Fix two storage tests

* test_encrypt_files_many_keys_multiple_keys passing
  - buffer chunk size unified between single key and multiple key path,
    which shouldn't be necessary but can fix later.
* test_encrypt_file_many_keys_bad_key_length passing
This commit is contained in:
Stephen Akridge
2019-01-08 13:46:59 -08:00
committed by sakridge
parent 4b3d64ec9f
commit 09296e0d71
2 changed files with 11 additions and 9 deletions

View File

@ -41,8 +41,8 @@ pub fn chacha_cbc_encrypt_ledger(
) -> io::Result<()> { ) -> io::Result<()> {
let mut out_file = let mut out_file =
BufWriter::new(File::create(out_path).expect("Can't open ledger encrypted data file")); BufWriter::new(File::create(out_path).expect("Can't open ledger encrypted data file"));
let mut buffer = [0; 4 * 1024]; let mut buffer = [0; 8 * 1024];
let mut encrypted_buffer = [0; 4 * 1024]; let mut encrypted_buffer = [0; 8 * 1024];
let key = [0; CHACHA_KEY_SIZE]; let key = [0; CHACHA_KEY_SIZE];
let mut total_entries = 0; let mut total_entries = 0;
let mut entry = slice; let mut entry = slice;
@ -55,6 +55,10 @@ pub fn chacha_cbc_encrypt_ledger(
DEFAULT_SLOT_HEIGHT, DEFAULT_SLOT_HEIGHT,
) { ) {
Ok((num_entries, entry_len)) => { Ok((num_entries, entry_len)) => {
debug!(
"chacha: encrypting slice: {} num_entries: {} entry_len: {}",
slice, num_entries, entry_len
);
debug!("read {} bytes", entry_len); debug!("read {} bytes", entry_len);
let size = entry_len as usize; let size = entry_len as usize;
if size == 0 { if size == 0 {
@ -152,7 +156,7 @@ mod tests {
assert_eq!( assert_eq!(
hasher.result(), hasher.result(),
Hash::new(&hex!( Hash::new(&hex!(
"58433c941060af56b72bfeaca161f19ed6df531efb28961dc6b83f53fbf66ffe" "1ef70b5491a5f2b05ebeb0f92a03c131a7a78622f3643064d6d3c52a0c083175"
)), )),
); );
remove_file(out_path).unwrap(); remove_file(out_path).unwrap();

View File

@ -51,8 +51,8 @@ pub fn chacha_cbc_encrypt_file_many_keys(
DEFAULT_SLOT_HEIGHT, DEFAULT_SLOT_HEIGHT,
) { ) {
Ok((num_entries, entry_len)) => { Ok((num_entries, entry_len)) => {
info!( debug!(
"encrypting slice: {} num_entries: {} entry_len: {}", "chacha_cuda: encrypting slice: {} num_entries: {} entry_len: {}",
slice, num_entries, entry_len slice, num_entries, entry_len
); );
let entry_len_usz = entry_len as usize; let entry_len_usz = entry_len as usize;
@ -155,7 +155,6 @@ mod tests {
} }
#[test] #[test]
#[ignore]
fn test_encrypt_file_many_keys_multiple_keys() { fn test_encrypt_file_many_keys_multiple_keys() {
solana_logger::setup(); solana_logger::setup();
@ -203,14 +202,13 @@ mod tests {
let _ignored = remove_file(out_path); let _ignored = remove_file(out_path);
} }
/*
#[test] #[test]
fn test_encrypt_file_many_keys_bad_key_length() { fn test_encrypt_file_many_keys_bad_key_length() {
let mut keys = hex!("abc123"); let mut keys = hex!("abc123");
let ledger_dir = "test_encrypt_file_many_keys_bad_key_length"; let ledger_dir = "test_encrypt_file_many_keys_bad_key_length";
let ledger_path = get_tmp_ledger_path(ledger_dir); let ledger_path = get_tmp_ledger_path(ledger_dir);
let samples = [0]; let samples = [0];
assert!(chacha_cbc_encrypt_file_many_keys(&ledger_path, 0, &mut keys, &samples,).is_err()); let db_ledger = Arc::new(DbLedger::open(&ledger_path).unwrap());
assert!(chacha_cbc_encrypt_file_many_keys(&db_ledger, 0, &mut keys, &samples,).is_err());
} }
*/
} }