriptType.PAYTOWITNESS, ) # Our coinjoined output. out2 = messages.TxOutputType( address_n=parse_path("84'/1'/0'/1/1"), amount=50000, script_type=messages.OutputScriptType.PAYTOWITNESS, ) # Our change output. out3 = messages.TxOutputType( address_n=parse_path("84'/1'/0'/1/2"), amount=7289000 - 50000 - 5 - 5000, script_type=messages.OutputScriptType.PAYTOWITNESS, ) # Other's change output. out4 = messages.TxOutputType( address="tb1q9cqhdr9ydetjzrct6tyeuccws9505hl96azwxk", amount=100000 - 50000 - 5 - 5000, script_type=messages.OutputScriptType.PAYTOWITNESS, ) # Coordinator's output. out5 = messages.TxOutputType( address="mvbu1Gdy8SUjTenqerxUaZyYjmveZvt33q", amount=10, script_type=messages.OutputScriptType.PAYTOWITNESS, ) with client: client.set_expected_responses( [ messages.PreauthorizedRequest(), request_input(0), request_input(1), request_output(0), request_output(1), request_output(2), request_output(3), request_output(4), request_input(0), request_meta(TXHASH_e5b7e2), request_input(0, TXHASH_e5b7e2), request_output(0, TXHASH_e5b7e2), request_output(1, TXHASH_e5b7e2), request_input(1), request_meta(TXHASH_65b811), request_input(0, TXHASH_65b811), request_output(0, TXHASH_65b811), request_output(1, TXHASH_65b811), request_input(0), request_input(1), request_output(0), request_output(1), request_output(2), request_output(3), request_output(4), request_input(1), request_finished(), ] ) _, serialized_tx = btc.sign_tx( client, "Testnet", [inp1, inp2], [out1, out2, out3, out4, out5], prev_txes=TX_CACHE_TESTNET, preauthorized=True, ) assert ( serialized_tx.hex() == "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" ) # Test for a second time. btc.sign_tx( client, "Testnet", [inp1, inp2], [out1, out2, out3, out4, out5], prev_txes=TX_CACHE_TESTNET, preauthorized=True, ) # Test for a third time, fees should exceed max_total_fee. with pytest.raises(TrezorFailure, match="Fees exceed authorized limit"): btc.sign_tx( client, "Testnet", [inp1, inp2], [out1, out2, out3, out4, out5], prev_txes=TX_CACHE_TESTNET, preauthorized=True, )
def test_sign_tx(client: Client): # NOTE: FAKE input tx commitment_data = b"\x0fwww.example.com" + (1).to_bytes(ROUND_ID_LEN, "big") with client: client.use_pin_sequence([PIN]) btc.authorize_coinjoin( client, coordinator="www.example.com", max_rounds=2, max_coordinator_fee_rate=50_000_000, # 0.5 % max_fee_per_kvbyte=3500, n=parse_path("m/84h/1h/0h"), coin_name="Testnet", script_type=messages.InputScriptType.SPENDWITNESS, ) client.call(messages.LockDevice()) with client: client.set_expected_responses( [messages.PreauthorizedRequest, messages.OwnershipProof] ) btc.get_ownership_proof( client, "Testnet", parse_path("m/84h/1h/0h/1/0"), script_type=messages.InputScriptType.SPENDWITNESS, user_confirmation=True, commitment_data=commitment_data, preauthorized=True, ) with client: client.set_expected_responses( [messages.PreauthorizedRequest, messages.OwnershipProof] ) btc.get_ownership_proof( client, "Testnet", parse_path("m/84h/1h/0h/1/5"), script_type=messages.InputScriptType.SPENDWITNESS, user_confirmation=True, commitment_data=commitment_data, preauthorized=True, ) inputs = [ messages.TxInputType( # seed "alcohol woman abuse must during monitor noble actual mixed trade anger aisle" # 84'/1'/0'/0/0 # tb1qnspxpr2xj9s2jt6qlhuvdnxw6q55jvygcf89r2 amount=100_000, prev_hash=TXHASH_e5b7e2, prev_index=0, script_type=messages.InputScriptType.EXTERNAL, script_pubkey=bytes.fromhex("00149c02608d469160a92f40fdf8c6ccced029493088"), ownership_proof=bytearray.fromhex( "534c001901016b2055d8190244b2ed2d46513c40658a574d3bc2deb6969c0535bb818b44d2c40002483045022100a6c7d59b453efa7b4abc9bc724a94c5655ae986d5924dc29d28bcc2b859cbace022047d2bc4422a47f7b044bd6cdfbf63fe1a0ecbf11393f4c0bf8565f867a5ced16012103505f0d82bbdd251511591b34f36ad5eea37d3220c2b81a1189084431ddb3aa3d" ), commitment_data=commitment_data, ), messages.TxInputType( address_n=parse_path("m/84h/1h/0h/1/0"), amount=7_289_000, prev_hash=FAKE_TXHASH_f982c0, prev_index=1, script_type=messages.InputScriptType.SPENDWITNESS, ), ]