This enables the following linters - typecheck - unused - staticcheck - bidichk - durationcheck - exportloopref - gosec WIth a few exceptions. - We use a deprecated protobuf in trezor. I didn't want to mess with that, since I cannot meaningfully test any changes there. - The deprecated TypeMux is used in a few places still, so the warning for it is silenced for now. - Using string type in context.WithValue is apparently wrong, one should use a custom type, to prevent collisions between different places in the hierarchy of callers. That should be fixed at some point, but may require some attention. - The warnings for using weak random generator are squashed, since we use a lot of random without need for cryptographic guarantees.
		
			
				
	
	
		
			61 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			61 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2016 The go-ethereum Authors
 | |
| // This file is part of the go-ethereum library.
 | |
| //
 | |
| // The go-ethereum library is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Lesser General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // The go-ethereum library is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 | |
| // GNU Lesser General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Lesser General Public License
 | |
| // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package keystore
 | |
| 
 | |
| import (
 | |
| 	"os"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/ethereum/go-ethereum/common"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	veryLightScryptN = 2
 | |
| 	veryLightScryptP = 1
 | |
| )
 | |
| 
 | |
| // Tests that a json key file can be decrypted and encrypted in multiple rounds.
 | |
| func TestKeyEncryptDecrypt(t *testing.T) {
 | |
| 	keyjson, err := os.ReadFile("testdata/very-light-scrypt.json")
 | |
| 	if err != nil {
 | |
| 		t.Fatal(err)
 | |
| 	}
 | |
| 	password := ""
 | |
| 	address := common.HexToAddress("45dea0fb0bba44f4fcf290bba71fd57d7117cbb8")
 | |
| 
 | |
| 	// Do a few rounds of decryption and encryption
 | |
| 	for i := 0; i < 3; i++ {
 | |
| 		// Try a bad password first
 | |
| 		if _, err := DecryptKey(keyjson, password+"bad"); err == nil {
 | |
| 			t.Errorf("test %d: json key decrypted with bad password", i)
 | |
| 		}
 | |
| 		// Decrypt with the correct password
 | |
| 		key, err := DecryptKey(keyjson, password)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("test %d: json key failed to decrypt: %v", i, err)
 | |
| 		}
 | |
| 		if key.Address != address {
 | |
| 			t.Errorf("test %d: key address mismatch: have %x, want %x", i, key.Address, address)
 | |
| 		}
 | |
| 		// Recrypt with a new password and start over
 | |
| 		password += "new data appended" // nolint: gosec
 | |
| 		if keyjson, err = EncryptKey(key, password, veryLightScryptN, veryLightScryptP); err != nil {
 | |
| 			t.Errorf("test %d: failed to recrypt key %v", i, err)
 | |
| 		}
 | |
| 	}
 | |
| }
 |