input.py 2.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778
  1. #!/usr/bin/env python3
  2. #
  3. # mmgen = Multi-Mode GENerator, command-line Bitcoin cold storage solution
  4. # Copyright (C)2013-2023 The MMGen Project <mmgen@tuta.io>
  5. #
  6. # Project source code repository: https://github.com/mmgen/mmgen-wallet
  7. # Licensed according to the terms of GPL Version 3. See LICENSE for details.
  8. """
  9. test.cmdtest_py_d.input: Shared input routines for the cmdtest.py test suite
  10. """
  11. import time
  12. from .common import randbool
  13. from ..include.common import getrand
  14. def stealth_mnemonic_entry(t,mne,mn,entry_mode,pad_entry=False):
  15. def pad_mnemonic(mn,ss_len):
  16. def get_pad_chars(n):
  17. ret = ''
  18. for _ in range(n):
  19. m = int.from_bytes(getrand(1),'big') % 32
  20. ret += r'123579!@#$%^&*()_+-=[]{}"?/,.<>|'[m]
  21. return ret
  22. ret = []
  23. for w in mn:
  24. if entry_mode == 'short':
  25. w = w[:ss_len]
  26. if len(w) < ss_len:
  27. npc = 3
  28. w = w[0] + get_pad_chars(npc) + w[1:]
  29. if pad_entry:
  30. w += '%' * (1 + mne.em.pad_max - npc)
  31. else:
  32. w += '\n'
  33. else:
  34. w = get_pad_chars(1) + w[0] + get_pad_chars(1) + w[1:]
  35. elif len(w) > (3,5)[ss_len==12]:
  36. w = w + '\n'
  37. else:
  38. w = (
  39. get_pad_chars(2 if randbool() and entry_mode != 'short' else 0)
  40. + w[0] + get_pad_chars(2) + w[1:]
  41. + get_pad_chars(9) )
  42. w = w[:ss_len+1]
  43. ret.append(w)
  44. return ret
  45. if entry_mode == 'fixed':
  46. mn = ['bkr'] + mn[:5] + ['nfb'] + mn[5:]
  47. ssl = mne.uniq_ss_len
  48. def gen_mn():
  49. for w in mn:
  50. if len(w) >= ssl:
  51. yield w[:ssl]
  52. else:
  53. yield w[0] + 'z\b' + '#' * (ssl-len(w)) + w[1:]
  54. mn = list(gen_mn())
  55. elif entry_mode in ('full','short'):
  56. mn = ['fzr'] + mn[:5] + ['grd','grdbxm'] + mn[5:]
  57. mn = pad_mnemonic(mn,mne.em.ss_len)
  58. mn[10] = '@#$%*##' + mn[10]
  59. wnum = 1
  60. p_ok,p_err = mne.word_prompt
  61. for w in mn:
  62. ret = t.expect((p_ok.format(wnum),p_err.format(wnum-1)))
  63. if ret == 0:
  64. wnum += 1
  65. for char in w:
  66. t.send(char)
  67. time.sleep(0.005)
  68. def user_dieroll_entry(t,data):
  69. for s in data:
  70. t.expect(r'Enter die roll #.+: ',s,regex=True)
  71. time.sleep(0.005)