github.com/aigarnetwork/aigar@v0.0.0-20191115204914-d59a6eb70f8e/accounts/keystore/passphrase_test.go (about)

     1  //  Copyright 2018 The go-ethereum Authors
     2  //  Copyright 2019 The go-aigar Authors
     3  //  This file is part of the go-aigar library.
     4  //
     5  //  The go-aigar library is free software: you can redistribute it and/or modify
     6  //  it under the terms of the GNU Lesser General Public License as published by
     7  //  the Free Software Foundation, either version 3 of the License, or
     8  //  (at your option) any later version.
     9  //
    10  //  The go-aigar library is distributed in the hope that it will be useful,
    11  //  but WITHOUT ANY WARRANTY; without even the implied warranty of
    12  //  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    13  //  GNU Lesser General Public License for more details.
    14  //
    15  //  You should have received a copy of the GNU Lesser General Public License
    16  //  along with the go-aigar library. If not, see <http://www.gnu.org/licenses/>.
    17  
    18  package keystore
    19  
    20  import (
    21  	"io/ioutil"
    22  	"testing"
    23  
    24  	"github.com/AigarNetwork/aigar/common"
    25  )
    26  
    27  const (
    28  	veryLightScryptN = 2
    29  	veryLightScryptP = 1
    30  )
    31  
    32  // Tests that a json key file can be decrypted and encrypted in multiple rounds.
    33  func TestKeyEncryptDecrypt(t *testing.T) {
    34  	keyjson, err := ioutil.ReadFile("testdata/very-light-scrypt.json")
    35  	if err != nil {
    36  		t.Fatal(err)
    37  	}
    38  	password := ""
    39  	address := common.HexToAddress("45dea0fb0bba44f4fcf290bba71fd57d7117cbb8")
    40  
    41  	// Do a few rounds of decryption and encryption
    42  	for i := 0; i < 3; i++ {
    43  		// Try a bad password first
    44  		if _, err := DecryptKey(keyjson, password+"bad"); err == nil {
    45  			t.Errorf("test %d: json key decrypted with bad password", i)
    46  		}
    47  		// Decrypt with the correct password
    48  		key, err := DecryptKey(keyjson, password)
    49  		if err != nil {
    50  			t.Fatalf("test %d: json key failed to decrypt: %v", i, err)
    51  		}
    52  		if key.Address != address {
    53  			t.Errorf("test %d: key address mismatch: have %x, want %x", i, key.Address, address)
    54  		}
    55  		// Recrypt with a new password and start over
    56  		password += "new data appended"
    57  		if keyjson, err = EncryptKey(key, password, veryLightScryptN, veryLightScryptP); err != nil {
    58  			t.Errorf("test %d: failed to recrypt key %v", i, err)
    59  		}
    60  	}
    61  }