github.com/codysnider/go-ethereum@v1.10.18-0.20220420071915-14f4ae99222a/accounts/keystore/passphrase_test.go (about) 1 // Copyright 2016 The go-ethereum Authors 2 // This file is part of the go-ethereum library. 3 // 4 // The go-ethereum library is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU Lesser General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // The go-ethereum library is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU Lesser General Public License for more details. 13 // 14 // You should have received a copy of the GNU Lesser General Public License 15 // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. 16 17 package keystore 18 19 import ( 20 "io/ioutil" 21 "testing" 22 23 "github.com/ethereum/go-ethereum/common" 24 ) 25 26 const ( 27 veryLightScryptN = 2 28 veryLightScryptP = 1 29 ) 30 31 // Tests that a json key file can be decrypted and encrypted in multiple rounds. 32 func TestKeyEncryptDecrypt(t *testing.T) { 33 keyjson, err := ioutil.ReadFile("testdata/very-light-scrypt.json") 34 if err != nil { 35 t.Fatal(err) 36 } 37 password := "" 38 address := common.HexToAddress("45dea0fb0bba44f4fcf290bba71fd57d7117cbb8") 39 40 // Do a few rounds of decryption and encryption 41 for i := 0; i < 3; i++ { 42 // Try a bad password first 43 if _, err := DecryptKey(keyjson, password+"bad"); err == nil { 44 t.Errorf("test %d: json key decrypted with bad password", i) 45 } 46 // Decrypt with the correct password 47 key, err := DecryptKey(keyjson, password) 48 if err != nil { 49 t.Fatalf("test %d: json key failed to decrypt: %v", i, err) 50 } 51 if key.Address != address { 52 t.Errorf("test %d: key address mismatch: have %x, want %x", i, key.Address, address) 53 } 54 // Recrypt with a new password and start over 55 password += "new data appended" 56 if keyjson, err = EncryptKey(key, password, veryLightScryptN, veryLightScryptP); err != nil { 57 t.Errorf("test %d: failed to recrypt key %v", i, err) 58 } 59 } 60 }