github.com/aigarnetwork/aigar@v0.0.0-20191115204914-d59a6eb70f8e/accounts/keystore/passphrase_test.go (about) 1 // Copyright 2018 The go-ethereum Authors 2 // Copyright 2019 The go-aigar Authors 3 // This file is part of the go-aigar library. 4 // 5 // The go-aigar library is free software: you can redistribute it and/or modify 6 // it under the terms of the GNU Lesser General Public License as published by 7 // the Free Software Foundation, either version 3 of the License, or 8 // (at your option) any later version. 9 // 10 // The go-aigar library is distributed in the hope that it will be useful, 11 // but WITHOUT ANY WARRANTY; without even the implied warranty of 12 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 // GNU Lesser General Public License for more details. 14 // 15 // You should have received a copy of the GNU Lesser General Public License 16 // along with the go-aigar library. If not, see <http://www.gnu.org/licenses/>. 17 18 package keystore 19 20 import ( 21 "io/ioutil" 22 "testing" 23 24 "github.com/AigarNetwork/aigar/common" 25 ) 26 27 const ( 28 veryLightScryptN = 2 29 veryLightScryptP = 1 30 ) 31 32 // Tests that a json key file can be decrypted and encrypted in multiple rounds. 33 func TestKeyEncryptDecrypt(t *testing.T) { 34 keyjson, err := ioutil.ReadFile("testdata/very-light-scrypt.json") 35 if err != nil { 36 t.Fatal(err) 37 } 38 password := "" 39 address := common.HexToAddress("45dea0fb0bba44f4fcf290bba71fd57d7117cbb8") 40 41 // Do a few rounds of decryption and encryption 42 for i := 0; i < 3; i++ { 43 // Try a bad password first 44 if _, err := DecryptKey(keyjson, password+"bad"); err == nil { 45 t.Errorf("test %d: json key decrypted with bad password", i) 46 } 47 // Decrypt with the correct password 48 key, err := DecryptKey(keyjson, password) 49 if err != nil { 50 t.Fatalf("test %d: json key failed to decrypt: %v", i, err) 51 } 52 if key.Address != address { 53 t.Errorf("test %d: key address mismatch: have %x, want %x", i, key.Address, address) 54 } 55 // Recrypt with a new password and start over 56 password += "new data appended" 57 if keyjson, err = EncryptKey(key, password, veryLightScryptN, veryLightScryptP); err != nil { 58 t.Errorf("test %d: failed to recrypt key %v", i, err) 59 } 60 } 61 }