github.com/MetalBlockchain/subnet-evm@v0.4.9/accounts/keystore/passphrase_test.go (about)

     1  // (c) 2019-2020, Ava Labs, Inc.
     2  //
     3  // This file is a derived work, based on the go-ethereum library whose original
     4  // notices appear below.
     5  //
     6  // It is distributed under a license compatible with the licensing terms of the
     7  // original code from which it is derived.
     8  //
     9  // Much love to the original authors for their work.
    10  // **********
    11  // Copyright 2016 The go-ethereum Authors
    12  // This file is part of the go-ethereum library.
    13  //
    14  // The go-ethereum library is free software: you can redistribute it and/or modify
    15  // it under the terms of the GNU Lesser General Public License as published by
    16  // the Free Software Foundation, either version 3 of the License, or
    17  // (at your option) any later version.
    18  //
    19  // The go-ethereum library is distributed in the hope that it will be useful,
    20  // but WITHOUT ANY WARRANTY; without even the implied warranty of
    21  // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    22  // GNU Lesser General Public License for more details.
    23  //
    24  // You should have received a copy of the GNU Lesser General Public License
    25  // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
    26  
    27  package keystore
    28  
    29  import (
    30  	"os"
    31  	"testing"
    32  
    33  	"github.com/ethereum/go-ethereum/common"
    34  )
    35  
    36  const (
    37  	veryLightScryptN = 2
    38  	veryLightScryptP = 1
    39  )
    40  
    41  // Tests that a json key file can be decrypted and encrypted in multiple rounds.
    42  func TestKeyEncryptDecrypt(t *testing.T) {
    43  	keyjson, err := os.ReadFile("testdata/very-light-scrypt.json")
    44  	if err != nil {
    45  		t.Fatal(err)
    46  	}
    47  	password := ""
    48  	address := common.HexToAddress("45dea0fb0bba44f4fcf290bba71fd57d7117cbb8")
    49  
    50  	// Do a few rounds of decryption and encryption
    51  	for i := 0; i < 3; i++ {
    52  		// Try a bad password first
    53  		if _, err := DecryptKey(keyjson, password+"bad"); err == nil {
    54  			t.Errorf("test %d: json key decrypted with bad password", i)
    55  		}
    56  		// Decrypt with the correct password
    57  		key, err := DecryptKey(keyjson, password)
    58  		if err != nil {
    59  			t.Fatalf("test %d: json key failed to decrypt: %v", i, err)
    60  		}
    61  		if key.Address != address {
    62  			t.Errorf("test %d: key address mismatch: have %x, want %x", i, key.Address, address)
    63  		}
    64  		// Recrypt with a new password and start over
    65  		password += "new data appended" // nolint: gosec
    66  		if keyjson, err = EncryptKey(key, password, veryLightScryptN, veryLightScryptP); err != nil {
    67  			t.Errorf("test %d: failed to recrypt key %v", i, err)
    68  		}
    69  	}
    70  }