github.com/MetalBlockchain/subnet-evm@v0.4.9/accounts/keystore/passphrase_test.go (about) 1 // (c) 2019-2020, Ava Labs, Inc. 2 // 3 // This file is a derived work, based on the go-ethereum library whose original 4 // notices appear below. 5 // 6 // It is distributed under a license compatible with the licensing terms of the 7 // original code from which it is derived. 8 // 9 // Much love to the original authors for their work. 10 // ********** 11 // Copyright 2016 The go-ethereum Authors 12 // This file is part of the go-ethereum library. 13 // 14 // The go-ethereum library is free software: you can redistribute it and/or modify 15 // it under the terms of the GNU Lesser General Public License as published by 16 // the Free Software Foundation, either version 3 of the License, or 17 // (at your option) any later version. 18 // 19 // The go-ethereum library is distributed in the hope that it will be useful, 20 // but WITHOUT ANY WARRANTY; without even the implied warranty of 21 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 22 // GNU Lesser General Public License for more details. 23 // 24 // You should have received a copy of the GNU Lesser General Public License 25 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 26 27 package keystore 28 29 import ( 30 "os" 31 "testing" 32 33 "github.com/ethereum/go-ethereum/common" 34 ) 35 36 const ( 37 veryLightScryptN = 2 38 veryLightScryptP = 1 39 ) 40 41 // Tests that a json key file can be decrypted and encrypted in multiple rounds. 42 func TestKeyEncryptDecrypt(t *testing.T) { 43 keyjson, err := os.ReadFile("testdata/very-light-scrypt.json") 44 if err != nil { 45 t.Fatal(err) 46 } 47 password := "" 48 address := common.HexToAddress("45dea0fb0bba44f4fcf290bba71fd57d7117cbb8") 49 50 // Do a few rounds of decryption and encryption 51 for i := 0; i < 3; i++ { 52 // Try a bad password first 53 if _, err := DecryptKey(keyjson, password+"bad"); err == nil { 54 t.Errorf("test %d: json key decrypted with bad password", i) 55 } 56 // Decrypt with the correct password 57 key, err := DecryptKey(keyjson, password) 58 if err != nil { 59 t.Fatalf("test %d: json key failed to decrypt: %v", i, err) 60 } 61 if key.Address != address { 62 t.Errorf("test %d: key address mismatch: have %x, want %x", i, key.Address, address) 63 } 64 // Recrypt with a new password and start over 65 password += "new data appended" // nolint: gosec 66 if keyjson, err = EncryptKey(key, password, veryLightScryptN, veryLightScryptP); err != nil { 67 t.Errorf("test %d: failed to recrypt key %v", i, err) 68 } 69 } 70 }