def test_nem_signtx_provision_namespace(self): self.setup_mnemonic_nopin_nopassphrase() with self.client: self.client.set_expected_responses([ # Confirm provision namespace proto.ButtonRequest(code=proto.ButtonRequestType.ConfirmOutput ), # Confirm fee proto.ButtonRequest(code=proto.ButtonRequestType.SignTx), proto.NEMSignedTx(), ]) tx = self.client.nem_sign_tx( self.client.expand_path("m/44'/1'/0'/0'/0'"), { "timeStamp": 74649215, "fee": 2000000, "type": nem.TYPE_PROVISION_NAMESPACE, "deadline": 74735615, "message": {}, "newPart": "ABCDE", "rentalFeeSink": "TALICE2GMA34CXHD7XLJQ536NM5UNKQHTORNNT2J", "rentalFee": 1500, "parent": None, "version": (0x98 << 24), }) assert hexlify( tx.data ) == b'01200000010000987f0e730420000000edfd32f6e760648c032f9acb4b30d514265f6a5b5f8a7154f2618922b406208480841e0000000000ff5f74042800000054414c49434532474d4133344358484437584c4a513533364e4d35554e4b5148544f524e4e54324adc05000000000000050000004142434445ffffffff' assert hexlify( tx.signature ) == b'f047ae7987cd3a60c0d5ad123aba211185cb6266a7469dfb0491a0df6b5cd9c92b2e2b9f396cc2a3146ee185ba02df4f9e7fb238fe479917b3d274d97336640d'
def _nem_sign(self, client, num_of_swipes, test_suite): n = parse_path("m/44'/1'/0'/0'/0'") def input_flow(): # Confirm Action btn_code = yield assert btn_code == B.ConfirmOutput client.debug.press_yes() # Swipe and confirm yield for _ in range(num_of_swipes): client.debug.swipe_down() client.debug.press_yes() # Confirm Action btn_code = yield assert btn_code == B.ConfirmOutput client.debug.press_yes() # Sign Tx btn_code = yield assert btn_code == B.SignTx client.debug.press_yes() with client: client.set_expected_responses([ proto.ButtonRequest(code=B.ConfirmOutput), proto.ButtonRequest(code=B.ConfirmOutput), proto.ButtonRequest(code=B.ConfirmOutput), proto.ButtonRequest(code=B.SignTx), proto.NEMSignedTx(), ]) client.set_input_flow(input_flow) return nem.sign_tx(client, n, test_suite)
def test_nem_signtx_simple(self): self.setup_mnemonic_nopin_nopassphrase() with self.client: self.client.set_expected_responses([ # Confirm transfer and network fee proto.ButtonRequest(code=proto.ButtonRequestType.ConfirmOutput ), # Unencrypted message proto.ButtonRequest(code=proto.ButtonRequestType.ConfirmOutput ), # Confirm recipient proto.ButtonRequest(code=proto.ButtonRequestType.SignTx), proto.NEMSignedTx(signature=SIGNATURE_TESTNET_SIMPLE), ]) self.client.nem_sign_tx( self.client.expand_path("m/44'/1'/0'/0'/0'"), { "timeStamp": 74649215, "amount": 2000000, "fee": 2000000, "recipient": "TALICE2GMA34CXHD7XLJQ536NM5UNKQHTORNNT2J", "type": 257, "deadline": 74735615, "message": { "payload": hexlify(b"test_nem_transaction_transfer"), "type": 1, }, "version": (0x98 << 24), })
def test_nem_signtx_xem_as_mosaic(self): # tx hash: 9f8741194576a090bc71a3f43a03855950f94278fa121e99203e45967e19a7d0 signature = unhexlify( "1bca7b1b9ffb16d2c2adffa665be072bd2d7a0eafe4a9911dc473500c272905edf3d626274deb52aa490137a276d1fca67ee487079ebf9c09f9faa414f8e7c02" ) self.setup_mnemonic_nopin_nopassphrase() with self.client: self.client.set_expected_responses([ # Confirm transfer and network fee proto.ButtonRequest(code=proto.ButtonRequestType.ConfirmOutput ), # Confirm recipient proto.ButtonRequest(code=proto.ButtonRequestType.SignTx), proto.NEMSignedTx(signature=signature), ]) tx = self.client.nem_sign_tx( self.client.expand_path("m/44'/1'/0'/0'/0'"), { "timeStamp": 76809215, "amount": 1000000, "fee": 1000000, "recipient": "TALICE2GMA34CXHD7XLJQ536NM5UNKQHTORNNT2J", "type": 257, "deadline": 76895615, "version": (0x98 << 24), "message": {}, "mosaics": [ { "mosaicId": { "namespaceId": "nem", "name": "xem", }, "quantity": 1000000, }, ], }) assert hexlify( tx.data ) == b'0101000002000098ff03940420000000edfd32f6e760648c032f9acb4b30d514265f6a5b5f8a7154f2618922b406208440420f00000000007f5595042800000054414c49434532474d4133344358484437584c4a513533364e4d35554e4b5148544f524e4e54324a40420f000000000000000000010000001a0000000e000000030000006e656d0300000078656d40420f0000000000' assert tx.signature == signature
