Fix two storage tests

* test_encrypt_files_many_keys_multiple_keys passing
  - buffer chunk size unified between single key and multiple key path,
    which shouldn't be necessary but can fix later.
* test_encrypt_file_many_keys_bad_key_length passing
This commit is contained in:
Stephen Akridge
2019-01-08 13:46:59 -08:00
committed by sakridge
parent 4b3d64ec9f
commit 09296e0d71
2 changed files with 11 additions and 9 deletions

View File

@@ -51,8 +51,8 @@ pub fn chacha_cbc_encrypt_file_many_keys(
DEFAULT_SLOT_HEIGHT,
) {
Ok((num_entries, entry_len)) => {
info!(
"encrypting slice: {} num_entries: {} entry_len: {}",
debug!(
"chacha_cuda: encrypting slice: {} num_entries: {} entry_len: {}",
slice, num_entries, entry_len
);
let entry_len_usz = entry_len as usize;
@@ -155,7 +155,6 @@ mod tests {
}
#[test]
#[ignore]
fn test_encrypt_file_many_keys_multiple_keys() {
solana_logger::setup();
@@ -203,14 +202,13 @@ mod tests {
let _ignored = remove_file(out_path);
}
/*
#[test]
fn test_encrypt_file_many_keys_bad_key_length() {
let mut keys = hex!("abc123");
let ledger_dir = "test_encrypt_file_many_keys_bad_key_length";
let ledger_path = get_tmp_ledger_path(ledger_dir);
let samples = [0];
assert!(chacha_cbc_encrypt_file_many_keys(&ledger_path, 0, &mut keys, &samples,).is_err());
let db_ledger = Arc::new(DbLedger::open(&ledger_path).unwrap());
assert!(chacha_cbc_encrypt_file_many_keys(&db_ledger, 0, &mut keys, &samples,).is_err());
}
*/
}