mirror of
https://github.com/dashpay/dash.git
synced 2024-12-27 04:52:59 +01:00
4a3e3af6e7
fa0074e2d82928016a43ca408717154a1c70a4db scripted-diff: Bump copyright headers (MarcoFalke) Pull request description: Needs to be done because no one has removed the years yet ACKs for top commit: practicalswift: ACK fa0074e2d82928016a43ca408717154a1c70a4db Tree-SHA512: 210e92acd7d400b556cf8259c3ec9967797420cfd19f0c2a4fa54cb2b3d32ad9ae27e771269201e7d554c0f4cd73a8b1c1a42c9f65d8685ca4d52e5134b071a3
100 lines
4.7 KiB
Python
Executable File
100 lines
4.7 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# Copyright (c) 2016-2020 The Bitcoin Core developers
|
|
# Distributed under the MIT software license, see the accompanying
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
"""Test Wallet encryption"""
|
|
|
|
import time
|
|
|
|
from test_framework.test_framework import BitcoinTestFramework
|
|
from test_framework.util import (
|
|
assert_raises_rpc_error,
|
|
assert_greater_than,
|
|
assert_greater_than_or_equal,
|
|
)
|
|
|
|
|
|
class WalletEncryptionTest(BitcoinTestFramework):
|
|
def set_test_params(self):
|
|
self.setup_clean_chain = True
|
|
self.num_nodes = 1
|
|
|
|
def skip_test_if_missing_module(self):
|
|
self.skip_if_no_wallet()
|
|
|
|
def run_test(self):
|
|
passphrase = "WalletPassphrase"
|
|
passphrase2 = "SecondWalletPassphrase"
|
|
|
|
# Make sure the wallet isn't encrypted first
|
|
msg = "test message"
|
|
address = self.nodes[0].getnewaddress()
|
|
sig = self.nodes[0].signmessage(address, msg)
|
|
assert self.nodes[0].verifymessage(address, sig, msg)
|
|
assert_raises_rpc_error(-15, "Error: running with an unencrypted wallet, but walletpassphrase was called", self.nodes[0].walletpassphrase, 'ff', 1)
|
|
assert_raises_rpc_error(-15, "Error: running with an unencrypted wallet, but walletpassphrasechange was called.", self.nodes[0].walletpassphrasechange, 'ff', 'ff')
|
|
|
|
# Encrypt the wallet
|
|
assert_raises_rpc_error(-8, "passphrase can not be empty", self.nodes[0].encryptwallet, '')
|
|
self.nodes[0].encryptwallet(passphrase)
|
|
|
|
# Test that the wallet is encrypted
|
|
assert_raises_rpc_error(-13, "Please enter the wallet passphrase with walletpassphrase first", self.nodes[0].signmessage, address, msg)
|
|
assert_raises_rpc_error(-15, "Error: running with an encrypted wallet, but encryptwallet was called.", self.nodes[0].encryptwallet, 'ff')
|
|
assert_raises_rpc_error(-8, "passphrase can not be empty", self.nodes[0].walletpassphrase, '', 1)
|
|
assert_raises_rpc_error(-8, "passphrase can not be empty", self.nodes[0].walletpassphrasechange, '', 'ff')
|
|
|
|
# Check that walletpassphrase works
|
|
self.nodes[0].walletpassphrase(passphrase, 2)
|
|
sig = self.nodes[0].signmessage(address, msg)
|
|
assert self.nodes[0].verifymessage(address, sig, msg)
|
|
|
|
# Check that the timeout is right
|
|
time.sleep(4) # Wait a little bit longer to make sure wallet gets locked
|
|
assert_raises_rpc_error(-13, "Please enter the wallet passphrase with walletpassphrase first", self.nodes[0].signmessage, address, msg)
|
|
|
|
# Test wrong passphrase
|
|
assert_raises_rpc_error(-14, "wallet passphrase entered was incorrect", self.nodes[0].walletpassphrase, passphrase + "wrong", 10)
|
|
|
|
# Test walletlock
|
|
self.nodes[0].walletpassphrase(passphrase, 84600)
|
|
sig = self.nodes[0].signmessage(address, msg)
|
|
assert self.nodes[0].verifymessage(address, sig, msg)
|
|
self.nodes[0].walletlock()
|
|
assert_raises_rpc_error(-13, "Please enter the wallet passphrase with walletpassphrase first", self.nodes[0].signmessage, address, msg)
|
|
|
|
# Test passphrase changes
|
|
self.nodes[0].walletpassphrasechange(passphrase, passphrase2)
|
|
assert_raises_rpc_error(-14, "wallet passphrase entered was incorrect", self.nodes[0].walletpassphrase, passphrase, 10)
|
|
self.nodes[0].walletpassphrase(passphrase2, 10)
|
|
sig = self.nodes[0].signmessage(address, msg)
|
|
assert self.nodes[0].verifymessage(address, sig, msg)
|
|
self.nodes[0].walletlock()
|
|
|
|
# Test timeout bounds
|
|
assert_raises_rpc_error(-8, "Timeout cannot be negative.", self.nodes[0].walletpassphrase, passphrase2, -10)
|
|
|
|
self.log.info('Check a timeout less than the limit')
|
|
MAX_VALUE = 100000000
|
|
expected_time = self.mocktime + MAX_VALUE - 600
|
|
self.nodes[0].walletpassphrase(passphrase2, MAX_VALUE - 600)
|
|
self.bump_mocktime(1)
|
|
# give buffer for walletpassphrase, since it iterates over all crypted keys
|
|
expected_time_with_buffer = self.mocktime + MAX_VALUE - 600
|
|
actual_time = self.nodes[0].getwalletinfo()['unlocked_until']
|
|
assert_greater_than_or_equal(actual_time, expected_time)
|
|
assert_greater_than(expected_time_with_buffer, actual_time)
|
|
|
|
self.log.info('Check a timeout greater than the limit')
|
|
expected_time = self.mocktime + MAX_VALUE - 1
|
|
self.nodes[0].walletpassphrase(passphrase2, MAX_VALUE + 1000)
|
|
self.bump_mocktime(1)
|
|
expected_time_with_buffer = self.mocktime + MAX_VALUE
|
|
actual_time = self.nodes[0].getwalletinfo()['unlocked_until']
|
|
assert_greater_than_or_equal(actual_time, expected_time)
|
|
assert_greater_than(expected_time_with_buffer, actual_time)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
WalletEncryptionTest().main()
|