def test_nem_signtx_encrypted_payload(self): self.setup_mnemonic_nopin_nopassphrase() with self.client: self.client.set_expected_responses([ # Confirm transfer and network fee proto.ButtonRequest(code=proto.ButtonRequestType.ConfirmOutput ), # Ask for encryption proto.ButtonRequest(code=proto.ButtonRequestType.ConfirmOutput ), # Confirm recipient proto.ButtonRequest(code=proto.ButtonRequestType.SignTx), proto.NEMSignedTx(), ]) tx = nem.sign_tx( self.client, parse_path("m/44'/1'/0'/0'/0'"), { "timeStamp": 74649215, "amount": 2000000, "fee": 2000000, "recipient": "TALICE2GMA34CXHD7XLJQ536NM5UNKQHTORNNT2J", "type": nem.TYPE_TRANSACTION_TRANSFER, "deadline": 74735615, "message": { # plain text is 32B long => cipher text is 48B # as per PKCS#7 another block containing padding is added "payload": hexlify(b"this message should be encrypted"), "publicKey": "5a5e14c633d7d269302849d739d80344ff14db51d7bcda86045723f05c4e4541", "type": 2, }, "version": (0x98 << 24), }, ) assert ( hexlify(tx.data[:124]) == b"01010000010000987f0e730420000000edfd32f6e760648c032f9acb4b30d514265f6a5b5f8a7154f2618922b406208480841e0000000000ff5f74042800000054414c49434532474d4133344358484437584c4a513533364e4d35554e4b5148544f524e4e54324a80841e0000000000680000000200000060000000" ) # after 124th byte comes iv (16B) salt (32B) and encrypted payload (48B) assert len(tx.data[124:]) == 16 + 32 + 48 # because IV and salt are random (therefore the encrypted payload as well) those data can't be asserted assert len(tx.signature) == 64
def test_nem_signtx_simple(self): # tx hash: 209368053ac61969b6838ceb7e31badeb622ed6aa42d6c58365c42ad1a11e19d signature = unhexlify( "9cda2045324d05c791a4fc312ecceb62954e7740482f8df8928560d63cf273dea595023640179f112de755c79717757ef76962175378d6d87360ddb3f3e5f70f" ) self.setup_mnemonic_nopin_nopassphrase() with self.client: self.client.set_expected_responses([ # Confirm transfer and network fee proto.ButtonRequest(code=proto.ButtonRequestType.ConfirmOutput ), # Unencrypted message proto.ButtonRequest(code=proto.ButtonRequestType.ConfirmOutput ), # Confirm recipient proto.ButtonRequest(code=proto.ButtonRequestType.SignTx), proto.NEMSignedTx(), ]) tx = nem.sign_tx( self.client, parse_path("m/44'/1'/0'/0'/0'"), { "timeStamp": 74649215, "amount": 2000000, "fee": 2000000, "recipient": "TALICE2GMA34CXHD7XLJQ536NM5UNKQHTORNNT2J", "type": nem.TYPE_TRANSACTION_TRANSFER, "deadline": 74735615, "message": { "payload": hexlify(b"test_nem_transaction_transfer"), "type": 1, }, "version": (0x98 << 24), }, ) assert ( hexlify(tx.data) == b"01010000010000987f0e730420000000edfd32f6e760648c032f9acb4b30d514265f6a5b5f8a7154f2618922b406208480841e0000000000ff5f74042800000054414c49434532474d4133344358484437584c4a513533364e4d35554e4b5148544f524e4e54324a80841e000000000025000000010000001d000000746573745f6e656d5f7472616e73616374696f6e5f7472616e73666572" ) assert tx.signature == signature
def test_nem_signtx_xem_as_mosaic(self): self.setup_mnemonic_nopin_nopassphrase() with self.client: self.client.set_expected_responses([ # Confirm transfer and network fee proto.ButtonRequest(code=proto.ButtonRequestType.ConfirmOutput ), # Confirm recipient proto.ButtonRequest(code=proto.ButtonRequestType.SignTx), proto.NEMSignedTx(signature=SIGNATURE_TESTNET_XEM_AS_MOSAIC), ]) self.client.nem_sign_tx( self.client.expand_path("m/44'/1'/0'/0'/0'"), { "timeStamp": 76809215, "amount": 1000000, "fee": 1000000, "recipient": "TALICE2GMA34CXHD7XLJQ536NM5UNKQHTORNNT2J", "type": 257, "deadline": 76895615, "version": (0x98 << 24), "message": {}, "mosaics": [ { "mosaicId": { "namespaceId": "nem", "name": "xem", }, "quantity": 1000000, }, ], })