github.com/aquanetwork/aquachain@v1.7.8/aqua/accounts/keystore/keystore_passphrase_test.go (about)

     1  // Copyright 2016 The aquachain Authors
     2  // This file is part of the aquachain library.
     3  //
     4  // The aquachain library is free software: you can redistribute it and/or modify
     5  // it under the terms of the GNU Lesser General Public License as published by
     6  // the Free Software Foundation, either version 3 of the License, or
     7  // (at your option) any later version.
     8  //
     9  // The aquachain library is distributed in the hope that it will be useful,
    10  // but WITHOUT ANY WARRANTY; without even the implied warranty of
    11  // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    12  // GNU Lesser General Public License for more details.
    13  //
    14  // You should have received a copy of the GNU Lesser General Public License
    15  // along with the aquachain library. If not, see <http://www.gnu.org/licenses/>.
    16  
    17  package keystore
    18  
    19  import (
    20  	"io/ioutil"
    21  	"testing"
    22  
    23  	"gitlab.com/aquachain/aquachain/common"
    24  )
    25  
    26  const (
    27  	veryLightScryptN = 2
    28  	veryLightScryptP = 1
    29  )
    30  
    31  // Tests that a json key file can be decrypted and encrypted in multiple rounds.
    32  func TestKeyEncryptDecrypt(t *testing.T) {
    33  	keyjson, err := ioutil.ReadFile("testdata/very-light-scrypt.json")
    34  	if err != nil {
    35  		t.Fatal(err)
    36  	}
    37  	password := ""
    38  	address := common.HexToAddress("45dea0fb0bba44f4fcf290bba71fd57d7117cbb8")
    39  
    40  	// Do a few rounds of decryption and encryption
    41  	for i := 0; i < 3; i++ {
    42  		// Try a bad password first
    43  		if _, err := DecryptKey(keyjson, password+"bad"); err == nil {
    44  			t.Errorf("test %d: json key decrypted with bad password", i)
    45  		}
    46  		// Decrypt with the correct password
    47  		key, err := DecryptKey(keyjson, password)
    48  		if err != nil {
    49  			t.Fatalf("test %d: json key failed to decrypt: %v", i, err)
    50  		}
    51  		if key.Address != address {
    52  			t.Errorf("test %d: key address mismatch: have %x, want %x", i, key.Address, address)
    53  		}
    54  		// Recrypt with a new password and start over
    55  		password += "new data appended"
    56  		if keyjson, err = EncryptKey(key, password, veryLightScryptN, veryLightScryptP); err != nil {
    57  			t.Errorf("test %d: failed to recrypt key %v", i, err)
    58  		}
    59  	}
    60  }